/external/chromium_org/chrome/browser/browsing_data/ |
cookies_tree_model.cc | 56 // We want to order by registry controlled domain, so we would get 66 // The canonicalized representation makes the registry controlled domain 69 // string comparison works to order hosts by registry controlled domain 88 // The host may be the registry controlled domain, in which case fail fast. 93 // Start operating to the left of the registry controlled domain, e.g. in 665 const std::string& domain) { 666 DCHECK_EQ(GetHost(), domain); local 669 flash_lso_child_ = new CookieTreeFlashLSONode(domain); 816 const std::string& domain) 817 : domain_(domain) {} 1080 std::string domain = it->Domain(); local [all...] |
/external/chromium_org/third_party/skia/src/pdf/ |
SkPDFShader.cpp | 454 SkPDFStream* makePSFunction(const SkString& psCode, SkPDFArray* domain); 606 // populate domain. 787 SkAutoTUnref<SkPDFArray> domain(new SkPDFArray); 788 domain->reserve(4); 789 domain->appendScalar(bbox.fLeft); 790 domain->appendScalar(bbox.fRight); 791 domain->appendScalar(bbox.fTop); 792 domain->appendScalar(bbox.fBottom); 817 pdfShader->insert("Domain", domain.get()) [all...] |
/external/skia/src/pdf/ |
SkPDFShader.cpp | 519 SkPDFStream* makePSFunction(const SkString& psCode, SkPDFArray* domain); 671 // populate domain. 905 SkAutoTUnref<SkPDFArray> domain(new SkPDFArray); 906 domain->reserve(4); 907 domain->appendScalar(bbox.fLeft); 908 domain->appendScalar(bbox.fRight); 909 domain->appendScalar(bbox.fTop); 910 domain->appendScalar(bbox.fBottom); [all...] |
/external/mdnsresponder/mDNSShared/ |
uds_daemon.c | 118 domainname domain; member in struct:service_instance 122 // for multi-domain default browsing 126 domainname domain; member in struct:browser_t 396 // Generates a response message giving name, type, domain, plus interface index, 550 mDNSlocal int build_domainname_from_strings(domainname *srv, char *name, char *regtype, char *domain) 557 if (!MakeDomainNameFromDNSNameString(&d, domain)) return -1; 565 // On a freshly-created Unix Domain Socket, the kernel should *never* fail to buffer a small write for us 806 if (instance->request->u.servicereg.InterfaceID == mDNSInterface_P2P || (!instance->request->u.servicereg.InterfaceID && SameDomainName(&instance->domain, &localdomain) && (instance->request->flags & kDNSServiceFlagsIncludeP2P))) 1593 char domain[MAX_ESCAPED_DOMAIN_NAME], host[MAX_ESCAPED_DOMAIN_NAME]; local 2149 char regtype[MAX_ESCAPED_DOMAIN_NAME], domain[MAX_ESCAPED_DOMAIN_NAME]; local 2290 char name[256], regtype[MAX_ESCAPED_DOMAIN_NAME], domain[MAX_ESCAPED_DOMAIN_NAME]; local 3091 char domain[MAX_ESCAPED_DOMAIN_NAME]; local 3197 domainname domain; local [all...] |
/bionic/libc/netbsd/resolv/ |
res_data.c | 170 const char *dname, /* domain name */ 200 res_query(const char *name, /* domain name */ 269 res_search(const char *name, /* domain name */ 284 const char *domain, 294 return (res_nquerydomain(&_nres, name, domain,
|
/external/chromium/chrome/browser/extensions/ |
extension_cookies_helpers.cc | 55 result->SetString(keys::kDomainKey, cookie.Domain()); 57 net::CookieMonster::DomainIsHostOnly(cookie.Domain())); 94 const std::string& domain_key = cookie.Domain(); 110 // Ignore any cookie whose domain doesn't match the extension's 141 MatchesDomain(cookie.Domain()) && 163 bool MatchFilter::MatchesDomain(const std::string& domain) { 170 // Add a leading '.' character to the filter domain if it doesn't exist. 174 std::string sub_domain(domain); 175 // Strip any leading '.' character from the input cookie domain. 179 // Now check whether the domain argument is a subdomain of the filter domain [all...] |
/external/chromium/net/http/ |
http_auth_handler_digest.cc | 60 static const char domain[] = "0123456789abcdef"; local 64 cnonce.push_back(domain[base::RandInt(0, 15)]); 177 // [domain="<list-of-URIs>"] 234 } else if (LowerCaseEqualsASCII(name, "domain")) {
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
xmpplogintask.cc | 114 // The proper domain to verify against is the real underlying 115 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 116 // also allows matching against a proxy domain instead, if it is told 119 pctx_->InternalSendStart(pctx_->user_jid_.domain()); 174 // The proper domain to verify against is the real underlying 175 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 176 // also allows matching against a proxy domain instead, if it is told 179 pctx_->StartTls(pctx_->user_jid_.domain()); [all...] |
/external/chromium_org/chrome/browser/policy/ |
config_dir_policy_loader.cc | 180 // for that domain/component namespace. 188 // Helper to lookup a domain given its string name. 195 LOG(WARNING) << "Unsupported 3rd party policy domain: " 207 PolicyDomain domain = supported_domains[domains_it.key()]; local 219 bundle->Get(PolicyNamespace(domain, components_it.key()))
|
/external/chromium_org/chrome/browser/resources/local_discovery/ |
local_discovery.js | 24 params[0] = info.domain;
|
/external/chromium_org/chrome/browser/ui/views/ |
cookie_info_view.cc | 64 void CookieInfoView::SetCookie(const std::string& domain, 68 domain_value_field_->SetText(UTF8ToUTF16(domain)); 89 SetCookie(pc.HasDomain() ? pc.Domain() : url.host(), cookie);
|
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
kernel_wrap.h | 121 int socket(int domain, int type, int protocol); 122 int socketpair(int domain, int type, int protocl, int* sv);
|
/external/chromium_org/third_party/mesa/src/docs/OLD/ |
MESA_trace.spec | 49 The extension spec is in the public domain. The current implementation
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nv50/ |
nv50_context.h | 248 struct nouveau_bo *dst, unsigned offset, unsigned domain, 257 struct nouveau_bo *bo, unsigned domain,
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/radeon/ |
radeon_queryobj.c | 168 uint32_t domain; local 175 if (radeon_bo_is_busy(query->bo, &domain) == 0) {
|
/external/chromium_org/third_party/skia/src/gpu/ |
GrResourceCache.h | 31 static GrCacheID::Domain ScratchDomain() { 32 static const GrCacheID::Domain gDomain = GrCacheID::GenerateDomain(); 70 *reinterpret_cast<const GrCacheID::Domain*>(fKey.fHashedKey.getData() + 105 kResourceTypeOffset = kCacheIDDomainOffset + sizeof(GrCacheID::Domain), 112 void init(const GrCacheID::Domain domain, 123 memcpy(k + kCacheIDDomainOffset, &domain, sizeof(GrCacheID::Domain));
|
/external/chromium_org/ui/base/text/ |
text_elider.cc | 124 // Takes a prefix (Domain, or Domain+subdomain) and a collection of path 155 // Split the email into its local-part (username) and domain-part. The email 158 // symbol in the domain part of the email however so splitting at the last @ 163 string16 domain = email.substr(split_index + 1); local 165 DCHECK(!domain.empty()); 171 // Check whether eliding the domain is necessary: if eliding the username 172 // is sufficient, the domain will not be elided. 178 if (font.GetStringWidth(domain) > available_domain_width) { 179 // Elide the domain so that it only takes half of the available width [all...] |
/external/eclipse-basebuilder/basebuilder-3.6.2/org.eclipse.releng.basebuilder/plugins/ |
org.eclipse.equinox.launcher.jar | |
org.eclipse.equinox.launcher_1.1.0.v20100507.jar | |
/external/jmdns/src/javax/jmdns/impl/ |
DNSEntry.java | 48 String domain = _qualifiedNameMap.get(Fields.Domain); local 52 _type = (application.length() > 0 ? "_" + application + "." : "") + (protocol.length() > 0 ? "_" + protocol + "." : "") + domain + "."; 155 // b._dns-sd._udp.<domain>. 156 // db._dns-sd._udp.<domain>. 157 // r._dns-sd._udp.<domain>. 158 // dr._dns-sd._udp.<domain>. 159 // lb._dns-sd._udp.<domain>. 173 return _qualifiedNameMap.get(Fields.Domain).endsWith("in-addr.arpa"); 177 return _qualifiedNameMap.get(Fields.Domain).endsWith("ip6.arpa") [all...] |
/external/libsepol/tests/policies/test-expander/ |
small-base.conf | 420 attribute domain; 473 type user_t, domain; 477 type sysadm_t, domain, system; 481 type system_t, domain, system, foo;
|
/external/lzma/Asm/x86/ |
7zAsm.asm | 2 ; 2009-12-12 : Igor Pavlov : Public domain
|
/external/mesa3d/docs/OLD/ |
MESA_trace.spec | 49 The extension spec is in the public domain. The current implementation
|
/external/mesa3d/src/gallium/drivers/nv50/ |
nv50_context.h | 248 struct nouveau_bo *dst, unsigned offset, unsigned domain, 257 struct nouveau_bo *bo, unsigned domain,
|
/external/mesa3d/src/mesa/drivers/dri/radeon/ |
radeon_queryobj.c | 168 uint32_t domain; local 175 if (radeon_bo_is_busy(query->bo, &domain) == 0) {
|