/external/chromium_org/chrome/browser/local_discovery/ |
service_discovery_client_mdns.cc | 37 const std::string& domain, 41 return host_client_->CreateLocalDomainResolver(domain, address_family,
|
service_discovery_client_mac.h | 33 const std::string& domain,
|
/external/chromium_org/chrome/utility/local_discovery/ |
service_discovery_message_handler.h | 66 void OnResolveLocalDomain(uint64 id, const std::string& domain, 76 void ResolveLocalDomain(uint64 id, const std::string& domain,
|
/external/chromium_org/components/policy/core/common/ |
policy_bundle.cc | 19 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty()); 27 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty());
|
policy_test_utils.h | 55 std::ostream& operator<<(std::ostream& os, policy::PolicyDomain domain);
|
/external/chromium_org/google_apis/gaia/ |
gaia_auth_util.cc | 34 std::string CanonicalizeDomain(const std::string& domain) { 35 // Canonicalization of domain names means lower-casing them. Make sure to 37 return StringToLowerASCII(domain); 43 // Apply a default domain if necessary. 58 // First canonicalize which will also verify we have proper domain part.
|
/external/chromium_org/net/cookies/ |
canonical_cookie.h | 33 const std::string& domain, 65 const std::string& domain, 76 const std::string& Domain() const { return domain_; } 94 // The RFC says that name must match (case-sensitive), domain must 96 // For the case insensitive domain compare, we rely on the domain 103 return (name_ == ecc.Name() && domain_ == ecc.Domain() 115 // Returns true if the cookie domain matches the given |host| as described in
|
/external/chromium_org/net/ssl/ |
server_bound_cert_service.h | 83 // Returns the domain to be used for |host|. The domain is the 84 // "registry controlled domain", or the "ETLD + 1" where one exists, or 94 // Fetches the domain bound cert for the specified host if one exists and 116 // Fetches the domain bound cert for the specified host if one exists. 128 // request arrives for the same domain, the GetDomainBoundCert request will 171 // Searches for an in-flight request for the same domain. If found, 175 const std::string& domain, 182 // Looks for the domain bound cert for |domain| in this service's store [all...] |
/external/libsepol/include/sepol/policydb/ |
services.h | 164 * `domain', `type', `protocol', and `port'. 166 extern int sepol_port_sid(uint16_t domain, 185 * in bytes and `domain' is the communications domain or 188 extern int sepol_node_sid(uint16_t domain,
|
/external/ppp/pppd/plugins/ |
winbind.c | 251 const char *domain, 337 if (domain) { 338 char *b64_domain = base64_encode(domain); 339 fprintf(pipe_in, "NT-Domain:: %s\n", b64_domain); 525 char *domain; local 534 /* remove domain from "domain\username" */ 542 /* remove domain from "domain\username" */ 545 domain = domainname [all...] |
/external/chromium_org/sync/tools/testserver/ |
xmppserver.py | 160 def __init__(self, username, domain, resource=''): 162 self.domain = domain 166 jid_str = "%s@%s" % (self.username, self.domain) 172 return Jid(self.username, self.domain) 283 domain = stanza.getAttribute('to') 284 if domain: 285 self._domain = domain 297 # The domain may be omitted. 301 # username, _, domain = username_domain.partition('@' [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/external/mesa3d/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/device/samsung/manta/ |
BoardConfig.mk | 94 domain.te \
|
/external/chromium/chrome/browser/extensions/ |
extension_cookies_helpers.h | 58 // domain becomes the URL host. 104 // Returns true if the given cookie domain string matches the filter's 105 // domain. Any cookie domain which is equal to or is a subdomain of the 106 // filter's domain will be matched; leading '.' characters indicating 107 // host-only domains have no meaning in the match filter domain (for 108 // instance, a match filter domain of 'foo.bar.com' will be treated the same 109 // as '.foo.bar.com', and both will match cookies with domain values of 111 bool MatchesDomain(const std::string& domain);
|
/external/chromium/net/base/ |
transport_security_state.h | 31 // A DomainState is the information that we persist about a given domain. 47 // None means there is no HSTS for this domain. 69 std::string domain; // the domain which matched member in struct:net::TransportSecurityState::DomainState 135 // are SHA256(DNSForm(domain)) where DNSForm converts from dotted form
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
network_configuration_updater.h | 56 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE;
|
/external/chromium_org/chrome/browser/extensions/api/cookies/ |
cookies_helpers.h | 75 // domain becomes the URL host. 110 // Returns true if the given cookie domain string matches the filter's 111 // domain. Any cookie domain which is equal to or is a subdomain of the 112 // filter's domain will be matched; leading '.' characters indicating 113 // host-only domains have no meaning in the match filter domain (for 114 // instance, a match filter domain of 'foo.bar.com' will be treated the same 115 // as '.foo.bar.com', and both will match cookies with domain values of 117 bool MatchesDomain(const std::string& domain);
|
/external/chromium_org/chrome/browser/extensions/api/storage/ |
managed_value_store_cache.h | 62 virtual void OnPolicyServiceInitialized(policy::PolicyDomain domain) OVERRIDE;
|
/external/chromium_org/chrome/browser/ui/views/ |
cookie_info_view.h | 36 void SetCookie(const std::string& domain,
|
/external/chromium_org/chrome/common/local_discovery/ |
service_discovery_client.h | 124 // Create a resolver for local domain, both ipv4 or ipv6. 126 const std::string& domain,
|
/external/chromium_org/chrome/renderer/safe_browsing/ |
phishing_dom_feature_extractor.h | 116 // Given a URL, checks whether the domain is different from the domain of 117 // the current frame's URL. If so, stores the domain in |domain| and returns 119 bool IsExternalDomain(const GURL& url, std::string* domain) const;
|
/external/chromium_org/components/policy/core/common/cloud/ |
cloud_policy_manager.h | 63 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|