/external/chromium_org/net/http/ |
http_auth_handler_digest.cc | 63 static const char domain[] = "0123456789abcdef"; local 67 cnonce.push_back(domain[base::RandInt(0, 15)]); 175 // [domain="<list-of-URIs>"] 236 } else if (LowerCaseEqualsASCII(name, "domain")) {
|
transport_security_state.cc | 180 state_copy.domain.clear(); 273 // |ReportUMAOnPinFailure| uses these to report which domain was associated 801 out->domain = DNSDomainToString(host_sub_chunk); 844 state.domain = DNSDomainToString(host_sub_chunk); 846 // Succeed if we matched the domain exactly or if subdomain matches are 883 domain); 888 failure_log->append("Rejecting public key chain for domain " + domain + 903 failure_log->append("Rejecting public key chain for domain " + domain [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/audits/ |
AuditsPanel.js | 373 * @param {string} domain 376 WebInspector.AuditRuleResult.resourceDomain = function(domain) 378 return domain || WebInspector.UIString("[empty domain]");
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/network/ |
HAREntry.js | 220 domain: cookie.domain(),
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
InspectorDatabaseAgent.cpp | 218 void InspectorDatabaseAgent::didOpenDatabase(PassRefPtrWillBeRawPtr<Database> database, const String& domain, const String& name, const String& version) 225 RefPtrWillBeRawPtr<InspectorDatabaseResource> resource = InspectorDatabaseResource::create(database, domain, name, version);
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
xmppengineimpl.cc | 407 void XmppEngineImpl::StartTls(const std::string& domain) { 409 // As substitute for the real (login jid's) domain, we permit 414 tls_server_domain_.empty() ? domain : tls_server_domain_);
|
xmpplogintask.cc | 115 // The proper domain to verify against is the real underlying 116 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 117 // also allows matching against a proxy domain instead, if it is told 120 pctx_->InternalSendStart(pctx_->user_jid_.domain()); 181 // The proper domain to verify against is the real underlying 182 // domain - i.e., the domain that owns the JID. Our XmppEngineImpl 183 // also allows matching against a proxy domain instead, if it is told 186 pctx_->StartTls(pctx_->user_jid_.domain()); [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
nvc0_miptree.c | 308 mt->base.domain = NOUVEAU_BO_VRAM; 310 bo_flags = mt->base.domain | NOUVEAU_BO_NOSNOOP;
|
/external/lzma/Asm/x86/ |
7zCrcOpt.asm | 2 ; 2009-12-12 : Igor Pavlov : Public domain
|
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_miptree.c | 308 mt->base.domain = NOUVEAU_BO_VRAM; 310 bo_flags = mt->base.domain | NOUVEAU_BO_NOSNOOP;
|
/external/chromium_org/content/browser/gpu/ |
gpu_data_manager_impl_private.cc | 432 // 1. If the specific domain is blocked, then unblock it. 435 // This is necessary even if the specific domain was blocked. 436 // Otherwise, if we call Are3DAPIsBlocked with the same domain right 438 // the recent GPU reset caused by that domain. 442 std::string domain = GetDomainFromURL(url); local 444 blocked_domains_.erase(domain); [all...] |
/external/chromium_org/ppapi/proxy/ |
ppapi_param_traits.cc | 487 WriteParam(m, static_cast<unsigned>(p.domain())); 495 unsigned domain; local 497 if (!ReadParam(m, iter, &domain) || !ReadParam(m, iter, &path)) 499 if (domain > ppapi::PepperFilePath::DOMAIN_MAX_VALID) 503 static_cast<ppapi::PepperFilePath::Domain>(domain), path); 511 LogParam(static_cast<unsigned>(p.domain()), l);
|
/external/chromium_org/remoting/webapp/ |
third_party_token_fetcher.js | 34 * domain, received from the directory server. 69 // Verify the host-supplied URL matches the domain's allowed URL patterns. 81 console.error('Token URL does not match the domain\'s allowed URL patterns.' +
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/r300/ |
r300_texture.c | [all...] |
/external/mesa3d/src/gallium/drivers/r300/ |
r300_texture.c | [all...] |
/external/chromium_org/third_party/libxml/src/ |
runtest.c | 353 int domain; local 369 domain = err->domain; 372 if ((domain == XML_FROM_PARSER) || (domain == XML_FROM_HTML) || 373 (domain == XML_FROM_DTD) || (domain == XML_FROM_NAMESPACE) || 374 (domain == XML_FROM_IO) || (domain == XML_FROM_VALID)) { 398 else if ((line != 0) && (domain == XML_FROM_PARSER) [all...] |
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
kernel_proxy.cc | [all...] |
/external/libselinux/src/ |
android.c | 166 char *domain; member in struct:seapp_context 182 free(s->domain); 380 } else if (!strcasecmp(name, "domain")) { 381 cur->domain = strdup(value); 382 if (!cur->domain) { 466 selinux_log(SELINUX_INFO, "%s: isSystemServer=%s user=%s seinfo=%s name=%s path=%s sebool=%s -> domain=%s type=%s level=%s levelFrom=%s", 469 cur->seinfo, cur->name.str, cur->path.str, cur->sebool, cur->domain, 603 else if (kind == SEAPP_DOMAIN && !cur->domain) 621 if (context_type_set(ctx, cur->domain)) [all...] |
/external/chromium_org/third_party/libevent/ |
evdns.c | 18 * Public Domain code 20 * This software is Public Domain. To view a copy of the public domain dedication, 2712 const char *const domain = NEXT_TOKEN; local 2718 const char *domain; local [all...] |
/external/dnsmasq/src/ |
dhcp.c | 839 config->domain = NULL; 883 Also check that FQDNs match the domain we are using. */ 889 char *domain; local 905 /* split off domain part */ 906 if ((configs->flags & CONFIG_NAME) && (domain = strip_hostname(configs->hostname))) 907 configs->domain = domain; 959 for this address. If it has a domain part, that must match the set domain and 960 it gets stripped. The set of legal domain names is bigger than the set of legal hostname [all...] |
/external/aac/libSBRdec/src/ |
env_dec.cpp | 644 \brief Convert each envelope value from logarithmic to linear domain 745 int i, domain, no_of_bands, band, freqRes; local 753 domain = h_sbr_data->domain_vec[i]; 762 if (domain == 0)
|
/external/chromium_org/chrome/browser/browsing_data/ |
browsing_data_cookie_helper_unittest.cc | 26 if (!domain_.empty() && domain_ != cookie.Domain()) 71 const char* domain, 78 if (domain) 79 matcher.domain_ = domain; 132 GURL("http://www.google.com"), "A=2; Domain=.www.google.com ", 290 helper->AddChangedCookie(origin, origin, "A=1; Domain=.www.google.com", 296 "C=bad guy; Domain=wrongdomain.com", 354 helper->AddChangedCookie(origin, origin, "A=5; Domain=google.com", 356 helper->AddChangedCookie(origin, origin, "A=6; Domain=google.com", 359 "A=7; Domain=google.com; Path=/example/1" [all...] |
/external/chromium_org/chrome/browser/profile_resetter/ |
jtl_interpreter.cc | 271 // Stores the hash of the registerable domain name -- as in, the portion of the 272 // domain that is registerable, as opposed to controlled by a registrar; without 283 std::string domain; variable 285 !GetRegisterableDomain(possibly_invalid_url, &domain)) 288 hashed_name_, new base::StringValue(context->GetHash(domain))); 293 // If |possibly_invalid_url| is a valid URL having a registerable domain name 310 // well-formed domain name consisting of at least one subcomponent; followed
|
/external/chromium_org/net/cert/ |
x509_util_nss.cc | 296 const std::string& domain, 323 (unsigned char*)domain.data(), 324 static_cast<unsigned>(domain.size()) 332 LOG(ERROR) << "Unable to get ASN1 encoding for domain in domain_bound_cert" 345 LOG(ERROR) << "Unable to add domain bound cert extension to opaque handle";
|
/external/chromium_org/third_party/libxml/src/include/libxml/ |
xmlerror.h | 77 int domain; /* What part of the library raised this error */ member in struct:_xmlError [all...] |