/external/chromium/net/base/ |
H A D | ssl_false_start_blacklist_process.cc | 32 static void StripWWWPrefix(std::vector<std::string>* hosts) { argument 36 for (size_t i = 0; i < hosts->size(); i++) { 37 const std::string& h = (*hosts)[i]; 40 (*hosts)[i] = h.substr(kPrefixLen, h.size() - kPrefixLen); 45 // RemoveDuplicateEntries removes all duplicates from |hosts|. 46 static void RemoveDuplicateEntries(std::vector<std::string>* hosts) { argument 51 i = hosts->begin(); i != hosts->end(); i++) { 61 hosts->swap(ret); 79 static void RemoveRedundantEntries(std::vector<std::string>* hosts) { argument 109 CheckLengths(const std::vector<std::string>& hosts) argument 163 std::vector<std::string> hosts; local [all...] |
H A D | transport_security_state.cc | 498 std::map<std::string, DomainState> hosts; local 508 Deserialise(cmd_line_hsts, &dirty, &hosts); 578 if (hosts.find(hashed_host) != hosts.end()) { 579 *out = hosts[hashed_host];
|
/external/chromium/chrome/browser/safe_browsing/ |
H A D | protocol_parser_unittest.cc | 30 EXPECT_EQ(chunks[0].hosts.size(), 3U); 32 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 33 SBEntry* entry = chunks[0].hosts[0].entry; 38 EXPECT_EQ(chunks[0].hosts[1].host, 0x31313131); 39 entry = chunks[0].hosts[1].entry; 47 EXPECT_EQ(chunks[0].hosts[2].host, 0x37373737); 48 entry = chunks[0].hosts[2].entry; 83 EXPECT_EQ(chunks[0].hosts.size(), 1U); 85 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 86 SBEntry* entry = chunks[0].hosts[ [all...] |
H A D | safe_browsing_util_unittest.cc | 27 std::vector<std::string> hosts, paths; local 30 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 32 EXPECT_EQ(hosts.size(), static_cast<size_t>(2)); 34 EXPECT_EQ(hosts[0], "b.c"); 35 EXPECT_EQ(hosts[1], "a.b.c"); 43 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 45 EXPECT_EQ(hosts.size(), static_cast<size_t>(5)); 47 EXPECT_EQ(hosts[0], "f.g"); 48 EXPECT_EQ(hosts[1], "e.f.g"); 49 EXPECT_EQ(hosts[ [all...] |
H A D | protocol_parser.h | 75 // Parse the response from a chunk URL request and returns the hosts/prefixes 110 std::deque<SBChunkHost>* hosts); 115 std::deque<SBChunkHost>* hosts);
|
H A D | safe_browsing_database_unittest.cc | 52 chunk->hosts.push_back(host); 78 chunk->hosts.push_back(host); 95 chunk->hosts.push_back(host); 112 chunk->hosts.push_back(host); 130 chunk->hosts.push_back(host); 163 chunk->hosts.push_back(host); 183 chunk->hosts.push_back(host); 200 chunk->hosts.push_back(host); 305 chunk.hosts.clear(); 312 chunk.hosts [all...] |
H A D | filter_false_positive_perftest.cc | 166 std::vector<std::string> hosts; local 168 hosts.push_back(url_check.host()); 170 safe_browsing_util::GenerateHostsToCheck(url_check, &hosts); 176 for (size_t i = 0; i < hosts.size(); ++i) { 179 crypto::SHA256HashString(hosts[i] + paths[j], &prefix, sizeof(prefix)); 185 return hosts.size() * paths.size();
|
H A D | protocol_parser.cc | 307 &chunks->back().hosts)) 312 &chunks->back().hosts)) 333 std::deque<SBChunkHost>* hosts) { 347 hosts->push_back(chunk_host); 358 hosts->push_back(chunk_host); 371 std::deque<SBChunkHost>* hosts) { 388 hosts->push_back(chunk_host); 397 hosts->push_back(chunk_host); 329 ParseAddChunk(const std::string& list_name, const char* data, int data_len, int hash_len, std::deque<SBChunkHost>* hosts) argument 367 ParseSubChunk(const std::string& list_name, const char* data, int data_len, int hash_len, std::deque<SBChunkHost>* hosts) argument
|
H A D | safe_browsing_util.cc | 51 for (std::deque<SBChunkHost>::iterator hiter = citer->hosts.begin(); 52 hiter != citer->hosts.end(); ++hiter) { 350 void GenerateHostsToCheck(const GURL& url, std::vector<std::string>* hosts) { argument 351 hosts->clear(); 376 i != host.rend() && hosts->size() < kMaxHostsToCheck; ++i) { 379 hosts->push_back(std::string(i.base(), host.end())); 384 hosts->push_back(host); 403 // As with the hosts above, it doesn't matter what order we check these in. 432 std::vector<std::string> hosts, paths; 433 GenerateHostsToCheck(url, &hosts); [all...] |
H A D | safe_browsing_util.h | 61 std::deque<SBChunkHost> hosts; member in struct:SBChunk 292 // Given a URL, returns all the hosts we need to check. They are returned 294 void GenerateHostsToCheck(const GURL& url, std::vector<std::string>* hosts);
|
H A D | safe_browsing_database.cc | 79 std::vector<std::string> hosts; local 81 hosts.push_back(url.host()); 83 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 89 for (size_t i = 0; i < hosts.size(); ++i) { 93 crypto::SHA256HashString(hosts[i] + path, &full_hash, 103 crypto::SHA256HashString(hosts[i] + path.substr(0, path.size() - 1), 768 // Helper to iterate over all the entries in the hosts in |chunks| and 788 for (std::deque<SBChunkHost>::const_iterator hiter = citer->hosts.begin(); 789 hiter != citer->hosts.end(); ++hiter) { 842 // Helper to iterate over all the entries in the hosts i [all...] |
/external/webkit/Source/WebCore/platform/graphics/ca/win/ |
H A D | LayerChangesFlusher.cpp | 64 // We handle removing the hook when we finish calling out to the hosts, so we shouldn't 81 // Calling out to the hosts can cause m_hostsWithChangesToFlush to be modified, so we copy it 83 Vector<AbstractCACFLayerTreeHost*> hosts; local 84 copyToVector(m_hostsWithChangesToFlush, hosts); 88 for (size_t i = 0; i < hosts.size(); ++i) 89 hosts[i]->flushPendingLayerChangesNow();
|
/external/chromium/third_party/libjingle/source/talk/p2p/client/ |
H A D | httpportallocator.h | 43 // Records the port on the hosts that will receive HTTP requests. 59 void SetStunHosts(const std::vector<talk_base::SocketAddress>& hosts) { argument 60 if (!hosts.empty()) { 61 stun_hosts_ = hosts; 64 void SetRelayHosts(const std::vector<std::string>& hosts) { argument 65 if (!hosts.empty()) { 66 relay_hosts_ = hosts;
|
/external/mdnsresponder/mDNSPosix/ |
H A D | Makefile | 357 # If 'mdns' does not already appear on the "hosts:" line, then add it right before 'dns' 359 sed -e '/mdns/!s/^\(hosts:.*\)dns\(.*\)/\1mdns dns\2/' /etc/nsswitch.conf.pre-mdns > /etc/nsswitch.conf
|
H A D | NetMonitor.c | 191 HostEntry *hosts; member in struct:__anon10272 203 HostEntry *entry = list->hosts + i; 218 HostEntry *newHosts = realloc(list->hosts, newMax * sizeof(HostEntry)); 222 list->hosts = newHosts; 225 entry = list->hosts + list->num++; 358 HostEntry *e, *end = &list->hosts[(max < list->num) ? max : list->num]; 359 qsort(list->hosts, list->num, sizeof(HostEntry), CompareHosts); 361 for (e = &list->hosts[0]; e < end; e++)
|
/external/openssh/regress/ |
H A D | conch-ciphers.sh | 23 --known-hosts $OBJ/known_hosts --notty --noagent --nox11 -n \
|
/external/webkit/Source/WebCore/platform/network/curl/ |
H A D | ResourceHandleCurl.cpp | 130 static HashSet<String> hosts; local 132 return hosts;
|
/external/chromium/chrome/common/extensions/ |
H A D | extension_unittest.cc | 850 ExtensionExtent hosts; local 854 EXPECT_FALSE(hosts.ContainsURL(GURL("http://www.google.com"))); 858 hosts = extension->GetEffectiveHostPermissions(); 859 EXPECT_TRUE(hosts.ContainsURL(GURL("http://www.google.com"))); 860 EXPECT_FALSE(hosts.ContainsURL(GURL("https://www.google.com"))); 865 hosts = extension->GetEffectiveHostPermissions(); 866 EXPECT_TRUE(hosts.ContainsURL(GURL("http://google.com"))); 867 EXPECT_TRUE(hosts.ContainsURL(GURL("http://foo.google.com"))); 871 hosts = extension->GetEffectiveHostPermissions(); 872 EXPECT_TRUE(hosts [all...] |
H A D | extension.cc | 355 const std::vector<std::string> hosts) { 356 CHECK(hosts.size() > 0); 360 switch (hosts.size()) { 364 UTF8ToUTF16(hosts[0])); 369 UTF8ToUTF16(hosts[0]), 370 UTF8ToUTF16(hosts[1])); 375 UTF8ToUTF16(hosts[0]), 376 UTF8ToUTF16(hosts[1]), 377 UTF8ToUTF16(hosts[2])); 383 UTF8ToUTF16(hosts[ 354 CreateFromHostList( const std::vector<std::string> hosts) argument 483 std::vector<std::string> hosts = GetDistinctHostsForDisplay( local [all...] |
/external/webkit/Source/WebCore/inspector/front-end/ |
H A D | AuditRules.js | 224 var hosts = []; 226 hosts.push(url); 228 if (!hosts.length) 229 return callback(null); // no hosts (local file or something) 231 hosts.sort(hostSorter); 234 if (hosts.length > optimalHostnameCount) 235 hosts.splice(optimalHostnameCount); 237 var busiestHostResourceCount = domainToResourcesMap[hosts[0]].length; 243 for (var i = 0, size = hosts.length; i < size; ++i) 244 avgResourcesPerHost += domainToResourcesMap[hosts[ [all...] |
/external/chromium/chrome/browser/sidebar/ |
H A D | sidebar_manager.cc | 243 const ContentIdToSidebarHostMap& hosts = local 247 for (ContentIdToSidebarHostMap::const_iterator it = hosts.begin(); 248 it != hosts.end(); ++it) {
|
/external/chromium/chrome/browser/ |
H A D | content_setting_bubble_model.cc | 423 void MaybeAddDomainList(const std::set<std::string>& hosts, int title_id) { argument 424 if (!hosts.empty()) { 427 domain_list.hosts = hosts;
|
H A D | content_setting_bubble_model.h | 59 std::set<std::string> hosts; member in struct:ContentSettingBubbleModel::DomainList
|
/external/chromium/chrome/browser/net/ |
H A D | predictor_unittest.cc | 36 WaitForResolutionHelper(Predictor* predictor, const UrlList& hosts, argument 39 hosts_(hosts), 86 void WaitForResolution(Predictor* predictor, const UrlList& hosts) { argument 89 new WaitForResolutionHelper(predictor, hosts, timer),
|
/external/chromium/chrome/browser/ui/gtk/ |
H A D | content_setting_bubble_gtk.cc | 207 for (std::set<std::string>::const_iterator j = i->hosts.begin(); 208 j != i->hosts.end(); ++j) {
|