/external/guava/guava/src/com/google/common/collect/ |
Range.java | 37 * (informally, "contiguous" or "unbroken") portion of a particular domain. 377 * given domain {@linkplain Range#contains contained} by this range. 392 * @throws IllegalArgumentException if neither this range nor the domain has a 397 public ContiguousSet<C> asSet(DiscreteDomain<C> domain) { 398 checkNotNull(domain); 403 Ranges.atLeast(domain.minValue())); 407 Ranges.atMost(domain.maxValue())); 416 lowerBound.leastValueAbove(domain), 417 upperBound.greatestValueBelow(domain)) > 0; 420 ? new EmptyContiguousSet<C>(domain) [all...] |
/external/guava/guava/src/com/google/common/net/ |
HostSpecifier.java | 30 * domain name. 33 * reasonably be used in a URI, the domain name case is further restricted to 34 * include only those domain names which end in a recognized public suffix; see 45 * Similarly, if you know that a given string represents a domain name, use 67 * <li>A domain name, like {@code google.com} 97 // It is not any kind of IP address; must be a domain name or invalid. 100 final InternetDomainName domain = InternetDomainName.from(host); local 102 if (domain.hasPublicSuffix()) { 103 return new HostSpecifier(domain.name()); 107 "Domain name does not have a recognized public suffix: " + host) [all...] |
/external/libexif/libexif/ |
exif-log.h | 77 typedef void (* ExifLogFunc) (ExifLog *log, ExifLogCode, const char *domain, 90 void exif_log (ExifLog *log, ExifLogCode, const char *domain, 106 void exif_logv (ExifLog *log, ExifLogCode, const char *domain,
|
/external/mesa3d/src/gallium/drivers/nouveau/ |
nouveau_buffer.h | 38 uint8_t domain; member in struct:nv04_resource 55 struct nv04_resource *, unsigned domain); 77 return nv04_resource(resource)->domain != 0;
|
/external/llvm/lib/CodeGen/ |
ExecutionDepsFix.cpp | 19 // This pass changes the variant instructions to minimize domain crossings. 39 /// execution domain. Multiple registers may refer to the same open 41 /// domain. 47 /// domain, but if we were forced to pay the penalty of a domain crossing, we 72 // Is domain available? 73 bool hasDomain(unsigned domain) const { 74 return AvailableDomains & (1u << domain); 77 // Mark domain as available. 78 void addDomain(unsigned domain) { 567 unsigned domain = countTrailingZeros(available); local [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
Database.js | 33 WebInspector.Database = function(model, id, domain, name, version) 37 this._domain = domain; 72 get domain() 77 set domain(x) 198 payload.domain,
|
/frameworks/ex/common/java/com/android/common/ |
Rfc822Validator.java | 30 * and has the specified domain name added. It is meant for use with 45 * that constraint by accepting any kind of top level domain, not just 55 * Constructs a new validator that uses the specified domain name as 58 public Rfc822Validator(String domain) { 59 mDomain = domain; 87 * or the domain name part of the email address have been removed. 135 // append the domain of the account if it exists 147 String domain = removeIllegalCharacters(text.substring(index + 1)); local 148 boolean emptyDomain = domain.length() == 0; 150 tokens[i].setAddress(fix + "@" + (!emptyDomain ? domain : mDomain)) [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
_MozillaCookieJar.py | 30 domain as set in the HTTP header started with a dot (yes, I'm aware some 70 domain, domain_specified, path, secure, expires, name, value = \ 81 initial_dot = domain.startswith(".") 92 domain, domain_specified, initial_dot, 129 if cookie.domain.startswith("."): initial_dot = "TRUE" 145 "\t".join([cookie.domain, initial_dot, cookie.path,
|
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
_MozillaCookieJar.py | 30 domain as set in the HTTP header started with a dot (yes, I'm aware some 70 domain, domain_specified, path, secure, expires, name, value = \ 81 initial_dot = domain.startswith(".") 92 domain, domain_specified, initial_dot, 129 if cookie.domain.startswith("."): initial_dot = "TRUE" 145 "\t".join([cookie.domain, initial_dot, cookie.path,
|
/external/chromium_org/chrome/browser/predictors/ |
logged_in_predictor_table.cc | 41 string LoggedInPredictorTable::GetKeyFromDomain(const std::string& domain) { 44 domain, 47 effective_domain = domain; 61 base::StringPrintf("INSERT OR IGNORE INTO %s (domain, time) VALUES (?,?)", 76 base::StringPrintf("DELETE FROM %s WHERE domain=?", kTableName).c_str())); 83 void LoggedInPredictorTable::DeleteDomain(const std::string& domain) { 84 DeleteDomainFromURL(GURL("http://" + domain)); 95 base::StringPrintf("SELECT count(*) FROM %s WHERE domain=?", 134 string domain = statement.ColumnString(0); local 136 (*state_map)[domain] = value [all...] |
/external/chromium_org/net/cert/ |
x509_util_openssl_unittest.cc | 42 // Verify the attributes of a domain-bound certificate. 43 // |domain| is the bound domain name. 45 void VerifyDomainBoundCert(const std::string& domain, 67 // Which means <tag> <length> <domain>, with: 69 // <length> is the domain length, a single byte for short forms. 70 // <domain> are the domain characters. 77 // Check that the domain size is small enough for short form. 78 ASSERT_LE(domain.size(), 127U) << "Domain is too long!" 117 std::string domain = "weborigin.com"; local [all...] |
x509_util_nss_unittest.cc | 79 void VerifyDomainBoundCert(const std::string& domain, 87 (unsigned char*)domain.data(), 88 static_cast<unsigned int>(domain.size()) 144 // This test creates a domain-bound cert and an EC private key and 148 std::string domain = "weborigin.com"; local 154 domain, 1, 160 VerifyDomainBoundCert(domain, der_cert);
|
/external/dhcpcd/dhcpcd-hooks/ |
20-resolv.conf | 27 domain=$(cd "$resolv_conf_dir"; \ 28 key_get_value "domain " ${interfaces}) 31 set -- ${domain} 32 unset domain 36 domain="domain $1\n" 58 printf "$domain$search$servers" >> "$cf" 84 conf="${conf}domain $new_domain_name\n" 85 # Support RFC violating search in domain
|
/external/mdnsresponder/mDNSShared/ |
PlatformCommon.c | 106 mDNSexport void ReadDDNSSettingsFromConfFile(mDNS *const m, const char *const filename, domainname *const hostname, domainname *const domain, mDNSBool *DomainDiscoveryDisabled) 113 if (domain) domain->c[0] = 0; 120 if (domain && GetConfigOption(buf, "zone", f) && !MakeDomainNameFromDNSNameString(domain, buf)) goto badf; 132 if (domain && domain->c[0] && buf[0]) 135 // for now we assume keyname = service reg domain and we use same key for service and hostname registration 136 err = mDNS_SetSecretForDomain(m, info, domain, domain, buf, NULL, 0, NULL) [all...] |
/packages/apps/Calendar/src/com/android/calendar/ |
GoogleCalendarUriIntentFilter.java | 62 * by a space, followed by the calendar email address. The domain is sometimes 87 String domain = null; local 89 // Drop the special one character domain 94 domain = "gmail.com"; 97 domain = "group.calendar.google.com"; 100 domain = "holiday.calendar.google.com"; 103 domain = "import.calendar.google.com"; 106 domain = "group.v.calendar.google.com"; 109 Log.wtf(TAG, "Unexpected one letter domain: " 113 domain = "%" [all...] |
/external/chromium/net/base/ |
sdch_manager.h | 181 const std::string& domain, 196 static bool CanSet(const std::string& domain, const std::string& path, 250 // domain. Function assumes the existence of a global SdchManager instance. 251 void EnableSdchSupport(const std::string& domain); 255 // Briefly prevent further advertising of SDCH on this domain (if SDCH is 259 // Used when filter errors are found from a given domain, but it is plausible 264 // Used when SEVERE filter errors are found from a given domain, to prevent 265 // further use of SDCH on that domain. 272 // Unit test only, this function resets the blacklisting count for a domain. 273 static void ClearDomainBlacklisting(const std::string& domain); [all...] |
dns_util.h | 15 // DNSDomainFromDot - convert a domain string to DNS format. From DJB's 16 // public domain DNS library. 22 // DNSDomainToString coverts a domain in DNS format to a dotted string. 23 std::string DNSDomainToString(const std::string& domain);
|
/external/chromium_org/content/browser/devtools/ |
devtools_browser_target.cc | 29 const std::string& domain, 32 DCHECK(handlers_.find(domain) == handlers_.end()); 33 handlers_[domain] = handler; 35 handle_on_ui_thread_.insert(domain); 53 DomainHandlerMap::iterator it = handlers_.find(command->domain()); 60 bool handle_directly = handle_on_ui_thread_.find(command->domain()) ==
|
/external/mdnsresponder/mDNSPosix/ |
Client.c | 46 domainname domain; local 57 DeconstructServiceName(&answer->rdata->u.name, &name, &type, &domain); 61 ConvertDomainNameToCString(&domain, domainC); 69 fprintf(stderr, "*** %s name = '%s', type = '%s', domain = '%s'\n", state, nameC, typeC, domainC); 105 "Usage: %s [-v level] [-t type] [-d domain]\n", 112 fprintf(stderr, " -d uses 'domain' as the domain to browse (default is '%s')\n", kDefaultDomain); 176 // mDNS query, looking for all AFP servers in the local domain. 182 domainname domain; local 197 MakeDomainNameFromDNSNameString(&domain, gServiceDomain) [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
account_creation_view.cc | 52 std::string domain; local 58 domain = UTF16ToASCII(form.fields[i].value); 65 delegate_->OnUserCreated(user_name + "@" + domain, "");
|
/external/chromium/chrome/browser/policy/ |
enterprise_install_attributes.cc | 82 std::string domain; 85 domain = registration_user_.substr(pos + 1); 87 return domain;
|
/external/apache-harmony/auth/src/test/java/common/org/apache/harmony/auth/tests/javax/security/auth/ |
SubjectDomainCombinerTest.java | 102 ProtectionDomain domain = new ProtectionDomain(source, permissions, local 105 pd = combiner.combine(new ProtectionDomain[] { domain }, null); 116 pd = combiner.combine(null, new ProtectionDomain[] { domain }); 117 assertSame("Inherited domain", domain, pd[0]);
|
/external/chromium_org/chrome/browser/android/bookmarks/ |
managed_bookmarks_shim.cc | 68 std::string domain; local 71 domain = gaia::ExtractDomainName(username); 73 if (domain.empty()) { 78 base::UTF8ToUTF16(domain));
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
device_local_account_policy_provider.h | 34 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|
login_profile_policy_provider.h | 35 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
|