/bionic/libc/kernel/uapi/drm/ |
nouveau_drm.h | 36 uint32_t domain; member in struct:drm_nouveau_gem_info 55 uint32_t domain; member in struct:drm_nouveau_gem_pushbuf_bo_presumed
|
/device/generic/armv7-a-neon/ |
BoardConfig.mk | 44 domain.te \
|
/external/apache-http/src/org/apache/http/auth/ |
NTCredentials.java | 66 * @param usernamePassword the domain/username:password formed string 97 * @param userName The user name. This should not include the domain to authenticate with. 98 * For example: "user" is correct whereas "DOMAIN\\user" is not. 102 * @param domain The domain to authenticate within. 108 final String domain) { 113 this.principal = new NTUserPrincipal(domain, userName); 137 * @return String the domain these credentials are intended to authenticate with.
|
/external/chromium_org/chrome/browser/local_discovery/ |
service_discovery_client_utility.cc | 38 const std::string& domain, 42 return host_client_->CreateLocalDomainResolver(domain, address_family,
|
/external/chromium_org/chrome/utility/local_discovery/ |
service_discovery_message_handler.h | 67 void OnResolveLocalDomain(uint64 id, const std::string& domain, 78 void ResolveLocalDomain(uint64 id, const std::string& domain,
|
/external/chromium_org/components/policy/core/common/ |
policy_bundle.cc | 19 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty()); 27 DCHECK(ns.domain != POLICY_DOMAIN_CHROME || ns.component_id.empty());
|
/external/chromium_org/content/common/sandbox_linux/ |
bpf_cros_arm_gpu_policy_linux.cc | 147 // Allow only AF_UNIX for |domain|. 150 const Arg<int> domain(0); 151 return If(domain == AF_UNIX, Allow()).Else(Error(EPERM));
|
/external/chromium_org/google_apis/gaia/ |
gaia_auth_util.cc | 53 std::string CanonicalizeDomain(const std::string& domain) { 54 // Canonicalization of domain names means lower-casing them. Make sure to 56 return base::StringToLowerASCII(domain); 62 // Apply a default domain if necessary. 77 // First canonicalize which will also verify we have proper domain part.
|
/external/chromium_org/net/ssl/ |
channel_id_service.h | 31 // A class for creating and fetching domain bound certs. They are used 83 // Returns the domain to be used for |host|. The domain is the 84 // "registry controlled domain", or the "ETLD + 1" where one exists, or 94 // Fetches the domain bound cert for the specified host if one exists and 116 // Fetches the domain bound cert for the specified host if one exists. 128 // request arrives for the same domain, the GetChannelID request will 171 // Searches for an in-flight request for the same domain. If found, 175 const std::string& domain, 182 // Looks for the domain bound cert for |domain| in this service's store [all...] |
/external/chromium_org/third_party/skia/include/gpu/ |
GrResourceKey.h | 17 static GrCacheID::Domain ScratchDomain() { 18 static const GrCacheID::Domain gDomain = GrCacheID::GenerateDomain(); 49 *reinterpret_cast<const GrCacheID::Domain*>(fKey.getData() + 81 kResourceTypeOffset = kCacheIDDomainOffset + sizeof(GrCacheID::Domain), 93 void init(const GrCacheID::Domain domain, 104 memcpy(k + kCacheIDDomainOffset, &domain, sizeof(GrCacheID::Domain));
|
/external/kernel-headers/original/uapi/drm/ |
nouveau_drm.h | 42 uint32_t domain; member in struct:drm_nouveau_gem_info 59 uint32_t domain; member in struct:drm_nouveau_gem_pushbuf_bo_presumed
|
/external/libsepol/include/sepol/policydb/ |
services.h | 164 * `domain', `type', `protocol', and `port'. 166 extern int sepol_port_sid(uint16_t domain, 185 * in bytes and `domain' is the communications domain or 188 extern int sepol_node_sid(uint16_t domain,
|
/external/ppp/pppd/plugins/ |
winbind.c | 251 const char *domain, 337 if (domain) { 338 char *b64_domain = base64_encode(domain); 339 fprintf(pipe_in, "NT-Domain:: %s\n", b64_domain); 525 char *domain; local 534 /* remove domain from "domain\username" */ 542 /* remove domain from "domain\username" */ 545 domain = domainname [all...] |
/external/sepolicy/ |
app.te | 2 ### Domain for all zygote spawned apps 172 allow appdomain domain:dir { open read search getattr }; 173 allow appdomain domain:{ file lnk_file } { open read getattr }; 185 allow appdomain domain:process getattr; 232 domain:{ 245 neverallow appdomain domain:netlink_kobject_uevent_socket { write append }; 250 # Unix domain sockets. 260 neverallow appdomain { domain -appdomain }:process ptrace; 262 # Write access to /proc/pid entries for any non-app domain. 263 neverallow appdomain { domain -appdomain }:file write [all...] |
/hardware/intel/img/libdrm/shared-core/ |
nouveau_drm.h | 97 uint32_t domain; member in struct:drm_nouveau_gem_info 162 uint32_t domain; member in struct:drm_nouveau_gem_pin
|
/packages/apps/Email/provider_src/com/android/email/activity/setup/ |
AccountSettingsUtils.java | 45 /** Pattern to match any part of a domain */ 174 "; Domain contains multiple globals"); 226 "; Domain contains multiple globals"); 238 * domain. We check for vendor supplied values first, then we look in providers_product.xml, 242 * A match is defined as any provider entry for which the "domain" attribute matches. 244 * @param domain The domain portion of the user's email address 247 public static Provider findProviderForDomain(Context context, String domain) { 248 Provider p = VendorPolicyLoader.getInstance(context).findProviderForDomain(domain); 250 p = findProviderForDomain(context, domain, R.xml.providers_product) [all...] |
/packages/experimental/SELinux/CTS/src/ |
example_input_policy.conf | [all...] |
/external/chromium_org/sync/tools/testserver/ |
xmppserver.py | 160 def __init__(self, username, domain, resource=''): 162 self.domain = domain 166 jid_str = "%s@%s" % (self.username, self.domain) 172 return Jid(self.username, self.domain) 283 domain = stanza.getAttribute('to') 284 if domain: 285 self._domain = domain 297 # The domain may be omitted. 301 # username, _, domain = username_domain.partition('@' [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/mesa3d/src/gallium/drivers/nvc0/ |
nvc0_transfer.c | 34 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 35 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 126 nouveau_bufctx_refn(bctx, 0, dst->bo, dst->domain | NOUVEAU_BO_WR); 127 nouveau_bufctx_refn(bctx, 0, src->bo, src->domain | NOUVEAU_BO_RD); 178 struct nouveau_bo *dst, unsigned offset, unsigned domain, 186 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 223 struct nouveau_bo *dst, unsigned offset, unsigned domain, 231 nouveau_bufctx_refn(nvc0->bufctx, 0, dst, domain | NOUVEAU_BO_WR); 384 tx->rect[1].domain = NOUVEAU_BO_GART; 465 struct nouveau_bo *bo, unsigned domain, [all...] |
/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/external/mesa3d/src/gallium/auxiliary/tgsi/ |
tgsi_ureg.c | 173 struct ureg_tokens domain[2]; member in struct:ureg_program 212 tokens_error(&ureg->domain[0]); 218 unsigned domain, 221 struct ureg_tokens *tokens = &ureg->domain[domain]; 234 unsigned domain, 237 if (ureg->domain[domain].tokens == error_tokens) 240 return &ureg->domain[domain].tokens[nr] [all...] |
/bionic/libc/kernel/uapi/linux/ |
tipc.h | 112 __u32 domain; member in struct:sockaddr_tipc::__anon880::__anon881
|
/development/ndk/platforms/android-L/include/linux/ |
tipc.h | 112 __u32 domain; member in struct:sockaddr_tipc::__anon2455::__anon2456
|
/device/samsung/manta/ |
BoardConfig.mk | 91 domain.te \
|