/external/chromium_org/ui/gfx/ |
text_elider_unittest.cc | 161 {"https://subdomain.foo.com/bar/filename.html", 162 "subdomain.foo.com/bar/filename.html"}, 163 {"https://subdomain.foo.com/bar/filename.html", 164 "subdomain.foo.com/" + kEllipsisStr + "/filename.html"}, 165 {"http://subdomain.foo.com/bar/filename.html", [all...] |
text_elider.h | 47 // which composed of parts from subdomain, domain, path, filename and query.
|
/external/chromium/net/base/ |
registry_controlled_domain.cc | 254 // match, but wildcards take precedence when there's a subdomain.
|
registry_controlled_domain.h | 68 * Each rule should list the entire TLD-like domain name, with any subdomain
|
/external/chromium_org/net/base/registry_controlled_domains/ |
registry_controlled_domain.cc | 123 // match, but wildcards take precedence when there's a subdomain.
|
registry_controlled_domain.h | 71 * Each rule should list the entire TLD-like domain name, with any subdomain
|
/external/smack/src/org/jivesoftware/smack/ |
ServerTrustManager.java | 166 // Check if the requested subdomain matches the certified domain
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
audit.h | 131 #define AUDIT_SD 1500 /* AppArmor (SubDomain) audit */
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
audit.h | 131 #define AUDIT_SD 1500 /* AppArmor (SubDomain) audit */
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
audit.h | 131 #define AUDIT_SD 1500 /* AppArmor (SubDomain) audit */
|
/external/chromium_org/chrome/browser/google/ |
google_util_unittest.cc | 79 // If specified, only the "www" subdomain is OK. 245 // Test subdomain checks.
|
google_url_tracker_unittest.cc | 560 // Bad subdomain. [all...] |
/external/chromium_org/chrome/common/ |
content_settings_pattern.cc | 34 // subdomain of "host.com". 37 // The empty string serves as wildcard. Each domain is a subdomain of the
|
content_settings_pattern_unittest.cc | 293 // Subdomain wildcards should be only valid for hosts, not for IP addresses.
|
/external/chromium_org/net/http/ |
transport_security_state.cc | 179 // Succeed if we matched the domain exactly or if subdomain matches are 807 // Succeed if we matched the domain exactly or if subdomain matches are
|
/external/guava/guava/src/com/google/common/net/ |
InternetDomainName.java | 394 * Indicates whether this domain name is composed of exactly one subdomain 469 * "higher" (rightward) in the subdomain list. The number of levels must be
|
/external/chromium/chrome/browser/extensions/ |
crx_installer.cc | 270 // host (or a subdomain of the host) the download happened from. There's
|
/external/chromium_org/chrome/browser/managed_mode/ |
managed_mode_url_filter_unittest.cc | 139 EXPECT_FALSE(IsURLWhitelisted("http://subdomain.example.com"));
|
/external/chromium_org/extensions/common/ |
url_pattern_unittest.cc | 165 // subdomain matching with ip addresses 175 // Subdomain matching is never done if the argument has an IP address host.
|
/external/chromium_org/chrome/browser/extensions/ |
crx_installer.cc | 398 // host (or a subdomain of the host) the download happened from. There's
|
/external/chromium_org/net/cookies/ |
cookie_store_unittest.h | 386 // Make sure the cookie code hasn't gotten its subdomain string handling 495 { // Should not be able to set host cookie from a subdomain. [all...] |
/external/mdnsresponder/mDNSShared/ |
dns_sd.h | 540 * A bare unescaped '.' is a label separator, marking a boundary between domain and subdomain. 571 * in subdomain "4th. Floor" of subdomain "Building 2" of domain "apple.com." [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/provider/ |
PKIXNameConstraintValidator.java | 671 // must have at least one subdomain [all...] |
/external/chromium/net/data/proxy_resolver_perftest/ |
no-ads.pac | 647 // // or any subdomain "ads" [all...] |
/external/chromium_org/net/data/proxy_resolver_perftest/ |
no-ads.pac | 647 // // or any subdomain "ads" [all...] |