/external/skia/src/effects/ |
SkGpuBlurUtils.cpp | 173 SkRect domain; local 174 matrix.mapRect(&domain, rect); 175 domain.inset(i < scaleFactorX ? SK_ScalarHalf / srcTexture->width() : 0.0f, 180 domain,
|
/external/valgrind/main/coregrind/ |
pub_core_libcfile.h | 69 extern Int VG_(socket) ( Int domain, Int type, Int protocol );
|
/frameworks/base/core/java/android/app/backup/ |
FullBackup.java | 60 static public native int backupToTar(String packageName, String domain,
|
/frameworks/base/core/java/android/text/style/ |
TtsSpan.java | 137 * protocol://username:password@domain:port/path?query_string#fragment_id 138 * Hence populating just username and domain will read as an email address. 411 * Argument used to specify the domain part of a URI. For example 415 public static final String ARG_DOMAIN = "android.arg.domain"; [all...] |
/frameworks/wilhelm/tests/native-media/jni/ |
native-media-jni.c | 243 XAuint32 domain; local 244 res = (*caller)->QueryStreamType(caller, streamIndex, &domain); 246 switch (domain) { 256 fprintf(stderr, "Unexpected domain %u\n", domain);
|
/libcore/luni/src/main/java/libcore/io/ |
BlockGuardOs.java | 281 @Override public FileDescriptor socket(int domain, int type, int protocol) throws ErrnoException { 282 return tagSocket(os.socket(domain, type, protocol)); 285 @Override public void socketpair(int domain, int type, int protocol, FileDescriptor fd1, FileDescriptor fd2) throws ErrnoException { 286 os.socketpair(domain, type, protocol, fd1, fd2);
|
/packages/apps/Email/tests/src/com/android/email/ |
VendorPolicyLoaderTest.java | 155 assertEquals("yahoo.com", p.domain);
|
/packages/apps/Exchange/src/com/android/exchange/eas/ |
EasAutoDiscover.java | 97 public static String genUri(final String domain, final int attemptNumber) { 105 return "https://" + domain + AUTO_DISCOVER_PAGE; 107 return "https://autodiscover." + domain + AUTO_DISCOVER_PAGE; 109 return "http://autodiscover." + domain + AUTO_DISCOVER_PAGE;
|
/external/chromium_org/chrome/browser/resources/history/ |
history.js | 58 * domain: string, 127 this.domain_ = result.domain; 188 var domain = createElementWithClassName('div', 'domain'); 225 domain.textContent = this.domain_; 265 visitEntryWrapper.appendChild(domain); 477 * Launch a search for more history entries from the same domain. 762 // Flag to show that the results are grouped by domain or not. 849 * Gets whether we are grouped by domain. 850 * @return {boolean} Whether the results are grouped by domain [all...] |
/external/chromium_org/third_party/d3/src/ |
d3.js | [all...] |
/external/chromium_org/chrome/browser/browsing_data/ |
cookies_tree_model.cc | 60 // We want to order by registry controlled domain, so we would get 70 // The canonicalized representation makes the registry controlled domain 73 // string comparison works to order hosts by registry controlled domain 92 // The host may be the registry controlled domain, in which case fail fast. 97 // Start operating to the left of the registry controlled domain, e.g. in 725 const std::string& domain) { 726 DCHECK_EQ(GetHost(), domain); local 729 flash_lso_child_ = new CookieTreeFlashLSONode(domain); 891 const std::string& domain) 892 : domain_(domain) {} 1167 std::string domain = it->Domain(); local [all...] |
/external/chromium_org/third_party/skia/src/pdf/ |
SkPDFShader.cpp | 527 SkPDFStream* makePSFunction(const SkString& psCode, SkPDFArray* domain); 678 // populate domain. 912 SkAutoTUnref<SkPDFArray> domain(new SkPDFArray); 913 domain->reserve(4); 914 domain->appendScalar(bbox.fLeft); 915 domain->appendScalar(bbox.fRight); 916 domain->appendScalar(bbox.fTop); 917 domain->appendScalar(bbox.fBottom); [all...] |
/external/skia/src/pdf/ |
SkPDFShader.cpp | 527 SkPDFStream* makePSFunction(const SkString& psCode, SkPDFArray* domain); 678 // populate domain. 912 SkAutoTUnref<SkPDFArray> domain(new SkPDFArray); 913 domain->reserve(4); 914 domain->appendScalar(bbox.fLeft); 915 domain->appendScalar(bbox.fRight); 916 domain->appendScalar(bbox.fTop); 917 domain->appendScalar(bbox.fBottom); [all...] |
/external/mdnsresponder/mDNSShared/ |
uds_daemon.c | 118 domainname domain; member in struct:service_instance 122 // for multi-domain default browsing 126 domainname domain; member in struct:browser_t 396 // Generates a response message giving name, type, domain, plus interface index, 550 mDNSlocal int build_domainname_from_strings(domainname *srv, char *name, char *regtype, char *domain) 557 if (!MakeDomainNameFromDNSNameString(&d, domain)) return -1; 565 // On a freshly-created Unix Domain Socket, the kernel should *never* fail to buffer a small write for us 806 if (instance->request->u.servicereg.InterfaceID == mDNSInterface_P2P || (!instance->request->u.servicereg.InterfaceID && SameDomainName(&instance->domain, &localdomain) && (instance->request->flags & kDNSServiceFlagsIncludeP2P))) 1593 char domain[MAX_ESCAPED_DOMAIN_NAME], host[MAX_ESCAPED_DOMAIN_NAME]; local 2149 char regtype[MAX_ESCAPED_DOMAIN_NAME], domain[MAX_ESCAPED_DOMAIN_NAME]; local 2290 char name[256], regtype[MAX_ESCAPED_DOMAIN_NAME], domain[MAX_ESCAPED_DOMAIN_NAME]; local 3091 char domain[MAX_ESCAPED_DOMAIN_NAME]; local 3197 domainname domain; local [all...] |
/bionic/libc/dns/resolv/ |
res_data.c | 170 const char *dname, /* domain name */ 200 res_query(const char *name, /* domain name */ 269 res_search(const char *name, /* domain name */ 284 const char *domain, 294 return (res_nquerydomain(&_nres, name, domain,
|
/external/chromium_org/chrome/browser/chromeos/login/screens/ |
controller_pairing_screen.cc | 201 const std::string domain(gaia::ExtractDomainName(account_id)); 202 context_.SetString(kContextKeyEnrollmentDomain, domain);
|
/external/chromium_org/chrome/browser/extensions/updater/ |
extension_downloader.h | 111 void set_ping_enabled_domain(const std::string& domain) { 112 ping_enabled_domain_ = domain; 318 // Domain to enable ping data. Ping data will be sent with manifest fetches 319 // to update URLs which match this domain. Defaults to empty (no domain).
|
/external/chromium_org/chrome/browser/resources/cryptotoken/ |
gstaticorigincheck.js | 7 * app id based on a fixed set of allowed app ids for the google.com domain.
|
/external/chromium_org/chrome/browser/ui/views/ |
cookie_info_view.cc | 52 void CookieInfoView::SetCookie(const std::string& domain, 56 domain_value_field_->SetText(base::UTF8ToUTF16(domain)); 77 SetCookie(pc.HasDomain() ? pc.Domain() : url.host(), cookie);
|
/external/chromium_org/components/nacl/loader/nonsfi/ |
nonsfi_sandbox.cc | 136 const Arg<int> domain(0); 137 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS());
|
/external/chromium_org/components/policy/core/common/ |
config_dir_policy_loader.cc | 180 // for that domain/component namespace. 188 // Helper to lookup a domain given its string name. 195 LOG(WARNING) << "Unsupported 3rd party policy domain: " 207 PolicyDomain domain = supported_domains[domains_it.key()]; local 219 bundle->Get(PolicyNamespace(domain, components_it.key()))
|
/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
kernel_intercept.h | 192 int ki_socket(int domain, int type, int protocol); 193 int ki_socketpair(int domain, int type, int protocl, int* sv);
|
kernel_proxy.h | 217 virtual int socket(int domain, int type, int protocol); 218 virtual int socketpair(int domain, int type, int protocol, int* sv);
|
kernel_wrap.h | 150 int socket(int domain, int type, int protocol); 151 int socketpair(int domain, int type, int protocl, int* sv);
|
/external/chromium_org/sandbox/linux/seccomp-bpf-helpers/ |
baseline_policy.cc | 190 const Arg<int> domain(0); 191 return If(domain == AF_UNIX, Allow()).Else(CrashSIGSYS());
|