/external/chromium_org/chrome/common/extensions/api/url_handlers/ |
url_handlers_parser.cc | 117 // TODO(sergeygs): Limit this to non-top-level domains.
|
/external/chromium_org/chrome/common/extensions/docs/templates/articles/ |
xhr.html | 69 A match pattern of "http://*/" allows HTTP access to all reachable domains.
|
/external/chromium_org/chrome/renderer/safe_browsing/ |
phishing_dom_feature_extractor.h | 8 // external domains linked to.
|
/external/chromium_org/components/autofill/content/browser/wallet/ |
wallet_signin_helper.cc | 43 // Cookies for parent domains will also be returned; we only want cookies with
|
/external/chromium_org/net/cert/ |
x509_certificate.cc | 560 // Do not allow wildcards for public/ICANN registry controlled domains - 563 // In addition, unknown top-level domains (such as 'intranet' domains or 567 // is not registry controlled, this ensures that all reference domains
|
/external/chromium_org/net/socket/ |
ssl_client_socket.h | 129 // connection to be shared between multiple domains, each of which need
|
/external/chromium_org/third_party/WebKit/Source/platform/ |
URLPatternMatcher.cpp | 76 // The pattern can be just '*', which means match all domains.
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r600/ |
r600.h | 89 unsigned domains; member in struct:r600_resource
|
/external/dnsmasq/dbus/ |
DBus-interface | 49 the domains for which the preceding server should be used.
|
/external/guava/guava/src/com/google/common/collect/ |
DiscreteDomain.java | 32 * type; it cannot represent partial domains such as "prime integers" or
|
/external/mdnsresponder/mDNSCore/ |
uDNS.h | 100 // uDNS_SetupSearchDomains by default adds search domains. It also can be called with one or
|
/external/mdnsresponder/mDNSPosix/ |
libnss_mdns.8 | 68 reverse lookups for non-link-local domains will not function correctly.
|
nss_mdns.conf.5 | 12 This file describes the domains that
|
/external/mesa3d/src/gallium/drivers/r600/ |
r600.h | 89 unsigned domains; member in struct:r600_resource
|
/external/sepolicy/ |
app.te | 158 # ptrace access to non-app domains.
|
domain.te | 1 # Rules for all domains.
|
/hardware/ti/omap3/omx/system/src/openmax_il/perf/tests/ |
PERF.awk | 11 # $5-$10 - domains (AD, VD, ID, AE, VE, IE)
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
xfrm.h | 38 /* Security Context Domains of Interpretation */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
xfrm.h | 38 /* Security Context Domains of Interpretation */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
xfrm.h | 38 /* Security Context Domains of Interpretation */
|
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
_MozillaCookieJar.py | 31 domains in Netscape files start with a dot and some don't -- trust me, you
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
_MozillaCookieJar.py | 31 domains in Netscape files start with a dot and some don't -- trust me, you
|
/packages/apps/Email/res/xml/ |
providers.xml | 47 that ends with the given domain. Domains should be unique within 90 point to essentially the same mail server. To alleviate this, domains may 92 domains without knowing the exact domain. 401 <!-- Yahoo! country-specific email domains --> 410 <!-- Note: Yahoo! Japan's ne.jp and co.jp domains do not yet support open IMAP -->
|
/external/chromium_org/net/base/registry_controlled_domains/ |
effective_tld_names.dat | 8 // ===BEGIN ICANN DOMAINS=== 825 // domains under aland.fi, we still keep it on the list until aland.fi is 892 // gg : http://www.channelisles.net/register-domains/ 901 // Although domains directly at second level are not possible at the moment, 1468 // je : http://www.channelisles.net/register-domains/ [all...] |
/bionic/libc/netbsd/resolv/ |
res_query.c | 276 * (dns servers, search domains) before 302 * keep trying higher domains in the search list
|