/external/webrtc/webrtc/libjingle/xmpp/ |
mucroomlookuptask_unittest.cc | 43 lookup_server_jid("lookup@domain.com"), 44 room_jid("muc-jid-ponies@domain.com"), 46 room_domain("domain.com"), 47 room_full_name("ponies@domain.com"), 84 "<cli:iq type=\"set\" to=\"lookup@domain.com\" id=\"0\" " 88 "<room-domain>domain.com</room-domain>" 98 "<iq xmlns='jabber:client' from='lookup@domain.com' id='0' type='result'>" 100 " <item jid='muc-jid-ponies@domain.com'> [all...] |
/external/selinux/policycoreutils/sepolicy/sepolicy/templates/ |
rw.py | 41 ## <param name="domain"> 43 ## Domain allowed access. 60 ## <param name="domain"> 62 ## Domain allowed access. 80 ## <param name="domain"> 82 ## Domain allowed access. 99 ## <param name="domain"> 101 ## Domain allowed access. 124 ## <param name="domain"> 126 ## Domain allowed access [all...] |
var_cache.py | 47 ## <param name="domain"> 49 ## Domain allowed access. 66 ## <param name="domain"> 68 ## Domain allowed access. 86 ## <param name="domain"> 88 ## Domain allowed access. 105 ## <param name="domain"> 107 ## Domain allowed access. 127 ## <param name="domain"> 129 ## Domain allowed access [all...] |
var_lib.py | 48 ## <param name="domain"> 50 ## Domain allowed access. 67 ## <param name="domain"> 69 ## Domain allowed access. 86 ## <param name="domain"> 88 ## Domain allowed access. 105 ## <param name="domain"> 107 ## Domain allowed access. 127 ## <param name="domain"> 129 ## Domain allowed access [all...] |
var_spool.py | 47 ## <param name="domain"> 49 ## Domain allowed access. 66 ## <param name="domain"> 68 ## Domain allowed access. 85 ## <param name="domain"> 87 ## Domain allowed access. 104 ## <param name="domain"> 106 ## Domain allowed access. 126 ## <param name="domain"> 128 ## Domain allowed access [all...] |
executable.py | 224 ## <param name=\"domain\"> 226 ## Domain allowed to transition. 243 ## Execute TEMPLATETYPE in the TEMPLATETYPE domain, and 244 ## allow the specified role the TEMPLATETYPE domain. 246 ## <param name="domain"> 248 ## Domain allowed to transition 253 ## The role to be allowed the TEMPLATETYPE domain. 276 ## <param name="domain"> 278 ## User domain for the role 300 ## Execute sandbox in the TEMPLATETYPE_t domain, an [all...] |
/external/autotest/client/cros/ |
power_rapl.py | 27 # TODO(tbroch): dram domain only for server class CPU's 42 error.TestFail: If domain is invalid. 47 for domain in set(domains): 48 rapl_list.append(Rapl(domain)) 56 domain: string, name of power rail domain. 98 def __init__(self, domain): 102 domain: string, name of power rail domain 105 error.TestError: If domain is invali 168 def domain(self): member in class:Rapl [all...] |
/external/chromium-trace/catapult/telemetry/third_party/webpagereplay/third_party/dns/ |
e164.py | 18 @var public_enum_domain: The DNS public ENUM domain, e164.arpa. 30 value is the ENUM domain name for that number. 33 @param origin: The domain in which the number should be constructed. 43 """Convert an ENUM domain name into an E.164 number. 44 @param name: the ENUM domain name. 46 @param origin: A domain containing the ENUM domain name. The 47 name is relativized to this domain before being converted to text. 57 raise dns.exception.SyntaxError('non-digit labels in ENUM domain name') 71 for domain in domains [all...] |
/packages/apps/QuickSearchBox/src/com/android/quicksearchbox/google/ |
SearchBaseUrlHelper.java | 40 "https://www.google.com/searchdomaincheck?format=domain"; 98 * @return the search domain. This is of the form "google.co.xx" or "google.com", 102 String domain = mSearchSettings.getSearchBaseDomain(); local 104 if (domain == null) { 106 Log.w(TAG, "Search base domain was null, last apply time=" + 113 // option is unchecked. In other cases, the previously set domain (or 116 // We have no choice in this case but to use the default search domain. 117 domain = getDefaultBaseDomain(); 120 if (domain.startsWith(".")) { 121 if (DBG) Log.d(TAG, "Prepending www to " + domain); 138 String domain; local [all...] |
/external/avahi/avahi-sharp/ |
ServiceTypeBrowser.cs | 28 IntPtr type, IntPtr domain, LookupResultFlags flags, 35 public string Domain; 64 private string domain; field in class:Avahi.ServiceTypeBrowser 73 byte[] domain, LookupFlags flags, 113 public ServiceTypeBrowser (Client client, string domain) : this (client, -1, Protocol.Unspecified, 114 domain, LookupFlags.None) 118 public ServiceTypeBrowser (Client client, int iface, Protocol proto, string domain, LookupFlags flags) 123 this.domain = domain; 146 Utility.StringToBytes (domain), flags [all...] |
EntryGroup.cs | 93 byte[] domain, byte[] host, UInt16 port, 99 byte[] type, byte[] domain, IntPtr strlst); 104 byte[] domain, byte[] subtype); 194 public void AddService (string name, string type, string domain, 197 AddService (PublishFlags.None, name, type, domain, port, txt); 200 public void AddService (PublishFlags flags, string name, string type, string domain, 203 AddService (-1, Protocol.Unspecified, flags, name, type, domain, null, port, txt); 206 public void AddService (int iface, Protocol proto, PublishFlags flags, string name, string type, string domain, 217 AddService (iface, proto, flags, name, type, domain, host, port, list); 220 public void AddService (int iface, Protocol proto, PublishFlags flags, string name, string type, string domain, [all...] |
/external/skia/src/gpu/effects/ |
GrBicubicEffect.h | 30 const GrTextureDomain& domain() const { return fDomain; } function in class:GrBicubicEffect 33 * Create a simple filter effect with custom bicubic coefficients and optional domain. 36 const SkRect* domain = nullptr) { 37 if (nullptr == domain) { 44 GrCoordTransform::MakeDivByTextureWHMatrix(tex), *domain); 67 * Create a Mitchell filter effect with a texture matrix and a domain. 70 const SkRect& domain) { 71 return new GrBicubicEffect(tex, gMitchellCoefficients, matrix, domain); 88 const SkRect& domain);
|
/external/avahi/avahi-common/ |
i18n.h | 44 #define dgettext(Domain,String) (String) 45 #define dcgettext(Domain,String,Type) (String) 46 #define bindtextdomain(Domain,Directory) (Domain) 47 #define bind_textdomain_codeset(Domain,Codeset) (Codeset)
|
/system/sepolicy/ |
postinstall.te | 0 # Domain where the postinstall program runs during the update. 2 # Extend the permissions in this domain to allow this program to access other 4 type postinstall, domain; 22 # No domain other than update_engine should transition to postinstall, as it is 24 neverallow { domain -update_engine } postinstall:process { transition dyntransition };
|
/frameworks/base/docs/html-intl/intl/ja/preview/features/ |
security-config.jd | 106 ???? {@code base-config}????????????????? {@code domain-config} ??????????????????????????????????????????? 126 <domain-config> 127 <domain includeSubdomains="true">example.com</domain> 131 </domain-config> 160 <domain-config> 161 <domain includeSubdomains="true">secure.example.com</domain> 162 <domain includeSubdomains="true">cdn.example.com</domain> [all...] |
/frameworks/base/docs/html-intl/intl/ko/preview/features/ |
security-config.jd | 108 ?? ??? ??) ?? {@code domain-config}(???? 126 <domain-config> 127 <domain includeSubdomains="true">example.com</domain> 131 </domain-config> 160 <domain-config> 161 <domain includeSubdomains="true">secure.example.com</domain> 162 <domain includeSubdomains="true">cdn.example.com</domain> [all...] |
/frameworks/base/docs/html-intl/intl/ru/preview/features/ |
security-config.jd | 107 ????????? ?? ?????? ??????????) ??? {@code domain-config} (??? ????????? ?? ?????? 125 <domain-config> 126 <domain includeSubdomains="true">example.com</domain> 130 </domain-config> 159 <domain-config> 160 <domain includeSubdomains="true">secure.example.com</domain> 161 <domain includeSubdomains="true">cdn.example.com</domain> [all...] |
/frameworks/base/docs/html-intl/intl/zh-cn/preview/features/ |
security-config.jd | 106 ?????? {@code base-config}???????????? {@code domain-config}??????????????????? 126 <domain-config> 127 <domain includeSubdomains="true">example.com</domain> 131 </domain-config> 160 <domain-config> 161 <domain includeSubdomains="true">secure.example.com</domain> 162 <domain includeSubdomains="true">cdn.example.com</domain> [all...] |
/frameworks/base/docs/html-intl/intl/zh-tw/preview/features/ |
security-config.jd | 105 ???????? {@code base-config} (??????????) ? {@code domain-config} (????????)????????? 125 <domain-config> 126 <domain includeSubdomains="true">example.com</domain> 130 </domain-config> 159 <domain-config> 160 <domain includeSubdomains="true">secure.example.com</domain> 161 <domain includeSubdomains="true">cdn.example.com</domain> [all...] |
/external/e2fsprogs/intl/ |
loadmsgcat.c | 772 struct loaded_domain *domain, 784 domain->codeset_cntr = 787 domain->conv = (__gconv_t) -1; 790 domain->conv = (iconv_t) -1; 793 domain->conv_tab = NULL; 848 if (__gconv_open (outcharset, charset, &domain->conv, 851 domain->conv = (__gconv_t) -1; 868 domain->conv = iconv_open (outcharset, charset); 874 domain->conv = iconv_open (outcharset, charset); 889 _nl_free_domain_conv (struct loaded_domain *domain) 921 struct loaded_domain *domain; local [all...] |
/toolchain/binutils/binutils-2.25/intl/ |
loadmsgcat.c | 765 _nl_init_domain_conv (domain_file, domain, domainbinding) 767 struct loaded_domain *domain; 779 domain->codeset_cntr = 782 domain->conv = (__gconv_t) -1; 785 domain->conv = (iconv_t) -1; 788 domain->conv_tab = NULL; 843 if (__gconv_open (outcharset, charset, &domain->conv, 846 domain->conv = (__gconv_t) -1; 863 domain->conv = iconv_open (outcharset, charset); 869 domain->conv = iconv_open (outcharset, charset) 918 struct loaded_domain *domain; local [all...] |
/frameworks/base/core/java/android/security/net/config/ |
ApplicationConfig.java | 37 private Set<Pair<Domain, NetworkSecurityConfig>> mConfigs; 60 * When matching the most specific matching domain rule will be used, if no match exists 80 // Normalize hostname by removing trailing . if present, all Domain hostnames are 85 // Find the Domain -> NetworkSecurityConfig entry with the most specific matching 86 // Domain entry for hostname. 88 Pair<Domain, NetworkSecurityConfig> bestMatch = null; 89 for (Pair<Domain, NetworkSecurityConfig> entry : mConfigs) { 90 Domain domain = entry.first; local 93 if (domain.hostname.equals(hostname)) [all...] |
/external/avahi/avahi-core/ |
browse-service-type.c | 26 #include <avahi-common/domain.h> 63 char type[AVAHI_DOMAIN_NAME_MAX], domain[AVAHI_DOMAIN_NAME_MAX]; local 67 if (avahi_service_name_split(record->data.ptr.name, NULL, 0, type, sizeof(type), domain, sizeof(domain)) < 0) { 72 b->callback(b, interface, protocol, event, type, domain, flags, b->userdata); 81 const char *domain, 96 AVAHI_CHECK_VALIDITY_RETURN_NULL(server, !domain || avahi_is_valid_domain_name(domain), AVAHI_ERR_INVALID_DOMAIN_NAME); 99 if (!domain) 100 domain = server->domain_name [all...] |
browse-service.c | 26 #include <avahi-common/domain.h> 64 char service[AVAHI_LABEL_MAX], type[AVAHI_DOMAIN_NAME_MAX], domain[AVAHI_DOMAIN_NAME_MAX]; local 71 if (avahi_service_name_split(record->data.ptr.name, service, sizeof(service), type, sizeof(type), domain, sizeof(domain)) < 0) { 76 b->callback(b, interface, protocol, event, service, type, domain, flags, b->userdata); 88 const char *domain, 104 AVAHI_CHECK_VALIDITY_RETURN_NULL(server, !domain || avahi_is_valid_domain_name(domain), AVAHI_ERR_INVALID_DOMAIN_NAME); 108 if (!domain) 109 domain = server->domain_name [all...] |
/external/selinux/policycoreutils/sepolicy/ |
sepolicy-manpage.8 | 18 .I \-d, \-\-domain 19 Generate a Man Page for the specified domain. (Supports multiple commands) 31 Generate an additional HTML man pages for the specified domain(s).
|