/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/ |
resolv.h | 93 # define MAXDNSRCH 6 /* max # domains in search path */
|
/external/openssh/ |
sshd.0 | 372 must be literal domains or addresses. 454 short forms of host names from different domains are put in the file. It [all...] |
sshd.8 | 610 they must be literal domains or addresses. 728 from different domains are put in the file.
|
/frameworks/base/services/java/com/android/server/ |
ConnectivityService.java | 3067 String domains = buffer.toString().trim(); local [all...] |
/external/mdnsresponder/mDNSCore/ |
uDNS.c | 39 // In each of these domains we search for our special pointer records (lb._dns-sd._udp.<domain>, etc.) 40 // to discover recommended domains for domain enumeration (browse, default browse, registration, 41 // default registration) and possibly one or more recommended automatic browsing domains. [all...] |
/external/chromium/net/base/ |
cookie_monster_unittest.cc | 403 // FireFox recognizes domains containing trailing periods as valid. 419 // Test that cookies can bet set on higher level domains. 440 // Check that the same cookie can exist on different sub-domains. 474 // Completely invalid domains: 519 { // Even when the domains match exactly, don't consider it host cookie. [all...] |
/external/dnsmasq/po/ |
pl.po | 109 msgid "Return ipaddr for all hosts in specified domains." 287 msgid "Specify address(es) of upstream servers with optional domains." 291 msgid "Never forward queries to specified domains." [all...] |
/external/chromium/chrome/common/extensions/ |
extension.h | 253 // hosts with differing RCDs (aka Registry Controlled Domains, most of which 254 // are Top Level Domains but also include exceptions like co.uk). [all...] |
/external/chromium/net/data/proxy_resolver_perftest/ |
no-ads.pac | 581 // To add whitelist domains, simple add a line such as: [all...] |
/external/dnsmasq/ |
COPYING-v3 | 57 products. If such problems arise substantially in other domains, we 58 stand ready to extend this provision to those domains in future versions [all...] |
/ndk/sources/host-tools/sed-4.2.1/ |
COPYING | 58 products. If such problems arise substantially in other domains, we 59 stand ready to extend this provision to those domains in future versions [all...] |
/bionic/libc/netbsd/nameser/ |
ns_name.c | 100 * All other domains are returned in non absolute form
|
/device/samsung/crespo/sec_mm/sec_omx/sec_omx_include/khronos/ |
OMX_IVCommon.h | 45 * Common structures for OpenMAX IL Imaging and Video domains
|
/external/bison/ |
ABOUT-NLS | [all...] |
/external/bluetooth/glib/docs/reference/glib/tmpl/ |
glib-unused.sgml | 226 error domains.
|
gregex.sgml | 130 Error domain for regular expressions. Errors in this domain will be from the #GRegexError enumeration. See #GError for information on error domains.
|
keyfile.sgml | 132 error domains.
|
option.sgml | 151 error domains.
|
/external/bluetooth/glib/glib/ |
gmessages.c | 252 * since this setting applies to all domains
|
/external/chromium/chrome/browser/resources/net_internals/ |
index.html | 390 HSTS domains. -->
|
/external/chromium/chrome/common/extensions/docs/ |
xhr.html | 390 A match pattern of "http://*/" allows HTTP access to all reachable domains.
|
/external/qemu/hw/ |
pci.c | 204 /* Note: QEMU doesn't implement domains other than 0 */
|
/external/webkit/Source/WebCore/bindings/v8/ |
V8Proxy.cpp | 169 " from frame with URL ", sourceDocument->url().string(), ". Domains, protocols and ports must match.\n");
|
/external/webkit/Source/WebCore/loader/ |
TextResourceDecoder.cpp | 615 // different domains, |m_source| would not be set to EncodingFromParentFrame
|
/external/webkit/Source/WebCore/loader/cache/ |
CachedResourceLoader.cpp | 507 makeString("Unsafe attempt to load URL ", url.string(), " from frame with URL ", m_document->url().string(), ". Domains, protocols and ports must match.\n");
|