/external/chromium/net/tools/testserver/ |
xmppserver_test.py | 146 self.assertEqual(self.jid.domain,
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
call_main.cc | 229 DEFINE_string(pmuc, "groupchat.google.com", "The persistant muc domain."); 301 printf("Invalid JID. JIDs should be in the form user@domain\n"); 315 xcs.set_host(jid.domain());
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
jid.cc | 70 // Now take what is left as the domain 92 // If the domain is empty we have a non-valid jid and we should empty 255 // Hash the domain portion 257 const std::string &str = domain(); 375 // Checks and normalizes the domain part of a JID. 382 // TODO: if the domain contains a ':', then we should parse it 383 // as an IPv6 address rather than giving an error about illegal domain. 397 // Checks and normalizes an IDNA domain. 425 // Checks and normalizes a domain label. 466 // Returns the appropriate mapping for an ASCII character in a domain label [all...] |
/external/chromium_org/chrome/browser/policy/ |
policy_bundle_unittest.cc | 84 EXPECT_EQ(POLICY_DOMAIN_CHROME, it->first.domain);
|
/external/chromium_org/chromeos/dbus/ |
cryptohome_client_stub.cc | 315 const std::string& domain,
|
/external/chromium_org/content/browser/renderer_host/pepper/ |
pepper_flash_file_message_filter.cc | 301 switch (pepper_path.domain()) {
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
DOMWindow.cpp | [all...] |
/external/chromium_org/third_party/devscripts/ |
licensecheck.pl | 570 if ($licensetext =~ /in the public domain/i) { 571 $license = "Public domain $license";
|
/external/chromium_org/third_party/re2/re2/testing/ |
re2_test.cc | 378 string domain; local 379 domain.resize(size); 382 domain[i] = pattern[i % patlen]; 386 RE2::FullMatch(domain, re); [all...] |
/external/dnsmasq/src/ |
network.c | 868 else if (strlen(new->domain) == 0) 871 s1 = _("domain"), s2 = new->domain; 1081 serv->domain = NULL; [all...] |
dnsmasq.h | 250 char *name; /* domain name */ 308 #define SERV_NO_ADDR 2 /* no server, this domain is local only */ 310 #define SERV_HAS_DOMAIN 8 /* server for one domain only */ 312 #define SERV_FOR_NODOTS 32 /* server for names with no domain part only */ 335 char *domain; /* set if this server only handles a domain. */ member in struct:server 447 char *hostname, *domain; member in struct:dhcp_config 535 char *domain; member in struct:cond_domain
|
/external/kernel-headers/original/asm-arm/ |
uaccess.h | 17 #include <asm/domain.h>
|
/external/qemu/ |
sockets.c | 1089 socket_getoption(int fd, int domain, int option, int defaut) 1099 ret = getsockopt(fd, domain, option, (char*)&opt, &optlen); 1138 socket_setoption(int fd, int domain, int option, int _flag) 1145 return setsockopt( fd, domain, option, (const char*)&flag, sizeof(flag) ); [all...] |
/external/regex-re2/re2/testing/ |
re2_test.cc | 371 string domain; local 372 domain.resize(size); 375 domain[i] = pattern[i % patlen]; 379 RE2::FullMatch(domain, re); [all...] |
/frameworks/base/libs/androidfw/ |
BackupHelpers.cpp | 492 int write_tarfile(const String8& packageName, const String8& domain, 501 // domain directories, so we should just skip it 510 if ((5 + packageName.length() + 1 + domain.length() >= 155) || (relpath.length() >= 100)) { 604 if (domain.length() > 0) { 605 prefix.appendPath(domain); [all...] |
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/ |
netdb.h | 412 /* Test whether NETGROUP contains the triple (HOST,USER,DOMAIN). 419 __const char *__user, __const char *domain);
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/ |
netdb.h | 412 /* Test whether NETGROUP contains the triple (HOST,USER,DOMAIN). 419 __const char *__user, __const char *domain);
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/ |
netdb.h | 412 /* Test whether NETGROUP contains the triple (HOST,USER,DOMAIN). 419 __const char *__user, __const char *domain);
|
/sdk/emulator/opengl/tests/event_injector/ |
sockets.c | 1093 socket_getoption(int fd, int domain, int option, int defaut) 1103 ret = getsockopt(fd, domain, option, (char*)&opt, &optlen); 1142 socket_setoption(int fd, int domain, int option, int _flag) 1149 return setsockopt( fd, domain, option, (const char*)&flag, sizeof(flag) ); [all...] |
/external/chromium/chrome/browser/resources/net_internals/ |
main.js | 326 BrowserBridge.prototype.sendHSTSQuery = function(domain) { 327 chrome.send('hstsQuery', [domain]); 330 BrowserBridge.prototype.sendHSTSAdd = function(domain, 333 chrome.send('hstsAdd', [domain, include_subdomains, pins]); 336 BrowserBridge.prototype.sendHSTSDelete = function(domain) { 337 chrome.send('hstsDelete', [domain]); [all...] |
/external/chromium/chrome/browser/safe_browsing/ |
safe_browsing_service.cc | 108 std::string domain; member in struct:SafeBrowsingService::WhiteListedEntry 346 // and domain. 352 entry.domain == 456 // Whitelist this domain and warning type for the given tab. 460 entry.domain = net::RegistryControlledDomainService::GetDomainAndRegistry( [all...] |
/external/chromium/chrome/browser/tabs/ |
tab_strip_model.cc | 1056 std::string domain = tab->tab_contents()->GetURL().host(); local [all...] |
/external/chromium_org/chrome/browser/google/ |
google_url_tracker_unittest.cc | 215 void MockSearchDomainCheckResponse(const std::string& domain); 321 const std::string& domain) { 328 fetcher->SetResponseString(domain); 550 // Old-style domain string. [all...] |
/external/chromium_org/chrome/browser/ui/tabs/ |
tab_strip_model.cc | 1034 std::string domain = GetWebContentsAt(index)->GetURL().host(); local [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/winsys/radeon/drm/ |
radeon_drm_bo.c | 817 enum radeon_bo_domain domain) 828 desc.base.usage = domain; 829 desc.initial_domains = domain;
|