HomeSort by relevance Sort by last modified time
    Searched refs:host (Results 26 - 50 of 1440) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/chromium/chrome/browser/ui/views/
dropdown_bar_view.h 21 explicit DropdownBarView(DropdownBarHost* host)
22 : host_(host),
30 // Updates the view to let it know where the host is clipping the
39 DropdownBarHost* host() const { return host_; } function in class:DropdownBarView
42 // The dropdown bar host that controls this view.
45 // While animating, the host clips the widget and draws only the bottom
  /external/chromium/chrome/browser/ssl/
ssl_policy_backend.h 23 // Records that a host has run insecure content.
24 void HostRanInsecureContent(const std::string& host, int pid);
26 // Returns whether the specified host ran insecure content.
27 bool DidHostRunInsecureContent(const std::string& host, int pid) const;
29 // Records that |cert| is permitted to be used for |host| in the future.
30 void DenyCertForHost(net::X509Certificate* cert, const std::string& host);
32 // Records that |cert| is not permitted to be used for |host| in the future.
33 void AllowCertForHost(net::X509Certificate* cert, const std::string& host);
35 // Queries whether |cert| is allowed or denied for |host|.
37 net::X509Certificate* cert, const std::string& host);
    [all...]
  /external/chromium/net/base/
ssl_false_start_blacklist.cc 10 bool SSLFalseStartBlacklist::IsMember(const char* host) {
11 const char* last_two_labels = LastTwoLabels(host);
17 const size_t len = strlen(host);
22 memcmp(&host[len - blacklist_entry_len], &kHashData[i + 1],
25 host[len - blacklist_entry_len - 1] == '.')) {
registry_controlled_domain.cc 66 const url_parse::Component host = local
67 gurl.parsed_for_possibly_invalid_spec().host;
68 if ((host.len <= 0) || gurl.HostIsIPAddress())
71 gurl.possibly_invalid_spec().data() + host.begin, host.len));
76 const std::string& host) {
78 const std::string canon_host(CanonicalizeHost(host, &host_info));
86 const std::wstring& host) {
88 const std::string canon_host(CanonicalizeHost(host, &host_info));
106 gurl1.parsed_for_possibly_invalid_spec().host;
120 const url_parse::Component host = local
    [all...]
  /external/chromium/chrome/browser/
chrome_content_browser_client.cc 46 BrowserRenderProcessHost* host) {
47 host->channel()->AddFilter(new ChromeRenderMessageFilter(
48 host->id(),
49 host->profile(),
50 host->profile()->GetRequestContextForPossibleApp(
51 host->installed_app())));
52 host->channel()->AddFilter(new PrintingMessageFilter());
53 host->channel()->AddFilter(
54 new SearchProviderInstallStateMessageFilter(host->id(), host->profile()))
    [all...]
memory_purger.h 23 static void PurgeRendererForHost(RenderProcessHost* host);
  /frameworks/base/core/java/android/webkit/
SslCertLookupTable.java 33 // We store the most severe error we're willing to allow for each host.
48 String host; local
50 host = new URL(sslError.getUrl()).getHost();
54 table.putInt(host, sslError.getPrimaryError());
57 // We allow the decision to be re-used if it's for the same host and is for
60 String host; local
62 host = new URL(sslError.getUrl()).getHost();
66 return table.containsKey(host) && sslError.getPrimaryError() <= table.getInt(host);
  /libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/
ClientSessionContext.java 24 * Caches client sessions. Indexes by host and port. Users are typically
25 * looking to reuse any session for a given host and port.
30 * Sessions indexed by host and port. Protect from concurrent
51 String host = session.getPeerHost(); local
53 if (host == null) {
56 HostAndPort hostAndPortKey = new HostAndPort(host, port);
63 * Finds a cached session for the given host name and port.
65 * @param host of server
69 public SSLSession getSession(String host, int port) {
70 if (host == null)
104 String host = session.getPeerHost(); local
125 final String host; field in class:ClientSessionContext.HostAndPort
    [all...]
  /external/chromium/chrome/browser/ui/webui/
chrome_web_ui_factory.cc 97 if (url.host() == chrome::kChromeUIDialogHost)
107 if (url.host() == chrome::kCloudPrintResourcesHost)
117 if (url.host() == chrome::kChromeUISyncResourcesHost ||
118 url.host() == chrome::kChromeUIRemotingResourcesHost ||
119 url.host() == chrome::kCloudPrintSetupHost)
126 if (url.host() == chrome::kChromeUINewTabHost ||
135 // after the host name.
136 if (url.host() == chrome::kChromeUIBookmarksHost)
138 if (url.host() == chrome::kChromeUIBugReportHost)
140 if (url.host() == chrome::kChromeUICrashesHost
    [all...]
  /external/chromium/net/url_request/
https_prober.cc 18 bool HTTPSProber::HaveProbed(const std::string& host) const {
19 return probed_.find(host) != probed_.end();
22 bool HTTPSProber::InFlight(const std::string& host) const {
23 return inflight_probes_.find(host) != inflight_probes_.end();
26 bool HTTPSProber::ProbeHost(const std::string& host, URLRequestContext* ctx,
28 if (HaveProbed(host) || InFlight(host)) {
32 inflight_probes_[host] = delegate;
34 GURL url("https://" + host);
35 DCHECK_EQ(url.host(), host)
    [all...]
  /ndk/build/awk/
gen-windows-host-path.awk 20 # 'cygwin-to-host-path' that will transform a Cygwin-specific path into the
23 # $(call cygwin-to-host-path,/cygdrive/c/Stuff/) --> c:/Stuff
27 # cygwin-to-host-path = $(shell cygpath -m $1)
59 # record a new (host-path,cygwin-path) pair
61 host[count] = $1
73 if (!match(host[nn],"^[A-Za-z]:$")) {
77 letter = substr(host[nn],1,1)
85 host[count] = host[nn]
94 host[count] = host[nn
    [all...]
  /external/chromium/googleurl/src/
url_canon_ip.h 40 // Searches the host name for the portions of the IPv4 address. On success,
42 // It will return false if the host can not be separated as an IPv4 address
55 // Mozilla), so this code path never gets hit. Our host canonicalization will
59 const url_parse::Component& host,
62 const url_parse::Component& host,
78 const url_parse::Component& host,
83 const url_parse::Component& host,
90 // NOTE that |host| is expected to be surrounded by square brackets.
93 const url_parse::Component& host,
96 const url_parse::Component& host,
    [all...]
  /libcore/luni/src/main/java/javax/net/
DefaultSocketFactory.java 39 public Socket createSocket(String host, int port) throws IOException, UnknownHostException {
40 return new Socket(host, port);
44 public Socket createSocket(String host, int port, InetAddress localHost, int localPort)
46 return new Socket(host, port, localHost, localPort);
50 public Socket createSocket(InetAddress host, int port) throws IOException {
51 return new Socket(host, port);
  /external/apache-http/src/org/apache/http/impl/cookie/
RFC2109DomainHandler.java 69 String host = origin.getHost(); local
74 if (!domain.equals(host)) {
79 + "\" does not match the host \""
80 + host + "\"");
95 host = host.toLowerCase(Locale.ENGLISH);
96 if (!host.endsWith(domain)) {
99 + "\". Domain of origin: \"" + host + "\"");
101 // host minus domain may not contain any dots
102 String hostWithoutDomain = host.substring(0, host.length() - domain.length())
118 String host = origin.getHost(); local
    [all...]
BasicDomainHandler.java 70 // request-host and domain must be identical for the cookie to sent
72 String host = origin.getHost(); local
77 if (host.contains(".")) {
81 // domain must match host
82 if (!host.endsWith(domain)) {
86 if (!host.equals(domain)) {
89 + "\". Domain of origin: \"" + host + "\"");
93 if (!host.equals(domain)) {
96 + "\". Domain of origin: \"" + host + "\"");
108 String host = origin.getHost() local
    [all...]
  /external/chromium/chrome/browser/download/
download_request_infobar_delegate.h 23 DownloadRequestLimiter::TabDownloadState* host);
25 void set_host(DownloadRequestLimiter::TabDownloadState* host) {
26 host_ = host;
  /external/apache-http/src/org/apache/http/conn/ssl/
X509HostnameVerifier.java 62 boolean verify(String host, SSLSession session);
64 void verify(String host, SSLSocket ssl) throws IOException;
66 void verify(String host, X509Certificate cert) throws SSLException;
79 * @param host The hostname to verify.
82 void verify(String host, String[] cns, String[] subjectAlts)
BrowserCompatHostnameVerifier.java 51 final String host,
54 verify(host, cns, subjectAlts, false);
StrictHostnameVerifier.java 58 final String host,
61 verify(host, cns, subjectAlts, true);
  /external/webkit/Source/WebCore/page/
OriginAccessEntry.h 47 // If host is empty string and SubdomainSetting is AllowSubdomains, the entry will match all domains in the specified protocol.
48 OriginAccessEntry(const String& protocol, const String& host, SubdomainSetting);
52 const String& host() const { return m_host; } function in class:WebCore::OriginAccessEntry
64 return equalIgnoringCase(a.protocol(), b.protocol()) && equalIgnoringCase(a.host(), b.host()) && a.subdomainSettings() == b.subdomainSettings();
  /external/webkit/Source/WebCore/platform/network/chromium/
DNSChromium.cpp 41 return prefetchDNS(url.host());
  /prebuilt/linux-x86/toolchain/arm-eabi-4.4.0/lib/gcc/arm-eabi/4.4.0/plugin/include/
config.h 4 #error config.h is for the host, not build, machine.
6 #include "auto-host.h"
  /prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/lib/gcc/arm-eabi/4.4.3/plugin/include/
config.h 4 #error config.h is for the host, not build, machine.
6 #include "auto-host.h"
  /prebuilt/linux-x86/toolchain/arm-linux-androideabi-4.4.x/lib/gcc/arm-linux-androideabi/4.4.3/plugin/include/
config.h 4 #error config.h is for the host, not build, machine.
6 #include "auto-host.h"
  /external/chromium/chrome/browser/content_settings/
content_settings_pattern.cc 27 // - host (matches an exact hostname)
30 // - file:///tmp/test.html (a complete URL without a host)
43 std::string(kDomainWildcard) + url.host());
59 const std::string host(pattern_.length() > kDomainWildcardLength &&
64 return host.find('*') == std::string::npos &&
65 !net::CanonicalizeHost(host, &host_info).empty();
72 const std::string host(net::GetHostOrSpecFromURL(url));
75 return pattern_ == host;
78 host.rfind(pattern_.substr(kDomainWildcardLength));
81 (match == 0 || host[match - 1] == '.') &
    [all...]

Completed in 1222 milliseconds

12 3 4 5 6 7 8 91011>>