/packages/apps/UnifiedEmail/src/org/apache/james/mime4j/field/address/parser/ |
AddressListParser.java | 380 domain(); method 405 domain(); method 478 domain(); method 563 final public void domain() throws ParseException { method in class:AddressListParser 564 /*@bgen(jjtree) domain */ 593 {if (true) throw new ParseException("Atoms in domain names must be separated by '.'");}
|
/packages/providers/DownloadProvider/ui/src/com/android/providers/downloads/ui/ |
DownloadAdapter.java | 108 setTextForView(convertView, R.id.domain, mCursor.getString(mDescriptionColumnId));
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
tipc_config.h | 244 __u32 domain;
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
tipc_config.h | 244 __u32 domain;
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
tipc_config.h | 244 __u32 domain;
|
/external/wpa_supplicant_8/wpa_supplicant/ |
interworking.c | 153 if (cred->domain || cred->pcsc || cred->imsi) [all...] |
/external/chromium_org/ash/system/user/ |
tray_user.cc | 487 // Retrieve the domain managing the device and wrap it with markers. 488 base::string16 domain = UTF8ToUTF16( local 490 base::RemoveChars(domain, kDisplayNameMark, &domain); 491 base::i18n::WrapStringWithLTRFormatting(&domain); 492 // Retrieve the label text, inserting the display name and domain. 494 display_name, domain); [all...] |
/external/chromium_org/net/cookies/ |
cookie_monster_unittest.cc | 153 const std::string& domain, 162 url, name, value, domain, path, expiration_time, secure, http_only, 244 // * Three levels of domain cookie (.b.a, .c.b.a, .d.c.b.a) 248 // * Two domain path cookies (.c.b.a/dir1, .c.b.a/dir1/dir2) 251 // Domain cookies 349 // Domain path cookies 402 const std::string& domain, 407 if (it->Domain() == domain && it->Name() == name) 482 // domain cookie eviction 680 const std::string domain; member in struct:net::__anon11687::CookiesInputInfo 2344 std::string domain = std::string(); local [all...] |
/bionic/libc/netbsd/nameser/ |
ns_name.c | 95 * Convert an encoded domain name to printable ascii as per RFC1035. 196 * Convert a ascii string into an encoded domain name as per RFC1035. 202 * Enforces label and domain length limits. 334 * Enforces label and domain length limits. 383 * Unpack a domain name from a message, source may be compressed. 404 /* Fetch next label in domain name. */ 463 * Pack domain name 'domain' into 'comp_dn'. 500 /* make sure the domain we are about to add is legal */ 572 * Expand compressed domain name to presentation format [all...] |
/external/chromium/chrome/browser/chromeos/login/ |
user_manager.cc | 223 std::string domain = user_email.substr(domain_start, local 227 domain.c_str());
|
/external/chromium/net/base/ |
transport_security_state_unittest.cc | 470 // The domain wasn't being set, leading to a blank string in the 472 EXPECT_EQ(domain_state.domain, "market.android.com"); 476 EXPECT_EQ(domain_state.domain, "market.android.com");
|
/external/chromium_org/chrome/browser/extensions/api/cookies/ |
cookies_api.cc | 391 parsed_args_->details.domain.get() ? *parsed_args_->details.domain
|
/external/chromium_org/chrome/browser/extensions/api/enterprise_platform_keys_private/ |
enterprise_platform_keys_private_api_unittest.cc | 91 const std::string& domain, 105 const std::string& domain,
|
/external/chromium_org/content/browser/net/ |
sqlite_persistent_cookie_store_unittest.cc | 158 const std::string& domain, 162 net::CanonicalCookie(GURL(), name, value, domain, path, creation, 204 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str()); 229 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str()); 247 ASSERT_STREQ("foo.bar", cookies[0]->Domain().c_str()); 261 // Test that priority load of cookies for a specfic domain key could be 302 // 2. "Init And Chain-Load First Domain" 312 cookies_loaded.insert((*it)->Domain().c_str()); 325 cookies_loaded.insert((*it)->Domain().c_str()); 380 ASSERT_STREQ("sessioncookie.com", cookies[0]->Domain().c_str()) [all...] |
/external/chromium_org/net/http/ |
transport_security_state_unittest.cc | 190 // The domain wasn't being set, leading to a blank string in the 193 EXPECT_EQ(domain_state.domain, "market.android.com"); 196 EXPECT_EQ(domain_state.domain, "market.android.com"); 241 // We do more extensive checks for the first domain.
|
/external/chromium_org/third_party/devscripts/ |
licensecheck.pl.vanilla | 523 if ($licensetext =~ /is in the public domain/i) { 524 $license = "Public domain $license";
|
/external/chromium_org/third_party/mesa/src/src/mesa/drivers/dri/radeon/ |
radeon_dma.c | 334 uint32_t domain; local 335 int ret = radeon_bo_is_busy(bo, &domain);
|
/external/mesa3d/src/mesa/drivers/dri/radeon/ |
radeon_dma.c | 334 uint32_t domain; local 335 int ret = radeon_bo_is_busy(bo, &domain);
|
/frameworks/wilhelm/src/android/ |
MediaPlayer_to_android.cpp | 109 if (XA_DOMAINTYPE_VIDEO == mp->mStreamInfo.mStreamInfoTable.itemAt(i).domain) { 116 streamInfo.domain = XA_DOMAINTYPE_VIDEO;
|
/external/chromium/net/spdy/ |
spdy_session.h | 99 // Check to see if this SPDY session can support an additional domain. 102 // session provides authentication for the domain. 104 bool VerifyDomainAuthentication(const std::string& domain); 430 // The domain this session is connected to.
|
/external/chromium/net/tools/testserver/ |
xmppserver_test.py | 146 self.assertEqual(self.jid.domain,
|
/external/chromium/third_party/libjingle/source/talk/examples/call/ |
call_main.cc | 229 DEFINE_string(pmuc, "groupchat.google.com", "The persistant muc domain."); 301 printf("Invalid JID. JIDs should be in the form user@domain\n"); 315 xcs.set_host(jid.domain());
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
jid.cc | 70 // Now take what is left as the domain 92 // If the domain is empty we have a non-valid jid and we should empty 255 // Hash the domain portion 257 const std::string &str = domain(); 375 // Checks and normalizes the domain part of a JID. 382 // TODO: if the domain contains a ':', then we should parse it 383 // as an IPv6 address rather than giving an error about illegal domain. 397 // Checks and normalizes an IDNA domain. 425 // Checks and normalizes a domain label. 466 // Returns the appropriate mapping for an ASCII character in a domain label [all...] |
/external/chromium_org/chrome/browser/policy/cloud/ |
cloud_policy_browsertest.cc | 267 virtual void OnPolicyServiceInitialized(PolicyDomain domain) OVERRIDE {}
|
/external/chromium_org/components/policy/core/common/ |
policy_bundle_unittest.cc | 83 EXPECT_EQ(POLICY_DOMAIN_CHROME, it->first.domain);
|