/external/chromium_org/chrome/common/local_discovery/ |
service_discovery_client.h | 128 // Create a resolver for local domain, both ipv4 or ipv6. 130 const std::string& domain,
|
/external/chromium_org/chrome/renderer/safe_browsing/ |
phishing_dom_feature_extractor.h | 116 // Given a URL, checks whether the domain is different from the domain of 117 // the current frame's URL. If so, stores the domain in |domain| and returns 119 bool IsExternalDomain(const GURL& url, std::string* domain) const;
|
/external/chromium_org/components/domain_reliability/ |
config.h | 112 std::string domain; member in class:domain_reliability::DomainReliabilityConfig
|
monitor.cc | 106 LOG(WARNING) << "Baked-in Domain Reliability config for " 107 << config->domain << " is expired."; 214 // Grab a copy of the domain before transferring ownership of |config|. 215 std::string domain = config->domain; local 226 contexts_.insert(make_pair(domain, context)); 227 // Make sure the domain wasn't already in the map. 263 // 4. The request was itself a Domain Reliability upload (to avoid loops). 288 beacon.domain = request.url.host();
|
/external/chromium_org/components/nacl/renderer/ |
manifest_downloader.cc | 77 if (error.domain.equals(blink::WebString::fromUTF8(net::kErrorDomain))) {
|
/external/chromium_org/components/pairing/ |
controller_pairing_controller.h | 100 virtual void OnAuthenticationDone(const std::string& domain,
|
/external/chromium_org/components/policy/core/common/cloud/ |
cloud_policy_manager.h | 65 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|
/external/chromium_org/components/policy/core/common/ |
policy_test_utils.cc | 196 std::ostream& operator<<(std::ostream& os, policy::PolicyDomain domain) { 197 switch (domain) { 207 os << "POLICY_DOMAIN_UNKNOWN(" << int(domain) << ")"; 237 os << ns.domain << "/" << ns.component_id;
|
policy_test_utils.h | 63 std::ostream& operator<<(std::ostream& os, policy::PolicyDomain domain);
|
/external/chromium_org/content/browser/devtools/ |
devtools_browser_target.h | 39 void RegisterDomainHandler(const std::string& domain,
|
/external/chromium_org/jingle/notifier/base/ |
notifier_options_util.cc | 25 xmpp_client_settings.set_host(jid.domain());
|
/external/chromium_org/third_party/WebKit/ManualTests/inspector-wrappers/ |
inspector-wrappers-test-utils.js | 19 "to make a cross-domain XMLHttpRequest. Where " + 28 var str = "<p>This test tries to make a cross-domain XMLHttpRequest to " +
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
navigatorView.css | 30 .navigator-domain-tree-item .icon { 31 content: url(Images/domain.png);
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
InspectorDatabaseAgent.h | 71 void didOpenDatabase(PassRefPtrWillBeRawPtr<Database>, const String& domain, const String& name, const String& version);
|
/external/chromium_org/third_party/WebKit/Source/web/tests/ |
MHTMLTest.cpp | 89 // Checks that the domain is set to the actual MHTML file, not the URL it was 108 EXPECT_STRNE("localhost", origin->domain().ascii().data());
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nouveau/ |
nouveau_context.h | 27 struct nouveau_bo *, unsigned domain,
|
/external/chromium_org/third_party/skia/src/gpu/effects/ |
GrMatrixConvolutionEffect.h | 69 const GrTextureDomain& domain() const { return fDomain; } function in class:GrMatrixConvolutionEffect
|
GrMatrixConvolutionEffect.cpp | 62 const GrTextureDomain& domain = fp.cast<GrMatrixConvolutionEffect>().domain(); local 100 fDomain.sampleTexture(fsBuilder, domain, "c", coord, samplers[0]); 112 fDomain.sampleTexture(fsBuilder, domain, "c", coords2D, samplers[0]); 130 b->add32(GrTextureDomain::GLDomain::DomainKey(m.domain())); 148 fDomain.setData(pdman, conv.domain(), texture.origin()); 190 fDomain == s.domain();
|
/external/chromium_org/third_party/webrtc/common_audio/signal_processing/ |
spl_sqrt_floor_arm.S | 10 @ Thanks for asking. Those routines are public domain (originally posted to
|
/external/dnsmasq/src/ |
forward.c | 114 unsigned short qtype, char *qdomain, int *type, char **domain) 117 /* If the query ends in the domain in one of our servers, set 118 domain to point to that name. We find the largest match to allow both 119 domain.org and sub.domain.org to exist. */ 127 /* domain matches take priority over NODOTS matches */ 152 unsigned int domainlen = strlen(serv->domain); 155 hostname_isequal(matchstart, serv->domain) && 157 (domainlen == 0 || namelen == domainlen || *(serv->domain) == '.' || *(matchstart-1) == '.' )) 161 *domain = serv->domain 208 char *domain = NULL; local 792 char *domain = NULL; local [all...] |
/external/kernel-headers/original/uapi/linux/ |
tipc.h | 185 __u32 domain; member in struct:sockaddr_tipc::__anon3007::__anon3008
|
/external/mdnsresponder/mDNSShared/ |
dnssd_clientshim.c | 110 // Domain Enumeration 214 const char *domain, /* may be NULL */ 240 if (!MakeDomainNameFromDNSNameString(&d, (domain && *domain) ? domain : "local.")) { errormsg = "Bad Domain"; goto badparam; } 262 &x->name, &t, &d, // Name, type, domain 277 LogMsg("DNSServiceBrowse(\"%s\", \"%s\") failed: %s (%ld)", regtype, domain, errormsg, err); 358 domainname type, domain; local 368 if (!DeconstructServiceName(&answer->rdata->u.name, &name, &type, &domain)) [all...] |
/external/mesa3d/src/gallium/drivers/nouveau/ |
nouveau_context.h | 27 struct nouveau_bo *, unsigned domain,
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
URLParser.java | 8 * and are considered to be in the public domain. As a result, a formal 820 "sip:3Zqkv5dajqaaas0tCjCxT0xH2ZEuEMsFl0xoasip%3A%2B3519116786244%40siplab.domain.com@213.0.115.163:7070"};
|
/external/chromium_org/chrome/browser/resources/chromeos/chromevox/speech_rules/ |
math_simple_store.js | 33 * Turns a domain mapping from its JSON representation containing simple strings 42 for (var domain in mapping) { 43 for (var style in mapping[domain]) { 44 var content = mapping[domain][style]; 47 name, domain + '.' + style, '[t] "' + content + '"',
|