mobile/android/base/tests/simpleservice.xml

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <?xml version="1.0"?>
     2 <root xmlns="urn:schemas-upnp-org:device-1-0">
     3   <specVersion>
     4     <major>1</major>
     5     <minor>0</minor>
     6   </specVersion>
     7   <URLBase>http://example.com</URLBase>
     8   <device>
     9     <deviceType>urn:dial-multiscreen-org:device:dial:1</deviceType>
    10     <friendlyName>Pretend Device</friendlyName>
    11     <manufacturer>Copy Cat Inc.</manufacturer>
    12     <modelName>Eureka Dongle</modelName>
    13     <UDN>uuid:5ec9ff92-e8b2-4a94-a72c-76b34e6dabb1</UDN>
    14   </device>
    15 </root>

mercurial