/external/chromium_org/net/base/ |
sdch_manager.h | 182 const std::string& domain, 197 static bool CanSet(const std::string& domain, const std::string& path, 254 // Briefly prevent further advertising of SDCH on this domain (if SDCH is 258 // Used when filter errors are found from a given domain, but it is plausible 263 // Used when SEVERE filter errors are found from a given domain, to prevent 264 // further use of SDCH on that domain. 271 // Unit test only, this function resets the blacklisting count for a domain. 272 static void ClearDomainBlacklisting(const std::string& domain); 274 // Unit test only: indicate how many more times a domain will be blacklisted. 275 static int BlackListDomainCount(const std::string& domain); [all...] |
/external/chromium_org/net/cookies/ |
cookie_util.cc | 42 // If no domain was specified in the domain string, default to a host cookie. 43 // We match IE/Firefox in allowing a domain=IPADDR if it matches the url 52 // Get the normalized domain specified in cookie line. 60 // Ensure |url| and |cookie_domain| have the same domain+registry. 65 return false; // IP addresses/intranet hosts can't set domain cookies. 69 return false; // Can't set a cookie on a different domain + registry. 72 // we know the domain+registry are the same from the above checks, this is 203 GURL CookieOriginToURL(const std::string& domain, bool is_https) { 204 if (domain.empty() [all...] |
/external/chromium_org/rlz/win/lib/ |
process_info.cc | 23 std::wstring* domain, 27 // Get the current username & domain the hard way. (GetUserNameEx would be 28 // nice, but unfortunately requires connectivity to a domain controller. 78 if (domain != NULL) { 79 *domain = domain_name; 158 static std::wstring domain; local 161 CHECK(SUCCEEDED(GetCurrentUser(&name, &domain, &sid)));
|
/external/smack/src/com/kenai/jbosh/ |
BOSHClientConfig.java | 38 * Target domain. 107 * @param domain target domain to communicate with 109 private Builder(final URI cmURI, final String domain) { 111 bDomain = domain; 119 * @param domain target domain to communicate with 122 public static Builder create(final URI cmURI, final String domain) { 127 if (domain == null) { 129 "Target domain must not be null")) [all...] |
/libcore/luni/src/main/java/java/net/ |
HttpCookie.java | 37 * attributes: {@code Domain}, {@code Expires}, {@code Path}, and 71 RESERVED_NAMES.add("domain"); // Netscape RFC 2109 RFC 2965 81 * Returns true if {@code host} matches the domain pattern {@code domain}. 84 * localhost}), or a pattern to match subdomains of a domain name (like 109 * Not in the spec! If prefixing a hostname with "." causes it to equal the domain pattern, 123 * (So, x.y.com domain-matches .Y.com but not Y.com.) 177 * {@code android.com} and {@code co.uk} to be fully qualified domain names, 322 } else if (name.equals("domain") && cookie.domain == null) [all...] |
/external/chromium/net/http/ |
http_auth_sspi_win.cc | 51 const string16& domain, 60 identity.Domain = 61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str())); 62 identity.DomainLength = domain.size(); 299 string16 domain; local 301 SplitDomainAndUser(*username, &domain, &user); 302 rv = AcquireExplicitCredentials(library_, security_package_, domain, 395 string16* domain, 397 // |combined| may be in the form "user" or "DOMAIN\user". 399 // TODO(cbentzel): I believe user@domain is also a valid form [all...] |
http_auth_handler_ntlm.cc | 57 // |username| may be in the form "DOMAIN\user". Parse it into the two 59 string16 domain; 66 domain = username->substr(0, backslash_idx); 69 domain_ = domain;
|
/external/chromium_org/chrome/browser/resources/history/ |
history.css | 248 .site-domain-wrapper { 261 .site-domain-wrapper { 305 .entry .domain { 314 .site-results .domain { 339 html[dir='rtl'] .site-domain { 383 .site-domain-wrapper input[type=checkbox]:not(:checked), 388 .site-domain-wrapper:hover input[type='checkbox'], 389 .site-domain-wrapper input[type='checkbox']:focus, 395 .site-domain-wrapper input[type='checkbox']:focus, 483 .site-domain { [all...] |
/external/chromium_org/net/http/ |
http_auth_sspi_win.cc | 51 const base::string16& domain, 60 identity.Domain = 61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str())); 62 identity.DomainLength = domain.size(); 298 base::string16 domain; local 300 SplitDomainAndUser(credentials->username(), &domain, &user); 301 rv = AcquireExplicitCredentials(library_, security_package_, domain, 394 base::string16* domain, 396 // |combined| may be in the form "user" or "DOMAIN\user". 398 // TODO(cbentzel): I believe user@domain is also a valid form [all...] |
http_auth_handler_ntlm.cc | 53 // The username may be in the form "DOMAIN\user". Parse it into the two 55 base::string16 domain; 63 domain = username.substr(0, backslash_idx); 66 domain_ = domain;
|
/external/chromium/chrome/browser/ui/cocoa/content_settings/ |
cookie_details.h | 148 - (NSString*)domain; 178 - (id)initWithDatabase:(const std::string&)domain 189 - (id)initWithLocalStorage:(const std::string&)domain
|
/external/chromium_org/chrome/browser/policy/ |
configuration_policy_pref_store.cc | 81 DCHECK_EQ(POLICY_DOMAIN_CHROME, ns.domain); 87 PolicyDomain domain) { 88 if (domain == POLICY_DOMAIN_CHROME) {
|
configuration_policy_pref_store.h | 51 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
|
/external/chromium_org/chrome/browser/ui/cocoa/content_settings/ |
cookie_details.h | 150 - (NSString*)domain; 179 - (id)initWithDatabase:(const std::string&)domain 190 - (id)initWithLocalStorage:(const std::string&)domain
|
/external/chromium_org/chrome/test/webdriver/commands/ |
cookie_commands.cc | 59 std::string domain; local 60 if (cookie_dict_copy->GetString("domain", &domain)) { 62 base::SplitString(domain, ':', &split_domain); 65 kInvalidCookieDomain, "Cookie domain has too many colons")); 69 cookie_dict_copy->SetString("domain", split_domain[0]);
|
/external/qemu/ |
osdep.c | 149 int qemu_socket(int domain, int type, int protocol) 154 ret = socket(domain, type | SOCK_CLOEXEC, protocol); 159 ret = socket(domain, type, protocol);
|
/external/chromium/chrome/browser/net/ |
url_fixer_upper.cc | 184 // Checks |domain| to see if a valid TLD is already present. If not, appends 185 // |desired_tld| to the domain, and prepends "www." unless it's already present. 187 std::string* domain) { 188 if (desired_tld.empty() || domain->empty()) 201 net::RegistryControlledDomainService::GetRegistryLength(*domain, false); 205 // Add the suffix at the end of the domain. 206 const size_t domain_length(domain->length()); 209 if ((*domain)[domain_length - 1] != '.') 210 domain->push_back('.'); 211 domain->append(desired_tld) [all...] |
/external/chromium_org/chrome/common/net/ |
url_fixer_upper.cc | 182 // Checks |domain| to see if a valid TLD is already present. If not, appends 183 // |desired_tld| to the domain, and prepends "www." unless it's already present. 184 void AddDesiredTLD(const std::string& desired_tld, std::string* domain) { 185 if (desired_tld.empty() || domain->empty()) 199 *domain, 205 // Add the suffix at the end of the domain. 206 const size_t domain_length(domain->length()); 209 if ((*domain)[domain_length - 1] != '.') 210 domain->push_back('.'); 211 domain->append(desired_tld) [all...] |
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater_impl.h | 49 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
|
/external/chromium_org/net/cert/ |
x509_util.h | 34 // Domain, serial number and validity period are given as 42 const std::string& domain,
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nouveau/ |
nouveau_buffer.c | 25 struct nv04_resource *buf, unsigned domain) 32 if (domain == NOUVEAU_BO_VRAM) { 38 if (domain == NOUVEAU_BO_GART) { 44 if (domain != NOUVEAU_BO_GART) { 51 buf->domain = domain; 74 buf->domain = 0; 79 struct nv04_resource *buf, unsigned domain) 83 return nouveau_buffer_allocate(screen, buf, domain); 112 assert(buf->domain == NOUVEAU_BO_VRAM) [all...] |
/external/libxml2/ |
libxml.h | 65 void __xmlIOErr(int domain, int code, const char *extra);
|
/external/mesa3d/src/gallium/drivers/nouveau/ |
nouveau_buffer.c | 25 struct nv04_resource *buf, unsigned domain) 32 if (domain == NOUVEAU_BO_VRAM) { 38 if (domain == NOUVEAU_BO_GART) { 44 if (domain != NOUVEAU_BO_GART) { 51 buf->domain = domain; 74 buf->domain = 0; 79 struct nv04_resource *buf, unsigned domain) 83 return nouveau_buffer_allocate(screen, buf, domain); 112 assert(buf->domain == NOUVEAU_BO_VRAM) [all...] |
/frameworks/base/services/java/com/android/server/ |
SystemBackupAgent.java | 126 int type, String domain, String path, long mode, long mtime) 128 Slog.i(TAG, "Restoring file domain=" + domain + " path=" + path); 134 // Various domain+files we understand a priori 135 if (domain.equals(FullBackup.ROOT_TREE_TOKEN)) { 147 Slog.w(TAG, "Skipping unrecognized system file: [ " + domain + " : " + path + " ]");
|
/external/chromium/net/tools/testserver/ |
xmppserver.py | 161 def __init__(self, username, domain, resource=''): 163 self.domain = domain 167 jid_str = "%s@%s" % (self.username, self.domain) 173 return Jid(self.username, self.domain) 278 domain = stanza.getAttribute('to') 279 if domain: 280 self._domain = domain 292 # The domain may be omitted. 296 # username, _, domain = username_domain.partition('@' [all...] |