Searched defs:domain (Results 201 - 225 of 332) sorted by relevance

1234567891011>>

/external/chromium_org/chrome/test/chromedriver/
H A Dwindow_commands.cc61 const std::string& domain,
66 : name(name), value(value), domain(domain), path(path), expiry(expiry),
71 std::string domain; member in struct:__anon5981::Cookie
82 if (!cookie.domain.empty())
83 dict->SetString("domain", cookie.domain);
108 std::string domain; local
109 cookie_dict->GetString("domain", &domain);
59 Cookie(const std::string& name, const std::string& value, const std::string& domain, const std::string& path, double expiry, bool secure, bool session) argument
[all...]
/external/chromium_org/components/google/core/browser/
H A Dgoogle_url_tracker_unittest.cc217 void MockSearchDomainCheckResponse(const std::string& domain);
299 const std::string& domain) {
306 fetcher->SetResponseString(domain);
490 // Old-style domain string.
298 MockSearchDomainCheckResponse( const std::string& domain) argument
/external/chromium_org/components/policy/core/common/cloud/
H A Dcloud_policy_validator.cc312 // If no owning_domain_ supplied, try extracting the domain from the policy
315 std::string domain = owning_domain_.empty() ? local
317 if (domain.empty()) {
318 LOG(ERROR) << "Policy does not contain a domain";
321 signed_data.set_domain(domain);
332 std::string domain; local
334 domain = gaia::ExtractDomainName(
338 return domain;
/external/chromium_org/components/policy/core/common/
H A Dpolicy_loader_win.cc76 // List of policies that are considered only if the user is part of a AD domain.
336 // Get the computer's domain status.
337 LPWSTR domain; local
339 if (NERR_Success != ::NetGetJoinInformation(NULL, &domain, &join_status)) {
345 ::NetApiBufferFree(domain);
350 // This check will tell us how often are domain computers actually
598 // Map of known 3rd party policy domain name to their enum values.
601 PolicyDomain domain; member in struct:policy::__anon6743
617 const PolicyDomain domain = k3rdPartyDomains[i].domain; local
[all...]
/external/chromium_org/net/cert/
H A Dx509_util_nss.cc296 const std::string& domain,
323 (unsigned char*)domain.data(),
324 static_cast<unsigned>(domain.size())
332 LOG(ERROR) << "Unable to get ASN1 encoding for domain in domain_bound_cert"
345 LOG(ERROR) << "Unable to add domain bound cert extension to opaque handle";
294 CreateChannelIDEC(crypto::ECPrivateKey* key, DigestAlgorithm alg, const std::string& domain, uint32 serial_number, base::Time not_valid_before, base::Time not_valid_after, std::string* der_cert) argument
/external/chromium_org/net/dns/
H A Ddns_config_service_win.cc134 // Converts a base::string16 domain name to ASCII, possibly using punycode.
136 // failure, |domain| might become dirty.
137 bool ParseDomainASCII(const base::string16& widestr, std::string* domain) { argument
138 DCHECK(domain);
144 *domain = base::UTF16ToASCII(widestr);
157 bool success = base::UTF16ToUTF8(punycode.data(), punycode.length(), domain);
159 DCHECK(base::IsStringASCII(*domain));
160 return success && !domain->empty();
418 // value by comparing the forest root domain (FRD) to the primary suffix.
/external/chromium_org/net/ssl/
H A Dchannel_id_service.cc48 // Synchronously found and returned an existing domain bound cert.
50 // Retrieved or generated and returned a domain bound cert asynchronously.
389 std::string domain = local
392 if (domain.empty())
394 return domain;
412 std::string domain = GetDomainForHost(host); local
413 if (domain.empty()) {
420 // See if a request for the same domain is currently in flight.
422 if (JoinToInFlightRequest(request_start, domain, private_key, cert,
427 int err = LookupChannelID(request_start, domain, private_ke
475 std::string domain = GetDomainForHost(host); local
592 JoinToInFlightRequest( const base::TimeTicks& request_start, const std::string& domain, std::string* private_key, std::string* cert, bool create_if_missing, const CompletionCallback& callback, RequestHandle* out_req) argument
622 LookupChannelID( const base::TimeTicks& request_start, const std::string& domain, std::string* private_key, std::string* cert, bool create_if_missing, const CompletionCallback& callback, RequestHandle* out_req) argument
[all...]
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
H A DCookieParser.js283 domain: function()
285 return this._attributes["domain"];
359 PageAgent.deleteCookie(this.name(), (this.secure() ? "https://" : "http://") + this.domain() + this.path(), callback);
399 cookie.addAttribute("domain", protocolCookie["domain"]);
420 if (!url || !WebInspector.Cookies.cookieDomainMatchesResourceDomain(cookie.domain(), url.host))
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nv50/codegen/
H A Dnv50_ir_driver.h143 uint8_t domain; /* PIPE_PRIM_{QUADS,TRIANGLES,LINES} */ member in struct:nv50_ir_prog_info::__anon13833::__anon13835
/external/chromium_org/third_party/webrtc/base/
H A Dlogging.cc406 CFStringRef domain = CFBundleGetIdentifier(CFBundleGetMainBundle()); local
407 if (key != NULL && domain != NULL) {
410 CFPreferencesGetAppBooleanValue(key, domain, &exists_and_is_valid);
/external/chromium_org/ui/gfx/
H A Dtext_elider.cc41 // If possible, only the username is elided. Otherwise, the domain is elided
44 // width, the elided domain will occupy that extra width.
51 // Split the email into its local-part (username) and domain-part. The email
53 // but not in the domain part, so splitting at the last @ symbol is safe.
57 base::string16 domain = email.substr(split_index + 1); local
59 DCHECK(!domain.empty());
65 // Check whether eliding the domain is necessary: if eliding the username
66 // is sufficient, the domain will not be elided.
73 if (GetStringWidthF(domain, font_list) > available_domain_width) {
74 // Elide the domain s
[all...]
/external/dnsmasq/src/
H A Ddhcp.c839 config->domain = NULL;
883 Also check that FQDNs match the domain we are using. */
889 char *domain; local
905 /* split off domain part */
906 if ((configs->flags & CONFIG_NAME) && (domain = strip_hostname(configs->hostname)))
907 configs->domain = domain;
959 for this address. If it has a domain part, that must match the set domain and
960 it gets stripped. The set of legal domain name
[all...]
H A Dforward.c114 unsigned short qtype, char *qdomain, int *type, char **domain)
117 /* If the query ends in the domain in one of our servers, set
118 domain to point to that name. We find the largest match to allow both
119 domain.org and sub.domain.org to exist. */
127 /* domain matches take priority over NODOTS matches */
152 unsigned int domainlen = strlen(serv->domain);
155 hostname_isequal(matchstart, serv->domain) &&
157 (domainlen == 0 || namelen == domainlen || *(serv->domain) == '.' || *(matchstart-1) == '.' ))
161 *domain
113 search_servers(time_t now, struct all_addr **addrpp, unsigned short qtype, char *qdomain, int *type, char **domain) argument
208 char *domain = NULL; local
792 char *domain = NULL; local
[all...]
/external/llvm/lib/CodeGen/
H A DExecutionDepsFix.cpp19 // This pass changes the variant instructions to minimize domain crossings.
41 /// execution domain. Multiple registers may refer to the same open
43 /// domain.
49 /// domain, but if we were forced to pay the penalty of a domain crossing, we
74 // Is domain available?
75 bool hasDomain(unsigned domain) const {
76 return AvailableDomains & (1u << domain);
79 // Mark domain as available.
80 void addDomain(unsigned domain) { argument
85 setSingleDomain(unsigned domain) argument
283 force(int rx, unsigned domain) argument
306 collapse(DomainValue *dv, unsigned domain) argument
578 visitHardInstr(MachineInstr *mi, unsigned domain) argument
636 unsigned domain = countTrailingZeros(available); local
[all...]
/external/mdnsresponder/mDNSShared/
H A Ddnssd_clientshim.c214 const char *domain, /* may be NULL */
240 if (!MakeDomainNameFromDNSNameString(&d, (domain && *domain) ? domain : "local.")) { errormsg = "Bad Domain"; goto badparam; }
262 &x->name, &t, &d, // Name, type, domain
277 LogMsg("DNSServiceBrowse(\"%s\", \"%s\") failed: %s (%ld)", regtype, domain, errormsg, err);
358 domainname type, domain; local
368 if (!DeconstructServiceName(&answer->rdata->u.name, &name, &type, &domain))
377 ConvertDomainNameToCString(&domain, cdom);
388 const char *domain, /* ma
207 DNSServiceRegister( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, const char *host, uint16_t notAnIntPort, uint16_t txtLen, const void *txtRecord, DNSServiceRegisterReply callback, void *context ) argument
382 DNSServiceBrowse( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *regtype, const char *domain, DNSServiceBrowseReply callback, void *context ) argument
464 DNSServiceResolve( DNSServiceRef *sdRef, DNSServiceFlags flags, uint32_t interfaceIndex, const char *name, const char *regtype, const char *domain, DNSServiceResolveReply callback, void *context ) argument
[all...]
/external/mesa3d/src/gallium/drivers/nv50/codegen/
H A Dnv50_ir_driver.h143 uint8_t domain; /* PIPE_PRIM_{QUADS,TRIANGLES,LINES} */ member in struct:nv50_ir_prog_info::__anon27244::__anon27246
/external/ppp/pppd/plugins/rp-pppoe/
H A Dif.c424 int domain, stype; local
435 domain = PF_PACKET;
438 domain = PF_INET;
442 if ((fd = socket(domain, stype, htons(type))) < 0) {
/external/ppp/pppd/plugins/
H A Dwinbind.c251 const char *domain,
337 if (domain) {
338 char *b64_domain = base64_encode(domain);
525 char *domain; local
534 /* remove domain from "domain\username" */
542 /* remove domain from "domain\username" */
545 domain = domainname;
547 domain
250 run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) argument
[all...]
/external/chromium_org/chrome/browser/profile_resetter/
H A Djtl_interpreter.cc271 // Stores the hash of the registerable domain name -- as in, the portion of the
272 // domain that is registerable, as opposed to controlled by a registrar; without
283 std::string domain; variable
285 !GetRegisterableDomain(possibly_invalid_url, &domain))
288 hashed_name_, new base::StringValue(context->GetHash(domain)));
293 // If |possibly_invalid_url| is a valid URL having a registerable domain name
310 // well-formed domain name consisting of at least one subcomponent; followed
/external/chromium_org/chrome/browser/ui/webui/
H A Dhistory_ui.cc326 base::string16 domain = net::IDNToUnicode(url.host(), accept_languages); local
327 // When the domain is empty, use the scheme instead. This allows for a
328 // sensible treatment of e.g. file: URLs when group by domain is on.
329 if (domain.empty())
330 domain = base::UTF8ToUTF16(url.scheme() + ":");
336 result->SetString("domain", domain);
/external/chromium_org/chrome/renderer/
H A Dcontent_settings_observer.cc110 static bool IsHostInDomain(const std::string& host, const std::string& domain) { argument
111 return (EndsWith(host, domain, false) &&
112 (host.length() == domain.length() ||
113 (host.length() > domain.length() &&
114 host[host.length() - domain.length() - 1] == '.')));
/external/chromium_org/chromeos/dbus/
H A Dfake_cryptohome_client.cc417 const std::string& domain,
413 TpmAttestationSignEnterpriseChallenge( attestation::AttestationKeyType key_type, const std::string& user_id, const std::string& key_name, const std::string& domain, const std::string& device_id, attestation::AttestationChallengeOptions options, const std::string& challenge, const AsyncMethodCallback& callback) argument
/external/chromium_org/components/user_manager/
H A Duser_manager_base.cc752 const std::string domain = gaia::ExtractDomainName(*it); local
753 if (domain == chromeos::login::kSupervisedUserDomain)
/external/chromium_org/content/browser/gpu/
H A Dgpu_data_manager_impl_private.cc432 // 1. If the specific domain is blocked, then unblock it.
435 // This is necessary even if the specific domain was blocked.
436 // Otherwise, if we call Are3DAPIsBlocked with the same domain right
438 // the recent GPU reset caused by that domain.
442 std::string domain = GetDomainFromURL(url); local
444 blocked_domains_.erase(domain);
1024 // domain. This does mean that a.foo.com and b.foo.com will be
1025 // treated independently in the blocking of a given domain, but it
1027 // top-level domain from a URL.
1042 std::string domain
[all...]
/external/chromium_org/content/browser/net/
H A Dsqlite_persistent_cookie_store.cc63 // that single domain key (eTLD+1)'s cookies, and posts a Backend::
98 // Loads cookies for the domain key (eTLD+1).
99 void LoadCookiesForKey(const std::string& domain,
156 // Loads cookies for the domain key (eTLD+1) on background runner.
161 // Notifies the CookieMonster when loading completes for a specific domain key
162 // or for all domain keys. Triggers the callback and passes it all cookies
188 // Loads cookies for the next domain key from the DB, then either reschedules
230 // individual load requests for domain keys or when all loading completes.
233 // Map of domain keys(eTLD+1) to domains/hosts that are to be loaded from DB.
236 // Map of (domain key
633 const std::string& domain = host_keys[idx]; local
[all...]

Completed in 2477 milliseconds

1234567891011>>