HomeSort by relevance Sort by last modified time
    Searched refs:domain (Results 201 - 225 of 883) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/chromium_org/net/base/
sdch_manager.h 182 const std::string& domain,
197 static bool CanSet(const std::string& domain, const std::string& path,
254 // Briefly prevent further advertising of SDCH on this domain (if SDCH is
258 // Used when filter errors are found from a given domain, but it is plausible
263 // Used when SEVERE filter errors are found from a given domain, to prevent
264 // further use of SDCH on that domain.
271 // Unit test only, this function resets the blacklisting count for a domain.
272 static void ClearDomainBlacklisting(const std::string& domain);
274 // Unit test only: indicate how many more times a domain will be blacklisted.
275 static int BlackListDomainCount(const std::string& domain);
    [all...]
  /external/chromium_org/net/cookies/
cookie_util.cc 42 // If no domain was specified in the domain string, default to a host cookie.
43 // We match IE/Firefox in allowing a domain=IPADDR if it matches the url
52 // Get the normalized domain specified in cookie line.
60 // Ensure |url| and |cookie_domain| have the same domain+registry.
65 return false; // IP addresses/intranet hosts can't set domain cookies.
69 return false; // Can't set a cookie on a different domain + registry.
72 // we know the domain+registry are the same from the above checks, this is
203 GURL CookieOriginToURL(const std::string& domain, bool is_https) {
204 if (domain.empty()
    [all...]
  /external/chromium_org/rlz/win/lib/
process_info.cc 23 std::wstring* domain,
27 // Get the current username & domain the hard way. (GetUserNameEx would be
28 // nice, but unfortunately requires connectivity to a domain controller.
78 if (domain != NULL) {
79 *domain = domain_name;
158 static std::wstring domain; local
161 CHECK(SUCCEEDED(GetCurrentUser(&name, &domain, &sid)));
  /external/smack/src/com/kenai/jbosh/
BOSHClientConfig.java 38 * Target domain.
107 * @param domain target domain to communicate with
109 private Builder(final URI cmURI, final String domain) {
111 bDomain = domain;
119 * @param domain target domain to communicate with
122 public static Builder create(final URI cmURI, final String domain) {
127 if (domain == null) {
129 "Target domain must not be null"))
    [all...]
  /libcore/luni/src/main/java/java/net/
HttpCookie.java 37 * attributes: {@code Domain}, {@code Expires}, {@code Path}, and
71 RESERVED_NAMES.add("domain"); // Netscape RFC 2109 RFC 2965
81 * Returns true if {@code host} matches the domain pattern {@code domain}.
84 * localhost}), or a pattern to match subdomains of a domain name (like
109 * Not in the spec! If prefixing a hostname with "." causes it to equal the domain pattern,
123 * (So, x.y.com domain-matches .Y.com but not Y.com.)
177 * {@code android.com} and {@code co.uk} to be fully qualified domain names,
322 } else if (name.equals("domain") && cookie.domain == null)
    [all...]
  /external/chromium/net/http/
http_auth_sspi_win.cc 51 const string16& domain,
60 identity.Domain =
61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str()));
62 identity.DomainLength = domain.size();
299 string16 domain; local
301 SplitDomainAndUser(*username, &domain, &user);
302 rv = AcquireExplicitCredentials(library_, security_package_, domain,
395 string16* domain,
397 // |combined| may be in the form "user" or "DOMAIN\user".
399 // TODO(cbentzel): I believe user@domain is also a valid form
    [all...]
http_auth_handler_ntlm.cc 57 // |username| may be in the form "DOMAIN\user". Parse it into the two
59 string16 domain;
66 domain = username->substr(0, backslash_idx);
69 domain_ = domain;
  /external/chromium_org/chrome/browser/resources/history/
history.css 248 .site-domain-wrapper {
261 .site-domain-wrapper {
305 .entry .domain {
314 .site-results .domain {
339 html[dir='rtl'] .site-domain {
383 .site-domain-wrapper input[type=checkbox]:not(:checked),
388 .site-domain-wrapper:hover input[type='checkbox'],
389 .site-domain-wrapper input[type='checkbox']:focus,
395 .site-domain-wrapper input[type='checkbox']:focus,
483 .site-domain {
    [all...]
  /external/chromium_org/net/http/
http_auth_sspi_win.cc 51 const base::string16& domain,
60 identity.Domain =
61 reinterpret_cast<unsigned short*>(const_cast<wchar_t*>(domain.c_str()));
62 identity.DomainLength = domain.size();
298 base::string16 domain; local
300 SplitDomainAndUser(credentials->username(), &domain, &user);
301 rv = AcquireExplicitCredentials(library_, security_package_, domain,
394 base::string16* domain,
396 // |combined| may be in the form "user" or "DOMAIN\user".
398 // TODO(cbentzel): I believe user@domain is also a valid form
    [all...]
http_auth_handler_ntlm.cc 53 // The username may be in the form "DOMAIN\user". Parse it into the two
55 base::string16 domain;
63 domain = username.substr(0, backslash_idx);
66 domain_ = domain;
  /external/chromium/chrome/browser/ui/cocoa/content_settings/
cookie_details.h 148 - (NSString*)domain;
178 - (id)initWithDatabase:(const std::string&)domain
189 - (id)initWithLocalStorage:(const std::string&)domain
  /external/chromium_org/chrome/browser/policy/
configuration_policy_pref_store.cc 81 DCHECK_EQ(POLICY_DOMAIN_CHROME, ns.domain);
87 PolicyDomain domain) {
88 if (domain == POLICY_DOMAIN_CHROME) {
configuration_policy_pref_store.h 51 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
  /external/chromium_org/chrome/browser/ui/cocoa/content_settings/
cookie_details.h 150 - (NSString*)domain;
179 - (id)initWithDatabase:(const std::string&)domain
190 - (id)initWithLocalStorage:(const std::string&)domain
  /external/chromium_org/chrome/test/webdriver/commands/
cookie_commands.cc 59 std::string domain; local
60 if (cookie_dict_copy->GetString("domain", &domain)) {
62 base::SplitString(domain, ':', &split_domain);
65 kInvalidCookieDomain, "Cookie domain has too many colons"));
69 cookie_dict_copy->SetString("domain", split_domain[0]);
  /external/qemu/
osdep.c 149 int qemu_socket(int domain, int type, int protocol)
154 ret = socket(domain, type | SOCK_CLOEXEC, protocol);
159 ret = socket(domain, type, protocol);
  /external/chromium/chrome/browser/net/
url_fixer_upper.cc 184 // Checks |domain| to see if a valid TLD is already present. If not, appends
185 // |desired_tld| to the domain, and prepends "www." unless it's already present.
187 std::string* domain) {
188 if (desired_tld.empty() || domain->empty())
201 net::RegistryControlledDomainService::GetRegistryLength(*domain, false);
205 // Add the suffix at the end of the domain.
206 const size_t domain_length(domain->length());
209 if ((*domain)[domain_length - 1] != '.')
210 domain->push_back('.');
211 domain->append(desired_tld)
    [all...]
  /external/chromium_org/chrome/common/net/
url_fixer_upper.cc 182 // Checks |domain| to see if a valid TLD is already present. If not, appends
183 // |desired_tld| to the domain, and prepends "www." unless it's already present.
184 void AddDesiredTLD(const std::string& desired_tld, std::string* domain) {
185 if (desired_tld.empty() || domain->empty())
199 *domain,
205 // Add the suffix at the end of the domain.
206 const size_t domain_length(domain->length());
209 if ((*domain)[domain_length - 1] != '.')
210 domain->push_back('.');
211 domain->append(desired_tld)
    [all...]
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_impl.h 49 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
  /external/chromium_org/net/cert/
x509_util.h 34 // Domain, serial number and validity period are given as
42 const std::string& domain,
  /external/chromium_org/third_party/mesa/src/src/gallium/drivers/nouveau/
nouveau_buffer.c 25 struct nv04_resource *buf, unsigned domain)
32 if (domain == NOUVEAU_BO_VRAM) {
38 if (domain == NOUVEAU_BO_GART) {
44 if (domain != NOUVEAU_BO_GART) {
51 buf->domain = domain;
74 buf->domain = 0;
79 struct nv04_resource *buf, unsigned domain)
83 return nouveau_buffer_allocate(screen, buf, domain);
112 assert(buf->domain == NOUVEAU_BO_VRAM)
    [all...]
  /external/libxml2/
libxml.h 65 void __xmlIOErr(int domain, int code, const char *extra);
  /external/mesa3d/src/gallium/drivers/nouveau/
nouveau_buffer.c 25 struct nv04_resource *buf, unsigned domain)
32 if (domain == NOUVEAU_BO_VRAM) {
38 if (domain == NOUVEAU_BO_GART) {
44 if (domain != NOUVEAU_BO_GART) {
51 buf->domain = domain;
74 buf->domain = 0;
79 struct nv04_resource *buf, unsigned domain)
83 return nouveau_buffer_allocate(screen, buf, domain);
112 assert(buf->domain == NOUVEAU_BO_VRAM)
    [all...]
  /frameworks/base/services/java/com/android/server/
SystemBackupAgent.java 126 int type, String domain, String path, long mode, long mtime)
128 Slog.i(TAG, "Restoring file domain=" + domain + " path=" + path);
134 // Various domain+files we understand a priori
135 if (domain.equals(FullBackup.ROOT_TREE_TOKEN)) {
147 Slog.w(TAG, "Skipping unrecognized system file: [ " + domain + " : " + path + " ]");
  /external/chromium/net/tools/testserver/
xmppserver.py 161 def __init__(self, username, domain, resource=''):
163 self.domain = domain
167 jid_str = "%s@%s" % (self.username, self.domain)
173 return Jid(self.username, self.domain)
278 domain = stanza.getAttribute('to')
279 if domain:
280 self._domain = domain
292 # The domain may be omitted.
296 # username, _, domain = username_domain.partition('@'
    [all...]

Completed in 2076 milliseconds

1 2 3 4 5 6 7 891011>>