/external/webkit/Source/JavaScriptCore/tests/mozilla/js1_5/Regress/ |
H A D | regress-89443.js | 45 function FindProxyForURL(url, host) 48 if (isPlainHostName(host) 49 || dnsDomainIs(host, ".hennepin.lib.mn.us") 50 || dnsDomainIs(host, ".hclib.org") 53 else if (isPlainHostName(host) 57 || dnsDomainIs(host, ".asahi.com") 58 || dnsDomainIs(host, ".2facts.com") 59 || dnsDomainIs(host, ".oclc.org") 60 || dnsDomainIs(host, ".collegesource.com") 61 || dnsDomainIs(host, " [all...] |
/external/chromium/net/data/proxy_resolver_v8_unittest/ |
H A D | direct.js | 1 function FindProxyForURL(url, host) {
|
H A D | ends_with_comment.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_empty_string.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_integer.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_null.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_unicode.js | 2 function FindProxyForURL(url, host) {
|
H A D | missing_close_brace.js | 4 function FindProxyForURL(url, host) {
|
H A D | ends_with_statement_no_semicolon.js | 2 function FindProxyForURL(url, host) { return "PROXY success:" + x; }
|
H A D | return_function.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_object.js | 1 function FindProxyForURL(url, host) {
|
H A D | return_undefined.js | 1 function FindProxyForURL(url, host) {
|
H A D | simple.js | 4 function FindProxyForURL(url, host) { 12 isInNet(host, "10.0.0.0", "255.0.0.0")) { 16 if (dnsDomainIs(host, "foo.bar.baz.com") || !isResolvable(host)) {
|
H A D | unhandled_exception.js | 1 function FindProxyForURL(url, host) {
|
H A D | binding_from_global.js | 6 function FindProxyForURL(url, host) {
|
H A D | international_domain_names.js | 3 function FindProxyForURL(url, host) {
|
H A D | side_effects.js | 7 function FindProxyForURL(url, host) {
|
/external/iproute2/etc/iproute2/ |
H A D | rt_scopes | 6 254 host
|
/external/apache-http/src/org/apache/http/conn/ |
H A D | HttpHostConnectException.java | 45 private final HttpHost host; field in class:HttpHostConnectException 47 public HttpHostConnectException(final HttpHost host, final ConnectException cause) { argument 48 super("Connection to " + host + " refused"); 49 this.host = host; 54 return this.host;
|
/external/webkit/Tools/iExploder/iexploder-1.7.2/tools/ |
H A D | lasthit.rb | 43 host = $1 46 if (! hostHash[host]) 47 hostHash[host] = Hash.new 49 if (! hostHash[host][agent]) 50 hostHash[host][agent] = Hash.new 51 hostHash[host][agent]['total'] = 0 53 hostHash[host][agent]['last'] = test_url 54 hostHash[host][agent]['total'] = hostHash[host][agent]['total'] + 1 55 hostHash[host][agen [all...] |
/external/nist-sip/java/gov/nist/javax/sip/header/ |
H A D | CallIdentifier.java | 53 * host field 55 protected String host; field in class:CallIdentifier 66 * @param host is the host. 68 public CallIdentifier(String localId, String host) { argument 70 this.host = host; 93 if (host != null) { 94 buffer.append(AT).append(host); 114 if (this.host 180 setHost(String host) argument [all...] |
/external/v8/samples/ |
H A D | count-hosts.js | 32 log("Processing " + request.host + request.path + 35 if (!output[request.host]) { 36 output[request.host] = 1; 38 output[request.host]++
|
/external/webkit/Source/WebKit2/WebProcess/InjectedBundle/API/c/win/ |
H A D | WKBundlePrivateWin.cpp | 35 void WKBundleSetHostAllowsAnyHTTPSCertificate(WKBundleRef bundleRef, WKStringRef host) argument 37 toImpl(bundleRef)->setHostAllowsAnyHTTPSCertificate(toWTFString(host)); 40 void WKBundleSetClientCertificate(WKBundleRef bundleRef, WKStringRef host, WKStringRef certificateSystemStoreName, WKCertificateInfoRef certificateInfoRef) argument 42 toImpl(bundleRef)->setClientCertificate(toWTFString(host), toWTFString(certificateSystemStoreName), toImpl(certificateInfoRef));
|
/external/chromium/chrome/browser/ssl/ |
H A D | ssl_host_state.cc | 15 void SSLHostState::HostRanInsecureContent(const std::string& host, int pid) { argument 17 ran_insecure_content_hosts_.insert(BrokenHostEntry(host, pid)); 20 bool SSLHostState::DidHostRunInsecureContent(const std::string& host, argument 23 return !!ran_insecure_content_hosts_.count(BrokenHostEntry(host, pid)); 27 const std::string& host) { 30 cert_policy_for_host_[host].Deny(cert); 34 const std::string& host) { 37 cert_policy_for_host_[host].Allow(cert); 41 net::X509Certificate* cert, const std::string& host) { 44 return cert_policy_for_host_[host] 26 DenyCertForHost(net::X509Certificate* cert, const std::string& host) argument 33 AllowCertForHost(net::X509Certificate* cert, const std::string& host) argument 40 QueryPolicy( net::X509Certificate* cert, const std::string& host) argument [all...] |
H A D | ssl_policy_backend.cc | 16 void SSLPolicyBackend::HostRanInsecureContent(const std::string& host, int id) { argument 17 ssl_host_state_->HostRanInsecureContent(host, id); 21 bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host, argument 23 return ssl_host_state_->DidHostRunInsecureContent(host, pid); 27 const std::string& host) { 28 ssl_host_state_->DenyCertForHost(cert, host); 32 const std::string& host) { 33 ssl_host_state_->AllowCertForHost(cert, host); 37 net::X509Certificate* cert, const std::string& host) { 38 return ssl_host_state_->QueryPolicy(cert, host); 26 DenyCertForHost(net::X509Certificate* cert, const std::string& host) argument 31 AllowCertForHost(net::X509Certificate* cert, const std::string& host) argument 36 QueryPolicy( net::X509Certificate* cert, const std::string& host) argument [all...] |