/external/chromium_org/chrome/common/mac/ |
H A D | mock_launchd.cc | 259 bool MockLaunchd::RestartJob(Domain domain, argument 269 Domain domain, 276 bool MockLaunchd::WritePlistToFile(Domain domain, argument 284 bool MockLaunchd::DeletePlist(Domain domain, argument 268 CreatePlistFromFile( Domain domain, Type type, CFStringRef name) argument
|
/external/chromium_org/components/nacl/renderer/ |
H A D | file_downloader.cc | 85 if (error.domain.equals(blink::WebString::fromUTF8(net::kErrorDomain))) {
|
/external/chromium_org/components/policy/core/common/cloud/ |
H A D | cloud_policy_manager.h | 65 virtual bool IsInitializationComplete(PolicyDomain domain) const OVERRIDE;
|
/external/chromium_org/content/renderer/ |
H A D | renderer_webcookiejar_impl.cc | 54 WebString::fromUTF8(c.domain),
|
/external/chromium_org/media/blink/ |
H A D | test_response_generator.cc | 29 error.domain = WebString::fromUTF8(net::kErrorDomain);
|
/external/chromium_org/sandbox/linux/bpf_dsl/ |
H A D | bpf_dsl_unittest.cc | 57 static int socketpair(int domain, int type, int protocol, int sv[2]) { argument 58 return Syscall::Call(__NR_socketpair, domain, type, protocol, sv); 99 const Arg<int> domain(0), type(1), protocol(2); 100 return If(domain == AF_UNIX &&
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | CookieJar.cpp | 95 cookies.append(Cookie(webCookie.name, webCookie.value, webCookie.domain, webCookie.path,
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | SecurityOrigin.h | 74 // Set the domain property of this security origin to newDomain. This 76 // domain. The caller is responsible for validating newDomain. 82 String domain() const { return m_domain; } function in class:blink::SecurityOrigin 175 // Marks a file:// origin as being in a domain defined by its path. 183 // the value of the SecurityOrigin's domain property. 198 // This method checks for equality, ignoring the value of document.domain
|
/external/chromium_org/third_party/skia/src/gpu/effects/ |
H A D | GrMatrixConvolutionEffect.h | 69 const GrTextureDomain& domain() const { return fDomain; } function in class:GrMatrixConvolutionEffect
|
/external/jmdns/src/javax/jmdns/impl/ |
H A D | ServiceInfoImpl.java | 255 String domain = ""; 260 domain = casePreservedType.substring(index); 265 domain = removeSeparators(casePreservedType.substring(index)); 291 domain = casePreservedType.substring(start, end); 303 qualifiedNameMap.put(Fields.Domain, removeSeparators(domain)); 315 // Optional domain 316 String domain = (qualifiedNameMap.containsKey(Fields.Domain) ? qualifiedNameMap.get(Fields.Domain) : "local"); 317 if ((domain == null) || (domain.length() == 0)) { 318 domain [all...] |
/external/kernel-headers/original/uapi/linux/ |
H A D | cciss_ioctl.h | 15 unsigned short domain; member in struct:_cciss_pci_info_struct
|
/external/mdnsresponder/mDNSPosix/ |
H A D | ProxyResponder.c | 132 const char name[], const char type[], const char domain[], 142 MakeDomainNameFromDNSNameString(&d, domain); 156 &n, &t, &d, // Name, type, domain 208 const char name[], const char type[], const char domain[]) 215 MakeDomainNameFromDNSNameString(&d, domain); 131 RegisterService(mDNS *m, ServiceRecordSet *recordset, const char name[], const char type[], const char domain[], const domainname *host, mDNSu16 PortAsNumber, int argc, char **argv) argument 207 RegisterNoSuchService(mDNS *m, AuthRecord *const rr, domainname *proxyhostname, const char name[], const char type[], const char domain[]) argument
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | ProtectionDomainTest.java | 245 // public PermissionCollection getPermissions(ProtectionDomain domain) { 246 // return super.getPermissions(domain); 248 public boolean implies(ProtectionDomain domain, Permission permission) { argument 249 if (trackPD != null && trackPD == domain) { 252 return super.implies(domain, permission);
|
/external/chromium_org/chrome/browser/chromeos/login/ |
H A D | profile_auth_data.cc | 89 // As an additional precaution, the cookie's domain is checked. If the domain 275 const std::string& domain = cookie.Domain(); local 276 return domain.find("google") != std::string::npos || 277 domain.find("youtube") != std::string::npos;
|
/external/chromium_org/chrome/browser/chromeos/policy/ |
H A D | user_cloud_policy_manager_chromeos.cc | 185 PolicyDomain domain) const { 186 if (!CloudPolicyManager::IsInitializationComplete(domain)) 188 if (domain == POLICY_DOMAIN_CHROME)
|
/external/chromium_org/chrome/browser/extensions/api/cookies/ |
H A D | cookies_unittest.cc | 33 const char* domain; member in struct:extensions::__anon3663::DomainMatchCase 92 EXPECT_EQ("www.foobar.com", cookie1->domain); 171 tests[i].domain,
|
/external/chromium_org/chrome/browser/resources/net_internals/ |
H A D | browser_bridge.js | 183 sendHSTSQuery: function(domain) { 184 this.send('hstsQuery', [domain]); 187 sendHSTSAdd: function(domain, sts_include_subdomains, 189 this.send('hstsAdd', [domain, sts_include_subdomains, 193 sendHSTSDelete: function(domain) { 194 this.send('hstsDelete', [domain]);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
H A D | ui_manager.cc | 39 std::string domain; member in struct:SafeBrowsingUIManager::WhiteListedEntry 125 // and domain. 253 // Whitelist this domain and warning type for the given tab. 257 entry.domain = net::registry_controlled_domains::GetDomainAndRegistry( 267 // and domain. 285 return entry.domain ==
|
/external/chromium_org/chrome/browser/ui/views/sync/ |
H A D | profile_signin_confirmation_dialog_views.cc | 170 const base::string16 domain = local 176 domain, &offset); 183 gfx::Range(offset, offset + domain.size()), bold_style);
|
/external/chromium_org/chrome/common/local_discovery/ |
H A D | service_discovery_client_impl.h | 38 const std::string& domain, 230 LocalDomainResolverImpl(const std::string& domain, 238 const std::string& domain() { return domain_; } function in class:local_discovery::LocalDomainResolverImpl
|
/external/chromium_org/components/domain_reliability/ |
H A D | config_unittest.cc | 18 config->domain = "example"; 92 config->domain = ""; 199 EXPECT_EQ("test.example", config->domain);
|
H A D | test_util.cc | 168 const std::string& domain) { 195 config->domain = domain; 167 MakeTestConfigWithDomain( const std::string& domain) argument
|
/external/chromium_org/content/browser/ |
H A D | site_instance_impl.cc | 255 // We infer web site boundaries based on the registered domain name of the 258 // access each other if they change their document.domain variable. 303 // Only keep the scheme and registered domain as given by GetOrigin. This 314 // If this URL has a registered domain, we only want to remember that part. 315 std::string domain = local 319 if (!domain.empty()) { 321 rep.SetHostStr(domain);
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | CookieParser.js | 283 domain: function() 285 return this._attributes["domain"]; 359 PageAgent.deleteCookie(this.name(), (this.secure() ? "https://" : "http://") + this.domain() + this.path(), callback); 399 cookie.addAttribute("domain", protocolCookie["domain"]); 420 if (!url || !WebInspector.Cookies.cookieDomainMatchesResourceDomain(cookie.domain(), url.host))
|
/external/chromium_org/third_party/mesa/src/src/gallium/drivers/nvc0/ |
H A D | nvc0_context.h | 254 struct nouveau_bo *dst, unsigned offset, unsigned domain, 258 struct nouveau_bo *dst, unsigned offset, unsigned domain, 262 struct nouveau_bo *bo, unsigned domain,
|