/external/chromium/chrome/common/ |
launchd_mac.h | 22 enum Domain { 54 virtual bool RestartJob(Domain domain, 61 virtual CFMutableDictionaryRef CreatePlistFromFile(Domain domain, 66 virtual bool WritePlistToFile(Domain domain, 73 virtual bool DeletePlist(Domain domain, Type type, CFStringRef name);
|
service_process_util_unittest.cc | 298 virtual bool RestartJob(Domain domain, 308 Domain domain, 316 virtual bool WritePlistToFile(Domain domain, 324 virtual bool DeletePlist(Domain domain,
|
/external/llvm/lib/Target/ARM/ |
ARMHazardRecognizer.cpp | 23 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 29 if ((Domain & ARMII::DomainVFP) || (Domain & ARMII::DomainNEON))
|
MLxExpansionPass.cpp | 141 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 147 if ((Domain & ARMII::DomainVFP) || (Domain & ARMII::DomainNEON)) 286 unsigned Domain = MCID.TSFlags & ARMII::DomainMask; 287 if (Domain == ARMII::DomainGeneral) {
|
ARMBaseInstrInfo.h | 236 void setExecutionDomain(MachineInstr *MI, unsigned Domain) const;
|
/external/chromium/webkit/glue/ |
webcookie.cc | 19 domain(c.Domain()), 28 const std::string& domain, const std::string& path, 32 domain(domain),
|
/external/chromium/chrome/browser/extensions/ |
extension_cookies_helpers.cc | 55 result->SetString(keys::kDomainKey, cookie.Domain()); 57 net::CookieMonster::DomainIsHostOnly(cookie.Domain())); 94 const std::string& domain_key = cookie.Domain(); 110 // Ignore any cookie whose domain doesn't match the extension's 141 MatchesDomain(cookie.Domain()) && 163 bool MatchFilter::MatchesDomain(const std::string& domain) { 170 // Add a leading '.' character to the filter domain if it doesn't exist. 174 std::string sub_domain(domain); 175 // Strip any leading '.' character from the input cookie domain. 179 // Now check whether the domain argument is a subdomain of the filter domain [all...] |
/external/jmdns/src/javax/jmdns/impl/ |
DNSEntry.java | 48 String domain = _qualifiedNameMap.get(Fields.Domain); local 52 _type = (application.length() > 0 ? "_" + application + "." : "") + (protocol.length() > 0 ? "_" + protocol + "." : "") + domain + "."; 155 // b._dns-sd._udp.<domain>. 156 // db._dns-sd._udp.<domain>. 157 // r._dns-sd._udp.<domain>. 158 // dr._dns-sd._udp.<domain>. 159 // lb._dns-sd._udp.<domain>. 173 return _qualifiedNameMap.get(Fields.Domain).endsWith("in-addr.arpa"); 177 return _qualifiedNameMap.get(Fields.Domain).endsWith("ip6.arpa") [all...] |
ServiceInfoImpl.java | 188 this._domain = map.get(Fields.Domain); 255 String domain = ""; local 260 domain = casePreservedType.substring(index); 265 domain = removeSeparators(casePreservedType.substring(index)); 291 domain = casePreservedType.substring(start, end); 303 qualifiedNameMap.put(Fields.Domain, removeSeparators(domain)); 315 // Optional domain 316 String domain = (qualifiedNameMap.containsKey(Fields.Domain) ? qualifiedNameMap.get(Fields.Domain) : "local") local 377 String domain = this.getDomain(); local 427 String domain = this.getDomain(); local [all...] |
/external/chromium/net/base/ |
cookie_monster_unittest.cc | 52 // * Three levels of domain cookie (.b.a, .c.b.a, .d.c.b.a) 56 // * Two domain path cookies (.c.b.a/dir1, .c.b.a/dir1/dir2) 59 // Domain cookies 95 // Domain path cookies 365 static const char kValidDomainCookieLine[] = "A=B; path=/; domain=google.izzle"; 375 EXPECT_TRUE(cm->SetCookie(url_google, "C=D; domain=.google.izzle")); 378 // Verify that A=B was set as a host cookie rather than a domain 379 // cookie -- should not be accessible from a sub sub-domain. 382 // Test and make sure we find domain cookies on the same domain 1846 std::string domain; member in struct:net::CookiesInputInfo [all...] |
cookie_monster.h | 44 // - Verify that our domain enforcement and non-dotted handling is correct 53 // * The 'top level domain' (TLD) of an internet domain name is 56 // * The 'effective top level domain' (eTLD) is the longest 57 // "." initiated terminal substring of an internet domain name 58 // that is controlled by a general domain registrar. 60 // * The 'effective top level domain plus one' (eTLD+1) is the 62 // domain name that is not controlled by a general domain 77 // (default), then the key is based on the effective domain of th [all...] |
cookie_monster.cc | 103 // The RFC says the sort order for the domain attribute is undefined. 129 // Two cookies are considered equivalent if they have the same domain, 133 CookieSignature(const std::string& name, const std::string& domain, 136 domain(domain), 144 // Name compare dominates, then domain, then path. 149 diff = domain.compare(cs.domain); 157 std::string domain; member in struct:net::__anon4330::CookieSignature 174 // Determine the actual cookie domain based on the domain string passe [all...] |
/external/chromium/chrome/browser/net/ |
sqlite_persistent_cookie_store_unittest.cc | 96 ASSERT_STREQ("http://foo.bar", cookies[0]->Domain().c_str());
|
sqlite_persistent_cookie_store.cc | 261 smt.ColumnString(1), // domain 489 add_smt.BindString(1, po->cc().Domain());
|
/external/ppp/pppd/plugins/radius/etc/ |
dictionary.microsoft | 21 ATTRIBUTE MS-CHAP-Domain 10 string Microsoft
|
/external/webkit/LayoutTests/dom/html/level2/html/ |
HTMLAreaElement02.js | 105 assertEquals("altLink","Domain",valt);
|
/external/webkit/LayoutTests/dom/xhtml/level2/html/ |
HTMLAreaElement02.js | 105 assertEquals("altLink","Domain",valt);
|
/external/llvm/lib/CodeGen/ |
ExecutionDepsFix.cpp | 19 // This pass changes the variant instructions to minimize domain crossings. 39 /// execution domain. Multiple registers may refer to the same open 41 /// domain. 47 /// domain, but if we were forced to pay the penalty of a domain crossing, we 72 // Is domain available? 73 bool hasDomain(unsigned domain) const { 74 return AvailableDomains & (1u << domain); 77 // Mark domain as available. 78 void addDomain(unsigned domain) { 567 unsigned domain = CountTrailingZeros_32(available); local [all...] |
/external/chromium/chrome/browser/tab_contents/ |
tab_specific_content_settings.cc | 120 cookie->Domain(),
|
/external/chromium/chrome/browser/ui/webui/ |
cookies_tree_model_util.cc | 26 static const char kKeyDomain[] = "domain"; 88 dict->SetString(kKeyDomain, cookie.Domain());
|
/external/jmdns/src/javax/jmdns/ |
ServiceInfo.java | 25 * <li><servicedomain>.<parentdomain>: This is the domain scope of the service typically "local.", but this can also be something similar to "in-addr.arpa." or "ip6.arpa."</li> 45 * Domain Field. 47 Domain, 382 * dictionary of values to build the fully qualified service name. Mandatory keys are Application and Instance. The Domain default is local, the Protocol default is tcp and the subtype default is none. 679 * Returns the domain of the service info suitable for printing. 681 * @return service domain
|
/external/chromium/chrome/browser/automation/ |
automation_util.cc | 218 cookie_dict->SetString("domain", cookie.Domain()); 276 std::string domain; local 289 if (cookie_dict->HasKey("domain") && 290 !cookie_dict->GetString("domain", &domain)) { 291 reply.SendError("optional 'domain' invalid"); 321 GURL(url), name, value, domain, path, base::Time(), 337 GURL(url), *cookie.get(), domain, context_getter, &event, &success);
|
/external/chromium/chrome/browser/ui/views/ |
cookie_info_view.cc | 59 const std::string& domain, 63 domain_value_field_->SetText(UTF8ToWide(domain)); 100 SetCookie(pc.HasDomain() ? pc.Domain() : url.host(), cookie);
|
/external/chromium/net/http/ |
http_auth_sspi_win.cc | 51 const string16& domain, 60 identity.Domain = 61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str())); 62 identity.DomainLength = domain.size(); 299 string16 domain; local 301 SplitDomainAndUser(*username, &domain, &user); 302 rv = AcquireExplicitCredentials(library_, security_package_, domain, 395 string16* domain, 397 // |combined| may be in the form "user" or "DOMAIN\user". 399 // TODO(cbentzel): I believe user@domain is also a valid form [all...] |
/external/llvm/lib/Target/X86/ |
X86InstrInfo.h | 355 void setExecutionDomain(MachineInstr *MI, unsigned Domain) const;
|