/external/bluetooth/glib/glib/ |
glibintl.h | 14 /* Split out this in the code, but keep it in the same domain for now */ 28 #define dgettext(Domain,String) (String) 29 #define dcgettext(Domain,String,Type) (String) 30 #define dngettext(Domain,String1,String2,N) ((N) == 1 ? (String1) : (String2)) 31 #define bindtextdomain(Domain,Directory) (Domain) 32 #define bind_textdomain_codeset(Domain,Codeset)
|
/external/chromium/chrome/common/ |
launchd_mac.h | 22 enum Domain { 54 virtual bool RestartJob(Domain domain, 61 virtual CFMutableDictionaryRef CreatePlistFromFile(Domain domain, 66 virtual bool WritePlistToFile(Domain domain, 73 virtual bool DeletePlist(Domain domain, Type type, CFStringRef name);
|
service_process_util_unittest.cc | 298 virtual bool RestartJob(Domain domain, 308 Domain domain, 316 virtual bool WritePlistToFile(Domain domain, 324 virtual bool DeletePlist(Domain domain,
|
/external/llvm/lib/Target/ARM/ |
ARMHazardRecognizer.cpp | 23 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 29 if ((Domain & ARMII::DomainVFP) || (Domain & ARMII::DomainNEON))
|
MLxExpansionPass.cpp | 141 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 147 if ((Domain & ARMII::DomainVFP) || (Domain & ARMII::DomainNEON)) 284 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 285 if (Domain == ARMII::DomainGeneral) {
|
ARMBaseInstrInfo.h | 219 void setExecutionDomain(MachineInstr *MI, unsigned Domain) const;
|
/external/chromium/webkit/glue/ |
webcookie.cc | 19 domain(c.Domain()), 28 const std::string& domain, const std::string& path, 32 domain(domain),
|
/external/chromium/chrome/browser/extensions/ |
extension_cookies_helpers.cc | 55 result->SetString(keys::kDomainKey, cookie.Domain()); 57 net::CookieMonster::DomainIsHostOnly(cookie.Domain())); 94 const std::string& domain_key = cookie.Domain(); 110 // Ignore any cookie whose domain doesn't match the extension's 141 MatchesDomain(cookie.Domain()) && 163 bool MatchFilter::MatchesDomain(const std::string& domain) { 170 // Add a leading '.' character to the filter domain if it doesn't exist. 174 std::string sub_domain(domain); 175 // Strip any leading '.' character from the input cookie domain. 179 // Now check whether the domain argument is a subdomain of the filter domain [all...] |
/external/chromium/net/base/ |
cookie_monster_unittest.cc | 52 // * Three levels of domain cookie (.b.a, .c.b.a, .d.c.b.a) 56 // * Two domain path cookies (.c.b.a/dir1, .c.b.a/dir1/dir2) 59 // Domain cookies 95 // Domain path cookies 365 static const char kValidDomainCookieLine[] = "A=B; path=/; domain=google.izzle"; 375 EXPECT_TRUE(cm->SetCookie(url_google, "C=D; domain=.google.izzle")); 378 // Verify that A=B was set as a host cookie rather than a domain 379 // cookie -- should not be accessible from a sub sub-domain. 382 // Test and make sure we find domain cookies on the same domain 1846 std::string domain; member in struct:net::CookiesInputInfo [all...] |
cookie_monster.h | 44 // - Verify that our domain enforcement and non-dotted handling is correct 53 // * The 'top level domain' (TLD) of an internet domain name is 56 // * The 'effective top level domain' (eTLD) is the longest 57 // "." initiated terminal substring of an internet domain name 58 // that is controlled by a general domain registrar. 60 // * The 'effective top level domain plus one' (eTLD+1) is the 62 // domain name that is not controlled by a general domain 77 // (default), then the key is based on the effective domain of th [all...] |
cookie_monster.cc | 103 // The RFC says the sort order for the domain attribute is undefined. 129 // Two cookies are considered equivalent if they have the same domain, 133 CookieSignature(const std::string& name, const std::string& domain, 136 domain(domain), 144 // Name compare dominates, then domain, then path. 149 diff = domain.compare(cs.domain); 157 std::string domain; member in struct:net::__anon3533::CookieSignature 174 // Determine the actual cookie domain based on the domain string passe [all...] |
/external/chromium/chrome/browser/net/ |
sqlite_persistent_cookie_store_unittest.cc | 96 ASSERT_STREQ("http://foo.bar", cookies[0]->Domain().c_str());
|
sqlite_persistent_cookie_store.cc | 277 smt.ColumnString(1), // domain 507 add_smt.BindString(1, po->cc().Domain());
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 21 ATTRIBUTE MS-CHAP-Domain 10 string Microsoft
|
/external/webkit/LayoutTests/dom/html/level2/html/ |
HTMLAreaElement02.js | 105 assertEquals("altLink","Domain",valt);
|
/external/webkit/LayoutTests/dom/xhtml/level2/html/ |
HTMLAreaElement02.js | 105 assertEquals("altLink","Domain",valt);
|
/external/chromium/chrome/browser/tab_contents/ |
tab_specific_content_settings.cc | 120 cookie->Domain(),
|
/external/chromium/chrome/browser/ui/webui/ |
cookies_tree_model_util.cc | 26 static const char kKeyDomain[] = "domain"; 88 dict->SetString(kKeyDomain, cookie.Domain());
|
/external/llvm/lib/Target/X86/ |
X86InstrInfo.h | 346 void setExecutionDomain(MachineInstr *MI, unsigned Domain) const;
|
/external/chromium/chrome/browser/automation/ |
automation_util.cc | 218 cookie_dict->SetString("domain", cookie.Domain()); 276 std::string domain; local 289 if (cookie_dict->HasKey("domain") && 290 !cookie_dict->GetString("domain", &domain)) { 291 reply.SendError("optional 'domain' invalid"); 321 GURL(url), name, value, domain, path, base::Time(), 337 GURL(url), *cookie.get(), domain, context_getter, &event, &success);
|
/external/chromium/chrome/browser/ui/views/ |
cookie_info_view.cc | 59 const std::string& domain, 63 domain_value_field_->SetText(UTF8ToWide(domain)); 100 SetCookie(pc.HasDomain() ? pc.Domain() : url.host(), cookie);
|
collected_cookies_win.cc | 460 cookie_info_view_->SetCookie(detailed_info.cookie->Domain(),
|
/external/chromium/net/http/ |
http_auth_sspi_win.cc | 51 const string16& domain, 60 identity.Domain = 61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str())); 62 identity.DomainLength = domain.size(); 299 string16 domain; local 301 SplitDomainAndUser(*username, &domain, &user); 302 rv = AcquireExplicitCredentials(library_, security_package_, domain, 395 string16* domain, 397 // |combined| may be in the form "user" or "DOMAIN\user". 399 // TODO(cbentzel): I believe user@domain is also a valid form [all...] |
/external/llvm/include/llvm/Target/ |
TargetInstrInfo.h | [all...] |
/external/chromium/chrome/browser/ui/gtk/ |
collected_cookies_gtk.cc | 345 detailed_info.cookie->Domain(),
|