/external/javassist/src/main/javassist/ |
Loader.java | 140 private ProtectionDomain domain; field in class:Loader 188 domain = null; 208 * Sets the protection domain for the classes handled by this class 209 * loader. Without registering an appropriate protection domain, 214 domain = d; 378 if (domain == null) 381 return defineClass(name, classfile, 0, classfile.length, domain);
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
BasicClientCookie.java | 182 * Returns domain attribute of the cookie. 184 * @return the value of the domain attribute 193 * Sets the domain attribute. 195 * @param domain The value of the domain attribute 199 public void setDomain(String domain) { 200 if (domain != null) { 201 cookieDomain = domain.toLowerCase(Locale.ENGLISH); 334 buffer.append("[domain: "); 360 /** Domain attribute. * [all...] |
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
jid.h | 37 //! A Jid consists of three parts. The node, the domain and the resource. 39 //! node@domain/resource 42 //! a domain. A bare jid is defined to not have a resource and a full jid 76 const std::string & domain() const { return !data_ ? STR_EMPTY : data_->domain_name_; } function in class:buzz::Jid 126 Data(const std::string & node, const std::string &domain, const std::string & resource) : 128 domain_name_(domain),
|
/external/javassist/src/main/javassist/util/proxy/ |
FactoryHelper.java | 128 * This method uses a default protection domain for the class 142 * @param domain if it is null, a default domain is used. 145 public static Class toClass(ClassFile cf, ClassLoader loader, ProtectionDomain domain) 152 if (domain == null) { 160 new Integer(b.length), domain };
|
/external/jmdns/src/javax/jmdns/impl/ |
DNSIncoming.java | 32 // It is sending out target strings that don't follow the "domain name" format. 138 logger1.severe("bad domain name: possible circular name detected. Bad offset: 0x" + Integer.toHexString(index) + " at 0x" + Integer.toHexString(pos - 2)); 271 String domain = _messageInputStream.readName(); local 279 return DNSQuestion.newQuestion(domain, type, recordClass, unique); 283 String domain = _messageInputStream.readName(); local 286 logger.log(Level.SEVERE, "Could not find record type. domain: " + domain + "\n" + this.print(true)); 291 logger.log(Level.SEVERE, "Could not find record class. domain: " + domain + " type: " + type + "\n" + this.print(true)); 300 rec = new DNSRecord.IPv4Address(domain, recordClass, unique, ttl, _messageInputStream.readBytes(len)) [all...] |
/external/smack/src/org/xbill/DNS/spi/ |
DNSJavaNameService.java | 40 private static final String domainProperty = "sun.net.spi.nameservice.domain"; 50 * <b>sun.net.spi.nameservice.domain</b>, and 56 String domain = System.getProperty(domainProperty); local 75 if (domain != null) { 77 Lookup.setDefaultSearchPath(new String[] {domain});
|
/external/apache-http/src/org/apache/http/auth/ |
NTCredentials.java | 61 * @param usernamePassword the domain/username:password formed string 92 * @param userName The user name. This should not include the domain to authenticate with. 93 * For example: "user" is correct whereas "DOMAIN\\user" is not. 97 * @param domain The domain to authenticate within. 103 final String domain) { 108 this.principal = new NTUserPrincipal(domain, userName); 132 * @return String the domain these credentials are intended to authenticate with.
|
/external/chromium_org/chrome/browser/policy/ |
async_policy_loader.cc | 71 if (descriptor->domain() != POLICY_DOMAIN_CHROME) { 72 descriptor_map_[descriptor->domain()] = descriptor;
|
policy_bundle.cc | 20 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty()); 28 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty());
|
/external/chromium_org/chrome/utility/local_discovery/ |
service_discovery_message_handler.h | 60 void OnResolveLocalDomain(uint64 id, const std::string& domain, 70 void ResolveLocalDomain(uint64 id, const std::string& domain,
|
/external/chromium_org/net/cookies/ |
canonical_cookie.h | 33 const std::string& domain, 65 const std::string& domain, 76 const std::string& Domain() const { return domain_; } 94 // The RFC says that name must match (case-sensitive), domain must 96 // For the case insensitive domain compare, we rely on the domain 103 return (name_ == ecc.Name() && domain_ == ecc.Domain() 115 // Returns true if the cookie domain matches the given |host| as described in
|
/external/libsepol/include/sepol/policydb/ |
services.h | 164 * `domain', `type', `protocol', and `port'. 166 extern int sepol_port_sid(uint16_t domain, 185 * in bytes and `domain' is the communications domain or 188 extern int sepol_node_sid(uint16_t domain,
|
/external/ppp/pppd/plugins/ |
winbind.c | 251 const char *domain, 337 if (domain) { 338 char *b64_domain = base64_encode(domain); 339 fprintf(pipe_in, "NT-Domain:: %s\n", b64_domain); 525 char *domain; local 534 /* remove domain from "domain\username" */ 542 /* remove domain from "domain\username" */ 545 domain = domainname [all...] |
/external/chromium_org/sync/tools/testserver/ |
xmppserver.py | 160 def __init__(self, username, domain, resource=''): 162 self.domain = domain 166 jid_str = "%s@%s" % (self.username, self.domain) 172 return Jid(self.username, self.domain) 283 domain = stanza.getAttribute('to') 284 if domain: 285 self._domain = domain 297 # The domain may be omitted. 301 # username, _, domain = username_domain.partition('@' [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/external/mesa3d/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/device/samsung/manta/ |
BoardConfig.mk | 94 domain.te \
|
/external/chromium/chrome/browser/extensions/ |
extension_cookies_helpers.h | 58 // domain becomes the URL host. 104 // Returns true if the given cookie domain string matches the filter's 105 // domain. Any cookie domain which is equal to or is a subdomain of the 106 // filter's domain will be matched; leading '.' characters indicating 107 // host-only domains have no meaning in the match filter domain (for 108 // instance, a match filter domain of 'foo.bar.com' will be treated the same 109 // as '.foo.bar.com', and both will match cookies with domain values of 111 bool MatchesDomain(const std::string& domain);
|
/external/chromium/net/base/ |
transport_security_state.h | 31 // A DomainState is the information that we persist about a given domain. 47 // None means there is no HSTS for this domain. 69 std::string domain; // the domain which matched member in struct:net::TransportSecurityState::DomainState 135 // are SHA256(DNSForm(domain)) where DNSForm converts from dotted form
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater_impl_cros.h | 67 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
|
user_cloud_policy_manager_chromeos.h | 76 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|
/external/chromium_org/chrome/browser/extensions/api/cookies/ |
cookies_helpers.h | 75 // domain becomes the URL host. 110 // Returns true if the given cookie domain string matches the filter's 111 // domain. Any cookie domain which is equal to or is a subdomain of the 112 // filter's domain will be matched; leading '.' characters indicating 113 // host-only domains have no meaning in the match filter domain (for 114 // instance, a match filter domain of 'foo.bar.com' will be treated the same 115 // as '.foo.bar.com', and both will match cookies with domain values of 117 bool MatchesDomain(const std::string& domain);
|
/external/chromium_org/chrome/browser/policy/cloud/ |
cloud_policy_manager.h | 51 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|