/external/chromium_org/chrome/test/chromedriver/ |
H A D | window_commands.cc | 61 const std::string& domain, 66 : name(name), value(value), domain(domain), path(path), expiry(expiry), 71 std::string domain; member in struct:__anon5981::Cookie 82 if (!cookie.domain.empty()) 83 dict->SetString("domain", cookie.domain); 108 std::string domain; local 109 cookie_dict->GetString("domain", &domain); 59 Cookie(const std::string& name, const std::string& value, const std::string& domain, const std::string& path, double expiry, bool secure, bool session) argument [all...] |
/external/chromium_org/components/google/core/browser/ |
H A D | google_url_tracker_unittest.cc | 217 void MockSearchDomainCheckResponse(const std::string& domain); 299 const std::string& domain) { 306 fetcher->SetResponseString(domain); 490 // Old-style domain string. 298 MockSearchDomainCheckResponse( const std::string& domain) argument
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_validator.cc | 312 // If no owning_domain_ supplied, try extracting the domain from the policy 315 std::string domain = owning_domain_.empty() ? local 317 if (domain.empty()) { 318 LOG(ERROR) << "Policy does not contain a domain"; 321 signed_data.set_domain(domain); 332 std::string domain; local 334 domain = gaia::ExtractDomainName( 338 return domain;
|
/external/chromium_org/components/policy/core/common/ |
H A D | policy_loader_win.cc | 76 // List of policies that are considered only if the user is part of a AD domain. 336 // Get the computer's domain status. 337 LPWSTR domain; local 339 if (NERR_Success != ::NetGetJoinInformation(NULL, &domain, &join_status)) { 345 ::NetApiBufferFree(domain); 350 // This check will tell us how often are domain computers actually 598 // Map of known 3rd party policy domain name to their enum values. 601 PolicyDomain domain; member in struct:policy::__anon6743 617 const PolicyDomain domain = k3rdPartyDomains[i].domain; local [all...] |
/external/chromium_org/net/cert/ |
H A D | x509_util_nss.cc | 296 const std::string& domain, 323 (unsigned char*)domain.data(), 324 static_cast<unsigned>(domain.size()) 332 LOG(ERROR) << "Unable to get ASN1 encoding for domain in domain_bound_cert" 345 LOG(ERROR) << "Unable to add domain bound cert extension to opaque handle"; 294 CreateChannelIDEC(crypto::ECPrivateKey* key, DigestAlgorithm alg, const std::string& domain, uint32 serial_number, base::Time not_valid_before, base::Time not_valid_after, std::string* der_cert) argument
|
/external/chromium_org/net/dns/ |
H A D | dns_config_service_win.cc | 134 // Converts a base::string16 domain name to ASCII, possibly using punycode. 136 // failure, |domain| might become dirty. 137 bool ParseDomainASCII(const base::string16& widestr, std::string* domain) { argument 138 DCHECK(domain); 144 *domain = base::UTF16ToASCII(widestr); 157 bool success = base::UTF16ToUTF8(punycode.data(), punycode.length(), domain); 159 DCHECK(base::IsStringASCII(*domain)); 160 return success && !domain->empty(); 418 // value by comparing the forest root domain (FRD) to the primary suffix.
|
/external/chromium_org/net/ssl/ |
H A D | channel_id_service.cc | 48 // Synchronously found and returned an existing domain bound cert. 50 // Retrieved or generated and returned a domain bound cert asynchronously. 389 std::string domain = local 392 if (domain.empty()) 394 return domain; 412 std::string domain = GetDomainForHost(host); local 413 if (domain.empty()) { 420 // See if a request for the same domain is currently in flight. 422 if (JoinToInFlightRequest(request_start, domain, private_key, cert, 427 int err = LookupChannelID(request_start, domain, private_ke 475 std::string domain = GetDomainForHost(host); local 592 JoinToInFlightRequest( const base::TimeTicks& request_start, const std::string& domain, std::string* private_key, std::string* cert, bool create_if_missing, const CompletionCallback& callback, RequestHandle* out_req) argument 622 LookupChannelID( const base::TimeTicks& request_start, const std::string& domain, std::string* private_key, std::string* cert, bool create_if_missing, const CompletionCallback& callback, RequestHandle* out_req) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | CookieParser.js | 283 domain: function() 285 return this._attributes["domain"]; 359 PageAgent.deleteCookie(this.name(), (this.secure() ? "https://" : "http://") + this.domain() + this.path(), callback); 399 cookie.addAttribute("domain", protocolCookie["domain"]); 420 if (!url || !WebInspector.Cookies.cookieDomainMatchesResourceDomain(cookie.domain(), url.host))
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nv50/codegen/ |
H A D | nv50_ir_driver.h | 143 uint8_t domain; /* PIPE_PRIM_{QUADS,TRIANGLES,LINES} */ member in struct:nv50_ir_prog_info::__anon13833::__anon13835
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | logging.cc | 406 CFStringRef domain = CFBundleGetIdentifier(CFBundleGetMainBundle()); local 407 if (key != NULL && domain != NULL) { 410 CFPreferencesGetAppBooleanValue(key, domain, &exists_and_is_valid);
|
/external/chromium_org/ui/gfx/ |
H A D | text_elider.cc | 41 // If possible, only the username is elided. Otherwise, the domain is elided 44 // width, the elided domain will occupy that extra width. 51 // Split the email into its local-part (username) and domain-part. The email 53 // but not in the domain part, so splitting at the last @ symbol is safe. 57 base::string16 domain = email.substr(split_index + 1); local 59 DCHECK(!domain.empty()); 65 // Check whether eliding the domain is necessary: if eliding the username 66 // is sufficient, the domain will not be elided. 73 if (GetStringWidthF(domain, font_list) > available_domain_width) { 74 // Elide the domain s [all...] |
/external/dnsmasq/src/ |
H A D | dhcp.c | 839 config->domain = NULL; 883 Also check that FQDNs match the domain we are using. */ 889 char *domain; local 905 /* split off domain part */ 906 if ((configs->flags & CONFIG_NAME) && (domain = strip_hostname(configs->hostname))) 907 configs->domain = domain; 959 for this address. If it has a domain part, that must match the set domain and 960 it gets stripped. The set of legal domain name [all...] |
H A D | forward.c | 114 unsigned short qtype, char *qdomain, int *type, char **domain) 117 /* If the query ends in the domain in one of our servers, set 118 domain to point to that name. We find the largest match to allow both 119 domain.org and sub.domain.org to exist. */ 127 /* domain matches take priority over NODOTS matches */ 152 unsigned int domainlen = strlen(serv->domain); 155 hostname_isequal(matchstart, serv->domain) && 157 (domainlen == 0 || namelen == domainlen || *(serv->domain) == '.' || *(matchstart-1) == '.' )) 161 *domain 113 search_servers(time_t now, struct all_addr **addrpp, unsigned short qtype, char *qdomain, int *type, char **domain) argument 208 char *domain = NULL; local 792 char *domain = NULL; local [all...] |
/external/llvm/lib/CodeGen/ |
H A D | ExecutionDepsFix.cpp | 19 // This pass changes the variant instructions to minimize domain crossings. 41 /// execution domain. Multiple registers may refer to the same open 43 /// domain. 49 /// domain, but if we were forced to pay the penalty of a domain crossing, we 74 // Is domain available? 75 bool hasDomain(unsigned domain) const { 76 return AvailableDomains & (1u << domain); 79 // Mark domain as available. 80 void addDomain(unsigned domain) { argument 85 setSingleDomain(unsigned domain) argument 283 force(int rx, unsigned domain) argument 306 collapse(DomainValue *dv, unsigned domain) argument 578 visitHardInstr(MachineInstr *mi, unsigned domain) argument 636 unsigned domain = countTrailingZeros(available); local [all...] |
/external/mdnsresponder/mDNSShared/ |
H A D | dnssd_clientshim.c | 214 const char *domain, /* may be NULL */ 240 if (!MakeDomainNameFromDNSNameString(&d, (domain && *domain) ? domain : "local.")) { errormsg = "Bad Domain"; goto badparam; } 262 &x->name, &t, &d, // Name, type, domain 277 LogMsg("DNSServiceBrowse(\"%s\", \"%s\") failed: %s (%ld)", regtype, domain, errormsg, err); 358 domainname type, domain; local 368 if (!DeconstructServiceName(&answer->rdata->u.name, &name, &type, &domain)) 377 ConvertDomainNameToCString(&domain, cdom); 388 const char *domain, /* ma 207 DNSServiceRegister( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, const char *host, uint16_t notAnIntPort, uint16_t txtLen, const void *txtRecord, DNSServiceRegisterReply callback, void *context ) argument 382 DNSServiceBrowse( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *regtype, const char *domain, DNSServiceBrowseReply callback, void *context ) argument 464 DNSServiceResolve( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, DNSServiceResolveReply callback, void *context ) argument [all...] |
/external/mesa3d/src/gallium/drivers/nv50/codegen/ |
H A D | nv50_ir_driver.h | 143 uint8_t domain; /* PIPE_PRIM_{QUADS,TRIANGLES,LINES} */ member in struct:nv50_ir_prog_info::__anon27244::__anon27246
|
/external/ppp/pppd/plugins/rp-pppoe/ |
H A D | if.c | 424 int domain, stype; local 435 domain = PF_PACKET; 438 domain = PF_INET; 442 if ((fd = socket(domain, stype, htons(type))) < 0) {
|
/external/ppp/pppd/plugins/ |
H A D | winbind.c | 251 const char *domain, 337 if (domain) { 338 char *b64_domain = base64_encode(domain); 525 char *domain; local 534 /* remove domain from "domain\username" */ 542 /* remove domain from "domain\username" */ 545 domain = domainname; 547 domain 250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument [all...] |
/external/chromium_org/chrome/browser/profile_resetter/ |
H A D | jtl_interpreter.cc | 271 // Stores the hash of the registerable domain name -- as in, the portion of the 272 // domain that is registerable, as opposed to controlled by a registrar; without 283 std::string domain; variable 285 !GetRegisterableDomain(possibly_invalid_url, &domain)) 288 hashed_name_, new base::StringValue(context->GetHash(domain))); 293 // If |possibly_invalid_url| is a valid URL having a registerable domain name 310 // well-formed domain name consisting of at least one subcomponent; followed
|
/external/chromium_org/chrome/browser/ui/webui/ |
H A D | history_ui.cc | 326 base::string16 domain = net::IDNToUnicode(url.host(), accept_languages); local 327 // When the domain is empty, use the scheme instead. This allows for a 328 // sensible treatment of e.g. file: URLs when group by domain is on. 329 if (domain.empty()) 330 domain = base::UTF8ToUTF16(url.scheme() + ":"); 336 result->SetString("domain", domain);
|
/external/chromium_org/chrome/renderer/ |
H A D | content_settings_observer.cc | 110 static bool IsHostInDomain(const std::string& host, const std::string& domain) { argument 111 return (EndsWith(host, domain, false) && 112 (host.length() == domain.length() || 113 (host.length() > domain.length() && 114 host[host.length() - domain.length() - 1] == '.')));
|
/external/chromium_org/chromeos/dbus/ |
H A D | fake_cryptohome_client.cc | 417 const std::string& domain, 413 TpmAttestationSignEnterpriseChallenge( attestation::AttestationKeyType key_type, const std::string& user_id, const std::string& key_name, const std::string& domain, const std::string& device_id, attestation::AttestationChallengeOptions options, const std::string& challenge, const AsyncMethodCallback& callback) argument
|
/external/chromium_org/components/user_manager/ |
H A D | user_manager_base.cc | 752 const std::string domain = gaia::ExtractDomainName(*it); local 753 if (domain == chromeos::login::kSupervisedUserDomain)
|
/external/chromium_org/content/browser/gpu/ |
H A D | gpu_data_manager_impl_private.cc | 432 // 1. If the specific domain is blocked, then unblock it. 435 // This is necessary even if the specific domain was blocked. 436 // Otherwise, if we call Are3DAPIsBlocked with the same domain right 438 // the recent GPU reset caused by that domain. 442 std::string domain = GetDomainFromURL(url); local 444 blocked_domains_.erase(domain); 1024 // domain. This does mean that a.foo.com and b.foo.com will be 1025 // treated independently in the blocking of a given domain, but it 1027 // top-level domain from a URL. 1042 std::string domain [all...] |
/external/chromium_org/content/browser/net/ |
H A D | sqlite_persistent_cookie_store.cc | 63 // that single domain key (eTLD+1)'s cookies, and posts a Backend:: 98 // Loads cookies for the domain key (eTLD+1). 99 void LoadCookiesForKey(const std::string& domain, 156 // Loads cookies for the domain key (eTLD+1) on background runner. 161 // Notifies the CookieMonster when loading completes for a specific domain key 162 // or for all domain keys. Triggers the callback and passes it all cookies 188 // Loads cookies for the next domain key from the DB, then either reschedules 230 // individual load requests for domain keys or when all loading completes. 233 // Map of domain keys(eTLD+1) to domains/hosts that are to be loaded from DB. 236 // Map of (domain key 633 const std::string& domain = host_keys[idx]; local [all...] |