/external/chromium_org/net/dns/ |
H A D | dns_hosts_unittest.cc | 62 DnsHosts hosts; local 63 ParseHosts(contents, &hosts); 64 ASSERT_EQ(expected, hosts); 68 DnsHosts hosts; local 69 ParseHosts("", &hosts); 70 EXPECT_EQ(0u, hosts.size()); 74 DnsHosts hosts; local 75 ParseHosts(" ", &hosts); 76 EXPECT_EQ(0u, hosts.size()); 80 DnsHosts hosts; local 86 DnsHosts hosts; local 92 DnsHosts hosts; local 98 DnsHosts hosts; local 104 DnsHosts hosts; local 110 DnsHosts hosts; local 116 DnsHosts hosts; local [all...] |
H A D | dns_config_service_unittest.cc | 46 void OnHostsRead(const DnsHosts& hosts) { argument 47 DnsConfigService::OnHostsRead(hosts); 75 // Generate hosts using the given seed. 77 DnsHosts hosts; local 80 ParseHosts(hosts_content, &hosts); 81 EXPECT_FALSE(hosts.empty()); 82 return hosts; 107 // No hosts yet, so no config. 110 service_->OnHostsRead(config.hosts); 116 config.hosts [all...] |
H A D | dns_config_service.cc | 30 return EqualsIgnoreHosts(d) && (hosts == d.hosts); 80 dict->SetInteger("num_hosts", hosts.size()); 162 void DnsConfigService::OnHostsRead(const DnsHosts& hosts) { argument 166 if (hosts != dns_config_.hosts) { 167 dns_config_.hosts = hosts;
|
/external/chromium/net/base/ |
H A D | ssl_false_start_blacklist_process.cc | 32 static void StripWWWPrefix(std::vector<std::string>* hosts) { argument 36 for (size_t i = 0; i < hosts->size(); i++) { 37 const std::string& h = (*hosts)[i]; 40 (*hosts)[i] = h.substr(kPrefixLen, h.size() - kPrefixLen); 45 // RemoveDuplicateEntries removes all duplicates from |hosts|. 46 static void RemoveDuplicateEntries(std::vector<std::string>* hosts) { argument 51 i = hosts->begin(); i != hosts->end(); i++) { 61 hosts->swap(ret); 79 static void RemoveRedundantEntries(std::vector<std::string>* hosts) { argument 109 CheckLengths(const std::vector<std::string>& hosts) argument 163 std::vector<std::string> hosts; local [all...] |
/external/chromium_org/chrome/common/extensions/ |
H A D | chrome_extensions_client.cc | 74 const URLPatternSet& hosts, 77 for (URLPatternSet::const_iterator i = hosts.begin(); 78 i != hosts.end(); ++i) { 108 URLPatternSet hosts; local 110 hosts.AddPattern(URLPattern(URLPattern::SCHEME_CHROMEUI, 123 hosts.AddPattern(URLPattern(URLPattern::SCHEME_CHROMEUI, 126 return hosts; 73 FilterHostPermissions( const URLPatternSet& hosts, URLPatternSet* new_hosts, std::set<PermissionMessage>* messages) const argument
|
H A D | chrome_extensions_client.h | 32 const URLPatternSet& hosts,
|
/external/chromium_org/chrome/browser/profiles/ |
H A D | profile_destroyer.cc | 32 std::vector<content::RenderProcessHost*> hosts; local 37 GetHostsForProfile(profile, &hosts); 39 GetHostsForProfile(profile->GetOffTheRecordProfile(), &hosts); 41 // Generally, !hosts.empty() means that there is a leak in a render process 48 DCHECK(hosts.empty() || profile->IsOffTheRecord() || 50 "Profile still has " << hosts.size() << " hosts"; 54 if (hosts.empty() || !profile->IsOffTheRecord()) { 60 // The instance will destroy itself once all render process hosts referring 62 new ProfileDestroyer(profile, hosts); 88 ProfileDestroyer( Profile* const profile, const std::vector<content::RenderProcessHost*>& hosts) argument 177 GetHostsForProfile( Profile* const profile, std::vector<content::RenderProcessHost*>* hosts) argument [all...] |
H A D | profile_destroyer.h | 21 // sure it gets done asynchronously after all render process hosts are gone. 33 const std::vector<content::RenderProcessHost*>& hosts); 43 // Fetch the list of render process hosts that still refer to the profile. 47 std::vector<content::RenderProcessHost*> *hosts);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | protocol_parser_unittest.cc | 31 EXPECT_EQ(chunks[0].hosts.size(), 3U); 33 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 34 SBEntry* entry = chunks[0].hosts[0].entry; 39 EXPECT_EQ(chunks[0].hosts[1].host, 0x31313131); 40 entry = chunks[0].hosts[1].entry; 48 EXPECT_EQ(chunks[0].hosts[2].host, 0x37373737); 49 entry = chunks[0].hosts[2].entry; 82 EXPECT_EQ(chunks[0].hosts.size(), 1U); 84 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 85 SBEntry* entry = chunks[0].hosts[ [all...] |
H A D | safe_browsing_util_unittest.cc | 27 std::vector<std::string> hosts, paths; local 30 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 32 EXPECT_EQ(hosts.size(), static_cast<size_t>(2)); 34 EXPECT_EQ(hosts[0], "b.c"); 35 EXPECT_EQ(hosts[1], "a.b.c"); 43 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 45 EXPECT_EQ(hosts.size(), static_cast<size_t>(5)); 47 EXPECT_EQ(hosts[0], "f.g"); 48 EXPECT_EQ(hosts[1], "e.f.g"); 49 EXPECT_EQ(hosts[ [all...] |
H A D | protocol_parser.h | 69 // Parse the response from a chunk URL request and returns the hosts/prefixes 91 std::deque<SBChunkHost>* hosts); 96 std::deque<SBChunkHost>* hosts);
|
/external/chromium/chrome/browser/safe_browsing/ |
H A D | protocol_parser_unittest.cc | 30 EXPECT_EQ(chunks[0].hosts.size(), 3U); 32 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 33 SBEntry* entry = chunks[0].hosts[0].entry; 38 EXPECT_EQ(chunks[0].hosts[1].host, 0x31313131); 39 entry = chunks[0].hosts[1].entry; 47 EXPECT_EQ(chunks[0].hosts[2].host, 0x37373737); 48 entry = chunks[0].hosts[2].entry; 83 EXPECT_EQ(chunks[0].hosts.size(), 1U); 85 EXPECT_EQ(chunks[0].hosts[0].host, 0x61616161); 86 SBEntry* entry = chunks[0].hosts[ [all...] |
H A D | safe_browsing_util_unittest.cc | 27 std::vector<std::string> hosts, paths; local 30 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 32 EXPECT_EQ(hosts.size(), static_cast<size_t>(2)); 34 EXPECT_EQ(hosts[0], "b.c"); 35 EXPECT_EQ(hosts[1], "a.b.c"); 43 safe_browsing_util::GenerateHostsToCheck(url, &hosts); 45 EXPECT_EQ(hosts.size(), static_cast<size_t>(5)); 47 EXPECT_EQ(hosts[0], "f.g"); 48 EXPECT_EQ(hosts[1], "e.f.g"); 49 EXPECT_EQ(hosts[ [all...] |
H A D | protocol_parser.h | 75 // Parse the response from a chunk URL request and returns the hosts/prefixes 110 std::deque<SBChunkHost>* hosts); 115 std::deque<SBChunkHost>* hosts);
|
/external/chromium_org/chrome/common/extensions/permissions/ |
H A D | permission_message_util.h | 19 // Creates the corresponding permission message for a list of hosts. 20 // The messages change depending on what hosts are present. 22 const std::set<std::string>& hosts);
|
/external/chromium_org/content/browser/frame_host/ |
H A D | debug_urls.cc | 26 std::vector<PpapiPluginProcessHost*> hosts; local 27 PpapiPluginProcessHost::FindByName(UTF8ToUTF16(kFlashPluginName), &hosts); local 28 for (std::vector<PpapiPluginProcessHost*>::iterator iter = hosts.begin(); 29 iter != hosts.end(); ++iter) {
|
/external/chromium_org/content/browser/renderer_host/ |
H A D | render_process_host_browsertest.cc | 21 content::RenderProcessHost::iterator hosts = local 24 while (!hosts.IsAtEnd()) { 25 if (hosts.GetCurrentValue()->HasConnection()) 27 hosts.Advance();
|
/external/chromium/third_party/libjingle/source/talk/p2p/client/ |
H A D | httpportallocator.h | 43 // Records the port on the hosts that will receive HTTP requests. 59 void SetStunHosts(const std::vector<talk_base::SocketAddress>& hosts) { argument 60 if (!hosts.empty()) { 61 stun_hosts_ = hosts; 64 void SetRelayHosts(const std::vector<std::string>& hosts) { argument 65 if (!hosts.empty()) { 66 relay_hosts_ = hosts;
|
/external/chromium_org/chrome/browser/managed_mode/ |
H A D | managed_mode_url_filter_unittest.cc | 154 // We assume that the hosts and URLs are already canonicalized. 155 std::map<std::string, bool> hosts; local 156 hosts["www.moose.org"] = true; 157 hosts["www.xn--n3h.net"] = true; 161 filter_->SetManualHosts(&hosts); 313 std::map<std::string, bool> hosts; local 318 hosts["*.google.com"] = true; 319 hosts["www.google.*"] = false; 321 hosts["accounts.google.com"] = false; 322 hosts["mai [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
H A D | httpportallocator.h | 69 void SetStunHosts(const std::vector<talk_base::SocketAddress>& hosts) { argument 70 if (!hosts.empty()) { 71 stun_hosts_ = hosts; 74 void SetRelayHosts(const std::vector<std::string>& hosts) { argument 75 if (!hosts.empty()) { 76 relay_hosts_ = hosts;
|
/external/chromium_org/chrome/browser/ui/webui/quota_internals/ |
H A D | quota_internals_handler.cc | 48 const std::vector<PerHostStorageInfo>& hosts) { 51 for (iterator itr(hosts.begin()); itr != hosts.end(); ++itr) { 47 ReportPerHostInfo( const std::vector<PerHostStorageInfo>& hosts) argument
|
H A D | quota_internals_handler.h | 40 void ReportPerHostInfo(const std::vector<PerHostStorageInfo>& hosts);
|
/external/chromium_org/extensions/common/permissions/ |
H A D | permissions_data_unittest.cc | 50 URLPatternSet hosts; local 56 EXPECT_FALSE(hosts.MatchesURL(GURL("http://www.google.com"))); 60 hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); 61 EXPECT_TRUE(hosts.MatchesURL(GURL("http://www.google.com"))); 62 EXPECT_FALSE(hosts.MatchesURL(GURL("https://www.google.com"))); 67 hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); 68 EXPECT_TRUE(hosts.MatchesURL(GURL("http://google.com"))); 69 EXPECT_TRUE(hosts.MatchesURL(GURL("http://foo.google.com"))); 73 hosts = PermissionsData::GetEffectiveHostPermissions(extension.get()); 74 EXPECT_TRUE(hosts [all...] |
/external/chromium_org/apps/shell/ |
H A D | shell_extensions_client.h | 29 const extensions::URLPatternSet& hosts,
|
/external/chromium_org/remoting/host/installer/linux/ |
H A D | Makefile | 13 CHROME_MANIFEST_DIR = $(DESTDIR)/etc/opt/chrome/native-messaging-hosts
|