HomeSort by relevance Sort by last modified time
    Searched refs:domain (Results 626 - 650 of 908) sorted by null

<<21222324252627282930>>

  /packages/apps/UnifiedEmail/src/org/apache/james/mime4j/field/address/parser/
AddressListParser.java 380 domain(); method
405 domain(); method
478 domain(); method
563 final public void domain() throws ParseException { method in class:AddressListParser
564 /*@bgen(jjtree) domain */
593 {if (true) throw new ParseException("Atoms in domain names must be separated by '.'");}
  /packages/providers/DownloadProvider/ui/src/com/android/providers/downloads/ui/
DownloadAdapter.java 108 setTextForView(convertView, R.id.domain, mCursor.getString(mDescriptionColumnId));
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
tipc_config.h 244 __u32 domain;
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
tipc_config.h 244 __u32 domain;
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
tipc_config.h 244 __u32 domain;
  /external/wpa_supplicant_8/wpa_supplicant/
interworking.c 153 if (cred->domain || cred->pcsc || cred->imsi)
    [all...]
  /external/chromium_org/ash/system/user/
tray_user.cc 487 // Retrieve the domain managing the device and wrap it with markers.
488 base::string16 domain = UTF8ToUTF16( local
490 base::RemoveChars(domain, kDisplayNameMark, &domain);
491 base::i18n::WrapStringWithLTRFormatting(&domain);
492 // Retrieve the label text, inserting the display name and domain.
494 display_name, domain);
    [all...]
  /external/chromium_org/net/cookies/
cookie_monster_unittest.cc 153 const std::string& domain,
162 url, name, value, domain, path, expiration_time, secure, http_only,
244 // * Three levels of domain cookie (.b.a, .c.b.a, .d.c.b.a)
248 // * Two domain path cookies (.c.b.a/dir1, .c.b.a/dir1/dir2)
251 // Domain cookies
349 // Domain path cookies
402 const std::string& domain,
407 if (it->Domain() == domain && it->Name() == name)
482 // domain cookie eviction
680 const std::string domain; member in struct:net::__anon11687::CookiesInputInfo
2344 std::string domain = std::string(); local
    [all...]
  /bionic/libc/netbsd/nameser/
ns_name.c 95 * Convert an encoded domain name to printable ascii as per RFC1035.
196 * Convert a ascii string into an encoded domain name as per RFC1035.
202 * Enforces label and domain length limits.
334 * Enforces label and domain length limits.
383 * Unpack a domain name from a message, source may be compressed.
404 /* Fetch next label in domain name. */
463 * Pack domain name 'domain' into 'comp_dn'.
500 /* make sure the domain we are about to add is legal */
572 * Expand compressed domain name to presentation format
    [all...]
  /external/chromium/chrome/browser/chromeos/login/
user_manager.cc 223 std::string domain = user_email.substr(domain_start, local
227 domain.c_str());
  /external/chromium/net/base/
transport_security_state_unittest.cc 470 // The domain wasn't being set, leading to a blank string in the
472 EXPECT_EQ(domain_state.domain, "market.android.com");
476 EXPECT_EQ(domain_state.domain, "market.android.com");
  /external/chromium_org/chrome/browser/extensions/api/cookies/
cookies_api.cc 391 parsed_args_->details.domain.get() ? *parsed_args_->details.domain
  /external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/
enterprise_platform_keys_private_api_unittest.cc 91 const std::string& domain,
105 const std::string& domain,
  /external/chromium_org/content/browser/net/
sqlite_persistent_cookie_store_unittest.cc 158 const std::string& domain,
162 net::CanonicalCookie(GURL(), name, value, domain, path, creation,
204 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str());
229 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str());
247 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str());
261 // Test that priority load of cookies for a specfic domain key could be
302 // 2. "Init And Chain-Load First Domain"
312 cookies_loaded.insert((*it)->Domain().c_str());
325 cookies_loaded.insert((*it)->Domain().c_str());
380 ASSERT_STREQ("sessioncookie.com", cookies[0]->Domain().c_str())
    [all...]
  /external/chromium_org/net/http/
transport_security_state_unittest.cc 190 // The domain wasn't being set, leading to a blank string in the
193 EXPECT_EQ(domain_state.domain, "market.android.com");
196 EXPECT_EQ(domain_state.domain, "market.android.com");
241 // We do more extensive checks for the first domain.
  /external/chromium_org/third_party/devscripts/
licensecheck.pl.vanilla 523 if ($licensetext =~ /is in the public domain/i) {
524 $license = "Public domain $license";
  /external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/radeon/
radeon_dma.c 334 uint32_t domain; local
335 int ret = radeon_bo_is_busy(bo, &domain);
  /external/mesa3d/src/mesa/drivers/dri/radeon/
radeon_dma.c 334 uint32_t domain; local
335 int ret = radeon_bo_is_busy(bo, &domain);
  /frameworks/wilhelm/src/android/
MediaPlayer_to_android.cpp 109 if (XA_DOMAINTYPE_VIDEO == mp->mStreamInfo.mStreamInfoTable.itemAt(i).domain) {
116 streamInfo.domain = XA_DOMAINTYPE_VIDEO;
  /external/chromium/net/spdy/
spdy_session.h 99 // Check to see if this SPDY session can support an additional domain.
102 // session provides authentication for the domain.
104 bool VerifyDomainAuthentication(const std::string& domain);
430 // The domain this session is connected to.
  /external/chromium/net/tools/testserver/
xmppserver_test.py 146 self.assertEqual(self.jid.domain,
  /external/chromium/third_party/libjingle/source/talk/examples/call/
call_main.cc 229 DEFINE_string(pmuc, "groupchat.google.com", "The persistant muc domain.");
301 printf("Invalid JID. JIDs should be in the form user@domain\n");
315 xcs.set_host(jid.domain());
  /external/chromium/third_party/libjingle/source/talk/xmpp/
jid.cc 70 // Now take what is left as the domain
92 // If the domain is empty we have a non-valid jid and we should empty
255 // Hash the domain portion
257 const std::string &str = domain();
375 // Checks and normalizes the domain part of a JID.
382 // TODO: if the domain contains a ':', then we should parse it
383 // as an IPv6 address rather than giving an error about illegal domain.
397 // Checks and normalizes an IDNA domain.
425 // Checks and normalizes a domain label.
466 // Returns the appropriate mapping for an ASCII character in a domain label
    [all...]
  /external/chromium_org/chrome/browser/policy/cloud/
cloud_policy_browsertest.cc 267 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE {}
  /external/chromium_org/components/policy/core/common/
policy_bundle_unittest.cc 83 EXPECT_EQ(POLICY_DOMAIN_CHROME, it->first.domain);

Completed in 1540 milliseconds

<<21222324252627282930>>