HomeSort by relevance Sort by last modified time
    Searched refs:domain (Results 251 - 275 of 883) sorted by null

<<11121314151617181920>>

  /external/javassist/src/main/javassist/
Loader.java 140 private ProtectionDomain domain; field in class:Loader
188 domain = null;
208 * Sets the protection domain for the classes handled by this class
209 * loader. Without registering an appropriate protection domain,
214 domain = d;
378 if (domain == null)
381 return defineClass(name, classfile, 0, classfile.length, domain);
  /external/apache-http/src/org/apache/http/impl/cookie/
BasicClientCookie.java 182 * Returns domain attribute of the cookie.
184 * @return the value of the domain attribute
193 * Sets the domain attribute.
195 * @param domain The value of the domain attribute
199 public void setDomain(String domain) {
200 if (domain != null) {
201 cookieDomain = domain.toLowerCase(Locale.ENGLISH);
334 buffer.append("[domain: ");
360 /** Domain attribute. *
    [all...]
  /external/chromium/third_party/libjingle/source/talk/xmpp/
jid.h 37 //! A Jid consists of three parts. The node, the domain and the resource.
39 //! node@domain/resource
42 //! a domain. A bare jid is defined to not have a resource and a full jid
76 const std::string & domain() const { return !data_ ? STR_EMPTY : data_->domain_name_; } function in class:buzz::Jid
126 Data(const std::string & node, const std::string &domain, const std::string & resource) :
128 domain_name_(domain),
  /external/javassist/src/main/javassist/util/proxy/
FactoryHelper.java 128 * This method uses a default protection domain for the class
142 * @param domain if it is null, a default domain is used.
145 public static Class toClass(ClassFile cf, ClassLoader loader, ProtectionDomain domain)
152 if (domain == null) {
160 new Integer(b.length), domain };
  /external/jmdns/src/javax/jmdns/impl/
DNSIncoming.java 32 // It is sending out target strings that don't follow the "domain name" format.
138 logger1.severe("bad domain name: possible circular name detected. Bad offset: 0x" + Integer.toHexString(index) + " at 0x" + Integer.toHexString(pos - 2));
271 String domain = _messageInputStream.readName(); local
279 return DNSQuestion.newQuestion(domain, type, recordClass, unique);
283 String domain = _messageInputStream.readName(); local
286 logger.log(Level.SEVERE, "Could not find record type. domain: " + domain + "\n" + this.print(true));
291 logger.log(Level.SEVERE, "Could not find record class. domain: " + domain + " type: " + type + "\n" + this.print(true));
300 rec = new DNSRecord.IPv4Address(domain, recordClass, unique, ttl, _messageInputStream.readBytes(len))
    [all...]
  /external/smack/src/org/xbill/DNS/spi/
DNSJavaNameService.java 40 private static final String domainProperty = "sun.net.spi.nameservice.domain";
50 * <b>sun.net.spi.nameservice.domain</b>, and
56 String domain = System.getProperty(domainProperty); local
75 if (domain != null) {
77 Lookup.setDefaultSearchPath(new String[] {domain});
  /external/apache-http/src/org/apache/http/auth/
NTCredentials.java 61 * @param usernamePassword the domain/username:password formed string
92 * @param userName The user name. This should not include the domain to authenticate with.
93 * For example: "user" is correct whereas "DOMAIN\\user" is not.
97 * @param domain The domain to authenticate within.
103 final String domain) {
108 this.principal = new NTUserPrincipal(domain, userName);
132 * @return String the domain these credentials are intended to authenticate with.
  /external/chromium_org/chrome/browser/policy/
async_policy_loader.cc 71 if (descriptor->domain() != POLICY_DOMAIN_CHROME) {
72 descriptor_map_[descriptor->domain()] = descriptor;
policy_bundle.cc 20 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty());
28 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty());
  /external/chromium_org/chrome/utility/local_discovery/
service_discovery_message_handler.h 60 void OnResolveLocalDomain(uint64 id, const std::string& domain,
70 void ResolveLocalDomain(uint64 id, const std::string& domain,
  /external/chromium_org/net/cookies/
canonical_cookie.h 33 const std::string& domain,
65 const std::string& domain,
76 const std::string& Domain() const { return domain_; }
94 // The RFC says that name must match (case-sensitive), domain must
96 // For the case insensitive domain compare, we rely on the domain
103 return (name_ == ecc.Name() && domain_ == ecc.Domain()
115 // Returns true if the cookie domain matches the given |host| as described in
  /external/libsepol/include/sepol/policydb/
services.h 164 * `domain', `type', `protocol', and `port'.
166 extern int sepol_port_sid(uint16_t domain,
185 * in bytes and `domain' is the communications domain or
188 extern int sepol_node_sid(uint16_t domain,
  /external/ppp/pppd/plugins/
winbind.c 251 const char *domain,
337 if (domain) {
338 char *b64_domain = base64_encode(domain);
339 fprintf(pipe_in, "NT-Domain:: %s\n", b64_domain);
525 char *domain; local
534 /* remove domain from "domain\username" */
542 /* remove domain from "domain\username" */
545 domain = domainname
    [all...]
  /external/chromium_org/sync/tools/testserver/
xmppserver.py 160 def __init__(self, username, domain, resource=''):
162 self.domain = domain
166 jid_str = "%s@%s" % (self.username, self.domain)
172 return Jid(self.username, self.domain)
283 domain = stanza.getAttribute('to')
284 if domain:
285 self._domain = domain
297 # The domain may be omitted.
301 # username, _, domain = username_domain.partition('@'
    [all...]
  /external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/
nvc0_transfer.c 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD);
35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR);
126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR);
127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD);
178 struct nouveau_bo *dst, unsigned offset, unsigned domain,
186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR);
223 struct nouveau_bo *dst, unsigned offset, unsigned domain,
231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR);
384 tx->rect[1].domain = NOUVEAU_BO_GART;
465 struct nouveau_bo *bo, unsigned domain,
    [all...]
  /external/mesa3d/src/gallium/drivers/nvc0/
nvc0_transfer.c 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD);
35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR);
126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR);
127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD);
178 struct nouveau_bo *dst, unsigned offset, unsigned domain,
186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR);
223 struct nouveau_bo *dst, unsigned offset, unsigned domain,
231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR);
384 tx->rect[1].domain = NOUVEAU_BO_GART;
465 struct nouveau_bo *bo, unsigned domain,
    [all...]
  /external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/tgsi/
tgsi_ureg.c 173 struct ureg_tokens domain[2]; member in struct:ureg_program
212 tokens_error(&ureg->domain[0]);
218 unsigned domain,
221 struct ureg_tokens *tokens = &ureg->domain[domain];
234 unsigned domain,
237 if (ureg->domain[domain].tokens == error_tokens)
240 return &ureg->domain[domain].tokens[nr]
    [all...]
  /external/mesa3d/src/gallium/auxiliary/tgsi/
tgsi_ureg.c 173 struct ureg_tokens domain[2]; member in struct:ureg_program
212 tokens_error(&ureg->domain[0]);
218 unsigned domain,
221 struct ureg_tokens *tokens = &ureg->domain[domain];
234 unsigned domain,
237 if (ureg->domain[domain].tokens == error_tokens)
240 return &ureg->domain[domain].tokens[nr]
    [all...]
  /device/samsung/manta/
BoardConfig.mk 94 domain.te \
  /external/chromium/chrome/browser/extensions/
extension_cookies_helpers.h 58 // domain becomes the URL host.
104 // Returns true if the given cookie domain string matches the filter's
105 // domain. Any cookie domain which is equal to or is a subdomain of the
106 // filter's domain will be matched; leading '.' characters indicating
107 // host-only domains have no meaning in the match filter domain (for
108 // instance, a match filter domain of 'foo.bar.com' will be treated the same
109 // as '.foo.bar.com', and both will match cookies with domain values of
111 bool MatchesDomain(const std::string& domain);
  /external/chromium/net/base/
transport_security_state.h 31 // A DomainState is the information that we persist about a given domain.
47 // None means there is no HSTS for this domain.
69 std::string domain; // the domain which matched member in struct:net::TransportSecurityState::DomainState
135 // are SHA256(DNSForm(domain)) where DNSForm converts from dotted form
  /external/chromium_org/chrome/browser/chromeos/policy/
network_configuration_updater_impl_cros.h 67 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
user_cloud_policy_manager_chromeos.h 76 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
  /external/chromium_org/chrome/browser/extensions/api/cookies/
cookies_helpers.h 75 // domain becomes the URL host.
110 // Returns true if the given cookie domain string matches the filter's
111 // domain. Any cookie domain which is equal to or is a subdomain of the
112 // filter's domain will be matched; leading '.' characters indicating
113 // host-only domains have no meaning in the match filter domain (for
114 // instance, a match filter domain of 'foo.bar.com' will be treated the same
115 // as '.foo.bar.com', and both will match cookies with domain values of
117 bool MatchesDomain(const std::string& domain);
  /external/chromium_org/chrome/browser/policy/cloud/
cloud_policy_manager.h 51 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;

Completed in 1645 milliseconds

<<11121314151617181920>>