/prebuilts/ndk/9/platforms/android-8/arch-arm/usr/include/asm/ |
uaccess.h | 18 #include <asm/domain.h>
|
/prebuilts/ndk/9/platforms/android-9/arch-arm/usr/include/asm/ |
uaccess.h | 18 #include <asm/domain.h>
|
/bionic/libc/netbsd/net/ |
getaddrinfo.c | 209 const char *name; /* domain name */ 2265 const char *cp, * const *domain; local [all...] |
/external/chromium/chrome/browser/ui/views/ |
cookie_info_view.cc | 59 const std::string& domain, 63 domain_value_field_->SetText(UTF8ToWide(domain)); 100 SetCookie(pc.HasDomain() ? pc.Domain() : url.host(), cookie);
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
xmppclient.cc | 115 // stream, and expects the domain certificate to be "gmail.com" as well. 117 // the jid's domain to be used. "foo@example.com" -> stream to="example.com" 375 XmppClient::Private::StartTls(const std::string & domain) { 377 socket_->StartTls(domain);
|
xmppengineimpl.cc | 445 XmppEngineImpl::StartTls(const std::string & domain) { 448 tls_server_domain_.empty() ? domain : tls_server_domain_);
|
/external/chromium_org/chrome/browser/extensions/ |
webstore_startup_installer_browsertest.cc | 78 GURL GenerateTestServerUrl(const std::string& domain, 84 replace_host.SetHostStr(domain);
|
/external/chromium_org/chrome/browser/policy/cloud/ |
component_cloud_policy_store_unittest.cc | 110 EXPECT_EQ(POLICY_DOMAIN_EXTENSIONS, ns.domain); 202 // Store policy for an unsupported domain. 211 ns.domain = POLICY_DOMAIN_EXTENSIONS;
|
/external/chromium_org/chromeos/cryptohome/ |
async_method_caller.cc | 182 const std::string& domain, 191 domain,
|
/external/chromium_org/net/http/ |
http_auth_handler_digest.cc | 61 static const char domain[] = "0123456789abcdef"; local 65 cnonce.push_back(domain[base::RandInt(0, 15)]); 173 // [domain="<list-of-URIs>"] 234 } else if (LowerCaseEqualsASCII(name, "domain")) {
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorDatabaseAgent.cpp | 196 void InspectorDatabaseAgent::didOpenDatabase(PassRefPtr<Database> database, const String& domain, const String& name, const String& version) 203 RefPtr<InspectorDatabaseResource> resource = InspectorDatabaseResource::create(database, domain, name, version);
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
AuditsPanel.js | 371 WebInspector.AuditRuleResult.resourceDomain = function(domain) 373 return domain || WebInspector.UIString("[empty domain]");
|
HAREntry.js | 197 domain: cookie.domain(),
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
xmppengineimpl.cc | 407 void XmppEngineImpl::StartTls(const std::string& domain) { 409 // As substitute for the real (login jid's) domain, we permit 414 tls_server_domain_.empty() ? domain : tls_server_domain_);
|
xmpplogintask.cc | 115 // The proper domain to verify against is the real underlying 116 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 117 // also allows matching against a proxy domain instead, if it is told 120 pctx_->InternalSendStart(pctx_->user_jid_.domain()); 181 // The proper domain to verify against is the real underlying 182 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 183 // also allows matching against a proxy domain instead, if it is told 186 pctx_->StartTls(pctx_->user_jid_.domain()); [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
nvc0_miptree.c | 308 mt->base.domain = NOUVEAU_BO_VRAM; 310 bo_flags = mt->base.domain | NOUVEAU_BO_NOSNOOP;
|
/external/lzma/Asm/x86/ |
7zCrcOpt.asm | 2 ; 2009-12-12 : Igor Pavlov : Public domain
|
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_miptree.c | 308 mt->base.domain = NOUVEAU_BO_VRAM; 310 bo_flags = mt->base.domain | NOUVEAU_BO_NOSNOOP;
|
/libcore/luni/src/main/java/libcore/io/ |
Os.java | 122 public FileDescriptor socket(int domain, int type, int protocol) throws ErrnoException; 123 public void socketpair(int domain, int type, int protocol, FileDescriptor fd1, FileDescriptor fd2) throws ErrnoException;
|
/external/chromium/chrome/browser/ |
cookies_tree_model.cc | 79 // We want to order by registry controlled domain, so we would get 89 // The canonicalized representation makes the registry controlled domain 92 // string comparison works to order hosts by registry controlled domain 104 // The host may be the registry controlled domain, in which case fail fast. 109 // Start operating to the left of the registry controlled domain, e.g. in 609 std::string domain = it->Domain(); local 610 if (domain.length() > 1 && domain[0] == '.') 611 domain = domain.substr(1) [all...] |
/external/chromium_org/chrome_frame/cfinstall/src/stub/ |
prompt.js | 33 * An optional URL to a resource in the same domain as the calling site that 50 * Specifies a resource in the same domain as the calling site that will be used 51 * to carry installation results across domain boundaries.
|
/external/chromium_org/content/browser/gpu/ |
gpu_data_manager_impl_private.cc | 502 // 1. If the specific domain is blocked, then unblock it. 505 // This is necessary even if the specific domain was blocked. 506 // Otherwise, if we call Are3DAPIsBlocked with the same domain right 508 // the recent GPU reset caused by that domain. 512 std::string domain = GetDomainFromURL(url); local 514 blocked_domains_.erase(domain); [all...] |
/external/chromium_org/ppapi/proxy/ |
ppapi_param_traits.cc | 591 WriteParam(m, static_cast<unsigned>(p.domain())); 599 unsigned domain; local 601 if (!ReadParam(m, iter, &domain) || !ReadParam(m, iter, &path)) 603 if (domain > ppapi::PepperFilePath::DOMAIN_MAX_VALID) 607 static_cast<ppapi::PepperFilePath::Domain>(domain), path); 615 LogParam(static_cast<unsigned>(p.domain()), l);
|
/external/chromium_org/remoting/webapp/ |
third_party_token_fetcher.js | 34 * domain, received from the directory server. 69 // Verify the host-supplied URL matches the domain's allowed URL patterns. 81 console.error('Token URL does not match the domain\'s allowed URL patterns.' +
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/ |
r300_texture.c | [all...] |