/external/chromium/chrome/browser/ui/views/ |
dropdown_bar_view.h | 21 explicit DropdownBarView(DropdownBarHost* host) 22 : host_(host), 30 // Updates the view to let it know where the host is clipping the 39 DropdownBarHost* host() const { return host_; } function in class:DropdownBarView 42 // The dropdown bar host that controls this view. 45 // While animating, the host clips the widget and draws only the bottom
|
/external/chromium/chrome/browser/ssl/ |
ssl_policy_backend.h | 23 // Records that a host has run insecure content. 24 void HostRanInsecureContent(const std::string& host, int pid); 26 // Returns whether the specified host ran insecure content. 27 bool DidHostRunInsecureContent(const std::string& host, int pid) const; 29 // Records that |cert| is permitted to be used for |host| in the future. 30 void DenyCertForHost(net::X509Certificate* cert, const std::string& host); 32 // Records that |cert| is not permitted to be used for |host| in the future. 33 void AllowCertForHost(net::X509Certificate* cert, const std::string& host); 35 // Queries whether |cert| is allowed or denied for |host|. 37 net::X509Certificate* cert, const std::string& host); [all...] |
/external/chromium/net/base/ |
ssl_false_start_blacklist.cc | 10 bool SSLFalseStartBlacklist::IsMember(const char* host) { 11 const char* last_two_labels = LastTwoLabels(host); 17 const size_t len = strlen(host); 22 memcmp(&host[len - blacklist_entry_len], &kHashData[i + 1], 25 host[len - blacklist_entry_len - 1] == '.')) {
|
registry_controlled_domain.cc | 66 const url_parse::Component host = local 67 gurl.parsed_for_possibly_invalid_spec().host; 68 if ((host.len <= 0) || gurl.HostIsIPAddress()) 71 gurl.possibly_invalid_spec().data() + host.begin, host.len)); 76 const std::string& host) { 78 const std::string canon_host(CanonicalizeHost(host, &host_info)); 86 const std::wstring& host) { 88 const std::string canon_host(CanonicalizeHost(host, &host_info)); 106 gurl1.parsed_for_possibly_invalid_spec().host; 120 const url_parse::Component host = local [all...] |
/external/chromium/chrome/browser/ |
chrome_content_browser_client.cc | 46 BrowserRenderProcessHost* host) { 47 host->channel()->AddFilter(new ChromeRenderMessageFilter( 48 host->id(), 49 host->profile(), 50 host->profile()->GetRequestContextForPossibleApp( 51 host->installed_app()))); 52 host->channel()->AddFilter(new PrintingMessageFilter()); 53 host->channel()->AddFilter( 54 new SearchProviderInstallStateMessageFilter(host->id(), host->profile())) [all...] |
memory_purger.h | 23 static void PurgeRendererForHost(RenderProcessHost* host);
|
/frameworks/base/core/java/android/webkit/ |
SslCertLookupTable.java | 33 // We store the most severe error we're willing to allow for each host. 48 String host; local 50 host = new URL(sslError.getUrl()).getHost(); 54 table.putInt(host, sslError.getPrimaryError()); 57 // We allow the decision to be re-used if it's for the same host and is for 60 String host; local 62 host = new URL(sslError.getUrl()).getHost(); 66 return table.containsKey(host) && sslError.getPrimaryError() <= table.getInt(host);
|
/libcore/luni/src/main/java/org/apache/harmony/xnet/provider/jsse/ |
ClientSessionContext.java | 24 * Caches client sessions. Indexes by host and port. Users are typically 25 * looking to reuse any session for a given host and port. 30 * Sessions indexed by host and port. Protect from concurrent 51 String host = session.getPeerHost(); local 53 if (host == null) { 56 HostAndPort hostAndPortKey = new HostAndPort(host, port); 63 * Finds a cached session for the given host name and port. 65 * @param host of server 69 public SSLSession getSession(String host, int port) { 70 if (host == null) 104 String host = session.getPeerHost(); local 125 final String host; field in class:ClientSessionContext.HostAndPort [all...] |
/external/chromium/chrome/browser/ui/webui/ |
chrome_web_ui_factory.cc | 97 if (url.host() == chrome::kChromeUIDialogHost) 107 if (url.host() == chrome::kCloudPrintResourcesHost) 117 if (url.host() == chrome::kChromeUISyncResourcesHost || 118 url.host() == chrome::kChromeUIRemotingResourcesHost || 119 url.host() == chrome::kCloudPrintSetupHost) 126 if (url.host() == chrome::kChromeUINewTabHost || 135 // after the host name. 136 if (url.host() == chrome::kChromeUIBookmarksHost) 138 if (url.host() == chrome::kChromeUIBugReportHost) 140 if (url.host() == chrome::kChromeUICrashesHost [all...] |
/external/chromium/net/url_request/ |
https_prober.cc | 18 bool HTTPSProber::HaveProbed(const std::string& host) const { 19 return probed_.find(host) != probed_.end(); 22 bool HTTPSProber::InFlight(const std::string& host) const { 23 return inflight_probes_.find(host) != inflight_probes_.end(); 26 bool HTTPSProber::ProbeHost(const std::string& host, URLRequestContext* ctx, 28 if (HaveProbed(host) || InFlight(host)) { 32 inflight_probes_[host] = delegate; 34 GURL url("https://" + host); 35 DCHECK_EQ(url.host(), host) [all...] |
/ndk/build/awk/ |
gen-windows-host-path.awk | 20 # 'cygwin-to-host-path' that will transform a Cygwin-specific path into the 23 # $(call cygwin-to-host-path,/cygdrive/c/Stuff/) --> c:/Stuff 27 # cygwin-to-host-path = $(shell cygpath -m $1) 59 # record a new (host-path,cygwin-path) pair 61 host[count] = $1 73 if (!match(host[nn],"^[A-Za-z]:$")) { 77 letter = substr(host[nn],1,1) 85 host[count] = host[nn] 94 host[count] = host[nn [all...] |
/external/chromium/googleurl/src/ |
url_canon_ip.h | 40 // Searches the host name for the portions of the IPv4 address. On success, 42 // It will return false if the host can not be separated as an IPv4 address 55 // Mozilla), so this code path never gets hit. Our host canonicalization will 59 const url_parse::Component& host, 62 const url_parse::Component& host, 78 const url_parse::Component& host, 83 const url_parse::Component& host, 90 // NOTE that |host| is expected to be surrounded by square brackets. 93 const url_parse::Component& host, 96 const url_parse::Component& host, [all...] |
/libcore/luni/src/main/java/javax/net/ |
DefaultSocketFactory.java | 39 public Socket createSocket(String host, int port) throws IOException, UnknownHostException { 40 return new Socket(host, port); 44 public Socket createSocket(String host, int port, InetAddress localHost, int localPort) 46 return new Socket(host, port, localHost, localPort); 50 public Socket createSocket(InetAddress host, int port) throws IOException { 51 return new Socket(host, port);
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
RFC2109DomainHandler.java | 69 String host = origin.getHost(); local 74 if (!domain.equals(host)) { 79 + "\" does not match the host \"" 80 + host + "\""); 95 host = host.toLowerCase(Locale.ENGLISH); 96 if (!host.endsWith(domain)) { 99 + "\". Domain of origin: \"" + host + "\""); 101 // host minus domain may not contain any dots 102 String hostWithoutDomain = host.substring(0, host.length() - domain.length()) 118 String host = origin.getHost(); local [all...] |
BasicDomainHandler.java | 70 // request-host and domain must be identical for the cookie to sent 72 String host = origin.getHost(); local 77 if (host.contains(".")) { 81 // domain must match host 82 if (!host.endsWith(domain)) { 86 if (!host.equals(domain)) { 89 + "\". Domain of origin: \"" + host + "\""); 93 if (!host.equals(domain)) { 96 + "\". Domain of origin: \"" + host + "\""); 108 String host = origin.getHost() local [all...] |
/external/chromium/chrome/browser/download/ |
download_request_infobar_delegate.h | 23 DownloadRequestLimiter::TabDownloadState* host); 25 void set_host(DownloadRequestLimiter::TabDownloadState* host) { 26 host_ = host;
|
/external/apache-http/src/org/apache/http/conn/ssl/ |
X509HostnameVerifier.java | 62 boolean verify(String host, SSLSession session); 64 void verify(String host, SSLSocket ssl) throws IOException; 66 void verify(String host, X509Certificate cert) throws SSLException; 79 * @param host The hostname to verify. 82 void verify(String host, String[] cns, String[] subjectAlts)
|
BrowserCompatHostnameVerifier.java | 51 final String host, 54 verify(host, cns, subjectAlts, false);
|
StrictHostnameVerifier.java | 58 final String host, 61 verify(host, cns, subjectAlts, true);
|
/external/webkit/Source/WebCore/page/ |
OriginAccessEntry.h | 47 // If host is empty string and SubdomainSetting is AllowSubdomains, the entry will match all domains in the specified protocol. 48 OriginAccessEntry(const String& protocol, const String& host, SubdomainSetting); 52 const String& host() const { return m_host; } function in class:WebCore::OriginAccessEntry 64 return equalIgnoringCase(a.protocol(), b.protocol()) && equalIgnoringCase(a.host(), b.host()) && a.subdomainSettings() == b.subdomainSettings();
|
/external/webkit/Source/WebCore/platform/network/chromium/ |
DNSChromium.cpp | 41 return prefetchDNS(url.host());
|
/prebuilt/linux-x86/toolchain/arm-eabi-4.4.0/lib/gcc/arm-eabi/4.4.0/plugin/include/ |
config.h | 4 #error config.h is for the host, not build, machine. 6 #include "auto-host.h"
|
/prebuilt/linux-x86/toolchain/arm-eabi-4.4.3/lib/gcc/arm-eabi/4.4.3/plugin/include/ |
config.h | 4 #error config.h is for the host, not build, machine. 6 #include "auto-host.h"
|
/prebuilt/linux-x86/toolchain/arm-linux-androideabi-4.4.x/lib/gcc/arm-linux-androideabi/4.4.3/plugin/include/ |
config.h | 4 #error config.h is for the host, not build, machine. 6 #include "auto-host.h"
|
/external/chromium/chrome/browser/content_settings/ |
content_settings_pattern.cc | 27 // - host (matches an exact hostname) 30 // - file:///tmp/test.html (a complete URL without a host) 43 std::string(kDomainWildcard) + url.host()); 59 const std::string host(pattern_.length() > kDomainWildcardLength && 64 return host.find('*') == std::string::npos && 65 !net::CanonicalizeHost(host, &host_info).empty(); 72 const std::string host(net::GetHostOrSpecFromURL(url)); 75 return pattern_ == host; 78 host.rfind(pattern_.substr(kDomainWildcardLength)); 81 (match == 0 || host[match - 1] == '.') & [all...] |