/third_party/lwip/test/unit/mdns/ |
D | test_mdns.c | 43 struct mdns_domain domain; in START_TEST() local 50 offset = mdns_readname(p, 0, &domain); in START_TEST() 53 fail_unless(domain.length == sizeof(data)); in START_TEST() 54 fail_if(memcmp(&domain.name, data, sizeof(data))); in START_TEST() 62 struct mdns_domain domain; in START_TEST() local 69 offset = mdns_readname(p, 0, &domain); in START_TEST() 72 fail_unless(domain.length == sizeof(data)); in START_TEST() 73 fail_if(memcmp(&domain.name, data, sizeof(data))); in START_TEST() 81 struct mdns_domain domain; in START_TEST() local 88 offset = mdns_readname(p, 0, &domain); in START_TEST() [all …]
|
/third_party/boost/boost/math/special_functions/detail/ |
D | hypergeometric_1F1_negative_b_regions.hpp | 26 static const double domain[][4] = { in hypergeometric_1F1_negative_b_recurrence_region() local 396 static const unsigned total_elements = sizeof(domain) / sizeof(domain[0]); in hypergeometric_1F1_negative_b_recurrence_region() 401 static const double a_max = domain[total_elements - 1][0]; in hypergeometric_1F1_negative_b_recurrence_region() 402 static const double a_min = domain[0][0]; in hypergeometric_1F1_negative_b_recurrence_region() 403 static const double b_max = domain[stride - 1][1]; in hypergeometric_1F1_negative_b_recurrence_region() 404 static const double b_min = domain[0][1]; in hypergeometric_1F1_negative_b_recurrence_region() 431 BOOST_ASSERT(domain[index][0] == a_max); in hypergeometric_1F1_negative_b_recurrence_region() 432 while (domain[index][1] < b) in hypergeometric_1F1_negative_b_recurrence_region() 434 double b0 = domain[index - 1][1]; in hypergeometric_1F1_negative_b_recurrence_region() 435 double b1 = domain[index][1]; in hypergeometric_1F1_negative_b_recurrence_region() [all …]
|
/third_party/gstreamer/gstreamer/libs/gst/net/ |
D | gstptpclock.c | 278 guint domain; member 308 guint domain; member 343 static void emit_ptp_statistics (guint8 domain, const GstStructure * stats); 730 select_best_master_clock (PtpDomainData * domain, GstClockTime now) in select_best_master_clock() argument 737 for (l = domain->announce_senders; l; l = l->next) { in select_best_master_clock() 764 domain->domain); in select_best_master_clock() 765 domain->have_master_clock = FALSE; in select_best_master_clock() 777 if (domain->have_master_clock in select_best_master_clock() 778 && compare_clock_identity (&domain->master_clock_identity, in select_best_master_clock() 780 GST_DEBUG ("Master clock in domain %u did not change", domain->domain); in select_best_master_clock() [all …]
|
/third_party/node/test/parallel/ |
D | test-domain-emit-error-handler-stack.js | 5 const domain = require('domain'); constant 17 const d1 = domain.create(); 18 const d2 = domain.create(); 19 const d3 = domain.create(); 24 if (domain._stack.length !== err.expectedStackLength) { 26 err.expectedStackLength, domain._stack.length); 30 if (process.domain !== err.expectedActiveDomain) { 32 err.expectedActiveDomain, process.domain); 42 if (domain._stack.length !== expectedStackLengthInNextTickCb) { 45 domain._stack.length); [all …]
|
D | test-domain-promise.js | 4 const domain = require('domain'); constant 11 const d = domain.create(); 15 assert.strictEqual(process.domain, d); 21 const d = domain.create(); 25 assert.strictEqual(process.domain, d); 31 const d = domain.create(); 45 const d1 = domain.create(); 46 const d2 = domain.create(); 54 assert.strictEqual(process.domain, d2); 60 const d1 = domain.create(); [all …]
|
D | test-domain-enter-exit.js | 27 const domain = require('domain'); constant 35 const a = domain.create(); 37 const b = domain.create(); 39 const c = domain.create(); 43 assert.deepStrictEqual(domain._stack, [a], 44 `a not pushed: ${names(domain._stack)}`); 47 assert.deepStrictEqual(domain._stack, [a, b], 48 `b not pushed: ${names(domain._stack)}`); 51 assert.deepStrictEqual(domain._stack, [a, b, c], 52 `c not pushed: ${names(domain._stack)}`); [all …]
|
D | test-domain-abort-on-uncaught.js | 10 const domain = require('domain'); constant 15 const d = domain.create(); 27 const d = domain.create(); 39 const d = domain.create(); 51 const d = domain.create(); 65 const d = domain.create(); 75 const d = domain.create(); 89 const d = domain.create(); 109 const d = domain.create(); 110 const d2 = domain.create(); [all …]
|
D | test-domain-thrown-error-handler-stack.js | 4 const domain = require('domain'); constant 10 const d = domain.create(); 11 const d2 = domain.create(); 14 if (domain._stack.length !== 1) { 16 domain._stack.length); 20 if (process.domain !== d) { 21 console.error('active domain should be %j but is %j', d, process.domain); 26 if (domain._stack.length !== 1) { 28 domain._stack.length); 32 if (process.domain !== d) { [all …]
|
/third_party/gettext/gettext-runtime/intl/ |
D | loadmsgcat.c | 720 struct loaded_domain *domain; in _nl_load_domain() local 848 domain = (struct loaded_domain *) malloc (sizeof (struct loaded_domain)); in _nl_load_domain() 849 if (domain == NULL) in _nl_load_domain() 859 domain_file->data = domain; in _nl_load_domain() 861 domain->data = (char *) data; in _nl_load_domain() 862 domain->use_mmap = use_mmap; in _nl_load_domain() 863 domain->mmap_size = size; in _nl_load_domain() 864 domain->must_swap = data->magic != _MAGIC; in _nl_load_domain() 865 domain->malloced = NULL; in _nl_load_domain() 868 revision = W (domain->must_swap, data->revision); in _nl_load_domain() [all …]
|
/third_party/curl/tests/data/ |
D | test31 | 26 Set-Cookie: foobar=name; domain=anything.com; path=/ ; secure 27 Set-Cookie:ismatch=this ; domain=127.0.0.1; path=/silly/ 28 Set-Cookie: overwrite=this ; domain=127.0.0.1; path=/overwrite/ 29 Set-Cookie: overwrite=this2 ; domain=127.0.0.1; path=/overwrite 30 Set-Cookie: sec1value=secure1 ; domain=127.0.0.1; path=/secure1/ ; secure 31 Set-Cookie: sec2value=secure2 ; domain=127.0.0.1; path=/secure2/ ; secure= 32 Set-Cookie: sec3value=secure3 ; domain=127.0.0.1; path=/secure3/ ; secure= 33 Set-Cookie: sec4value=secure4 ; secure=; domain=127.0.0.1; path=/secure4/ ; 34 Set-Cookie: sec5value=secure5 ; secure; domain=127.0.0.1; path=/secure5/ ; 35 Set-Cookie: sec6value=secure6 ; secure ; domain=127.0.0.1; path=/secure6/ ; [all …]
|
/third_party/node/test/addons/make-callback-recurse/ |
D | test.js | 5 const domain = require('domain'); constant 17 }, /^Error: hi from domain error$/); 98 const d1 = domain.create(); 99 const d2 = domain.create(); 100 const d3 = domain.create(); 102 makeCallback({ domain: d1 }, common.mustCall(() => { property 103 assert.strictEqual(d1, process.domain); 104 makeCallback({ domain: d2 }, common.mustCall(() => { property 105 assert.strictEqual(d2, process.domain); 106 makeCallback({ domain: d3 }, common.mustCall(() => { property [all …]
|
/third_party/node/deps/npm/node_modules/tough-cookie/lib/ |
D | memstore.js | 59 MemoryCookieStore.prototype.findCookie = function(domain, path, key, cb) { argument 60 if (!this.idx[domain]) { 63 if (!this.idx[domain][path]) { 66 return cb(null,this.idx[domain][path][key]||null); 69 MemoryCookieStore.prototype.findCookies = function(domain, path, cb) { argument 71 if (!domain) { 103 var domains = permuteDomain(domain) || [domain]; 117 if (!this.idx[cookie.domain]) { 118 this.idx[cookie.domain] = {}; 120 if (!this.idx[cookie.domain][cookie.path]) { [all …]
|
/third_party/node/test/node-api/test_make_callback_recurse/ |
D | test.js | 5 const domain = require('domain'); constant 18 }, /^Error: hi from domain error$/); 99 const d1 = domain.create(); 100 const d2 = domain.create(); 101 const d3 = domain.create(); 103 makeCallback({ domain: d1 }, common.mustCall(function() { property 104 assert.strictEqual(d1, process.domain); 105 makeCallback({ domain: d2 }, common.mustCall(function() { property 106 assert.strictEqual(d2, process.domain); 107 makeCallback({ domain: d3 }, common.mustCall(function() { property [all …]
|
/third_party/node/lib/ |
D | domain.js | 74 if (process.domain !== null && process.domain !== undefined) { 76 pairing.set(asyncId, process.domain[kWeak]); 83 value: process.domain, 103 const domain = current.get(); 105 domain.exit(); 146 const domain = this.domain; 147 if (exports.active && domain) 150 if (domain) 151 domain.enter(); 153 if (domain) [all …]
|
/third_party/libpsl/fuzz/ |
D | libpsl_fuzzer.c | 49 char *domain, *res; in LLVMFuzzerTestOneInput() local 55 domain = (char *) malloc(size + 1); in LLVMFuzzerTestOneInput() 56 assert(domain != NULL); in LLVMFuzzerTestOneInput() 59 memcpy(domain, data, size); in LLVMFuzzerTestOneInput() 60 domain[size] = 0; in LLVMFuzzerTestOneInput() 64 psl_is_public_suffix(psl, domain); in LLVMFuzzerTestOneInput() 65 psl_is_public_suffix2(psl, domain, PSL_TYPE_PRIVATE); in LLVMFuzzerTestOneInput() 66 psl_is_public_suffix2(psl, domain, PSL_TYPE_ICANN); in LLVMFuzzerTestOneInput() 67 psl_is_public_suffix2(psl, domain, PSL_TYPE_NO_STAR_RULE); in LLVMFuzzerTestOneInput() 68 psl_is_public_suffix2(psl, domain, PSL_TYPE_NO_STAR_RULE|PSL_TYPE_ANY); in LLVMFuzzerTestOneInput() [all …]
|
/third_party/libpsl/tests/ |
D | test-is-public-all.c | 70 static void test_ps(const psl_ctx_t *psl, const char *domain, int type, int expected) in test_ps() argument 74 if ((result = psl_is_public_suffix2(psl, domain, type)) != expected) { in test_ps() 76 …printf("psl_is_public_suffix2(%s, %s)=%d (expected %d)\n", domain, _type_string(type), result, exp… in test_ps() 81 static void test_type_any(const psl_ctx_t *psl, const char *domain, int type, int expected) in test_type_any() argument 83 int wildcard = (*domain == '.'); in test_type_any() 84 int tld = !(strchr(domain + wildcard, '.')); in test_type_any() 86 test_ps(psl, domain, type, expected); in test_type_any() 87 test_ps(psl, domain, type|PSL_TYPE_NO_STAR_RULE, expected); in test_type_any() 88 test_ps(psl, domain, PSL_TYPE_ANY, expected); in test_type_any() 89 test_ps(psl, domain, PSL_TYPE_ANY|PSL_TYPE_NO_STAR_RULE, expected); in test_type_any() [all …]
|
D | test-registrable-domain.c | 53 static void testx(const psl_ctx_t *psl, const char *domain, const char *encoding, const char *lang,… in testx() argument 60 psl_str_to_utf8lower(domain, encoding, lang, NULL); in testx() 62 if ((rc = psl_str_to_utf8lower(domain, encoding, lang, &lower)) == PSL_SUCCESS) in testx() 63 domain = lower; in testx() 66 else if (domain) { in testx() 69 printf("psl_str_to_utf8lower(%s)=%d\n", domain ? domain : "NULL", rc); in testx() 74 result = psl_registrable_domain(psl, domain); in testx() 81 … domain ? domain : "NULL", result ? result : "NULL", expected_result ? expected_result : "NULL"); in testx() 87 static void test(const psl_ctx_t *psl, const char *domain, const char *expected_result) in test() argument 89 testx(psl, domain, "utf-8", "en", expected_result); in test() [all …]
|
/third_party/node/deps/npm/node_modules/psl/ |
D | index.js | 38 internals.findRule = function (domain) { argument 40 var punyDomain = Punycode.toASCII(domain); 148 var domain = input.slice(0).toLowerCase(); 152 if (domain.charAt(domain.length - 1) === '.') { 153 domain = domain.slice(0, domain.length - 1); 157 var error = internals.validate(domain); 172 domain: null, property 177 var domainParts = domain.split('.'); 186 if (!/xn--/.test(domain)) { 189 if (parsed.domain) { [all …]
|
/third_party/libsoup/libsoup/ |
D | soup-auth-domain.c | 75 soup_auth_domain_init (SoupAuthDomain *domain) in G_DEFINE_ABSTRACT_TYPE_WITH_PRIVATE() 77 SoupAuthDomainPrivate *priv = soup_auth_domain_get_instance_private (domain); in G_DEFINE_ABSTRACT_TYPE_WITH_PRIVATE() 321 soup_auth_domain_add_path (SoupAuthDomain *domain, const char *path) in soup_auth_domain_add_path() argument 323 SoupAuthDomainPrivate *priv = soup_auth_domain_get_instance_private (domain); in soup_auth_domain_add_path() 353 soup_auth_domain_remove_path (SoupAuthDomain *domain, const char *path) in soup_auth_domain_remove_path() argument 355 SoupAuthDomainPrivate *priv = soup_auth_domain_get_instance_private (domain); in soup_auth_domain_remove_path() 410 soup_auth_domain_set_filter (SoupAuthDomain *domain, in soup_auth_domain_set_filter() argument 415 SoupAuthDomainPrivate *priv = soup_auth_domain_get_instance_private (domain); in soup_auth_domain_set_filter() 424 g_object_notify (G_OBJECT (domain), SOUP_AUTH_DOMAIN_FILTER); in soup_auth_domain_set_filter() 425 g_object_notify (G_OBJECT (domain), SOUP_AUTH_DOMAIN_FILTER_DATA); in soup_auth_domain_set_filter() [all …]
|
D | soup-hsts-enforcer.c | 108 const char *domain) in soup_hsts_enforcer_get_host_policy() argument 110 return g_hash_table_lookup (hsts_enforcer->priv->host_policies, domain); in soup_hsts_enforcer_get_host_policy() 115 const char *domain) in soup_hsts_enforcer_get_session_policy() argument 117 return g_hash_table_lookup (hsts_enforcer->priv->session_policies, domain); in soup_hsts_enforcer_get_session_policy() 122 const char *domain) in soup_hsts_enforcer_real_has_valid_policy() argument 126 if (soup_hsts_enforcer_get_session_policy (hsts_enforcer, domain)) in soup_hsts_enforcer_real_has_valid_policy() 129 policy = soup_hsts_enforcer_get_host_policy (hsts_enforcer, domain); in soup_hsts_enforcer_real_has_valid_policy() 249 const char *domain) in soup_hsts_enforcer_remove_host_policy() argument 253 policy = g_hash_table_lookup (hsts_enforcer->priv->host_policies, domain); in soup_hsts_enforcer_remove_host_policy() 258 g_hash_table_remove (hsts_enforcer->priv->host_policies, domain); in soup_hsts_enforcer_remove_host_policy() [all …]
|
D | soup-auth-domain.h | 28 char * (*accepts) (SoupAuthDomain *domain, 31 char * (*challenge) (SoupAuthDomain *domain, 33 gboolean (*check_password) (SoupAuthDomain *domain, 53 typedef gboolean (*SoupAuthDomainFilter) (SoupAuthDomain *domain, 57 typedef gboolean (*SoupAuthDomainGenericAuthCallback) (SoupAuthDomain *domain, 66 void soup_auth_domain_add_path (SoupAuthDomain *domain, 69 void soup_auth_domain_remove_path (SoupAuthDomain *domain, 73 void soup_auth_domain_set_filter (SoupAuthDomain *domain, 79 const char *soup_auth_domain_get_realm (SoupAuthDomain *domain); 82 void soup_auth_domain_set_generic_auth_callback (SoupAuthDomain *domain, [all …]
|
/third_party/node/tools/inspector_protocol/ |
D | code_generator.py | 349 self.generate_domains = [rule.domain for rule in config.protocol.options] 350 …self.exported_domains = [rule.domain for rule in config.protocol.options if hasattr(rule, "exporte… 355 self.imported_domains = [rule.domain for rule in config.imported.options] 369 for domain in parsed_json["domains"]: 370 domains.append(domain["domain"]) 371 domain["version"] = version 393 for domain in self.json_api["domains"]: 394 patch_full_qualified_refs_in_domain(domain, domain["domain"]) 413 for domain in self.json_api["domains"]: 414 domain_name = domain["domain"] [all …]
|
/third_party/node/doc/api/ |
D | domain.md | 8 `.domain` property. Their handlers are still executed in the 9 proper domain, however, and `Promise`s created in the main 10 context still possess a `.domain` property. 13 description: Handlers for `Promise`s are now invoked in the domain in which 21 <!-- source_link=lib/domain.js --> 32 domain emit an `'error'` event, or throw an error, then the domain object 57 In this way, `domain` usage goes hand-in-hand with the cluster module, 68 const d = require('domain').create(); 83 By using the context of a domain, and the resilience of separating our 119 const domain = require('domain'); [all …]
|
/third_party/node/tools/inspector_protocol/templates/ |
D | Exported_h.template | 7 #ifndef {{"_".join(config.protocol.namespace)}}_{{domain.domain}}_api_h 8 #define {{"_".join(config.protocol.namespace)}}_{{domain.domain}}_api_h 29 namespace {{domain.domain}} { 33 {% for type in domain.types %} 34 {% if ("enum" in type) and protocol.is_exported(domain.domain, type.id) %} 43 {% for command in join_arrays(domain, ["commands", "events"]) %} 45 …{% if ("enum" in param) and protocol.is_exported(domain.domain, command.name + "." + param.name) %} 59 {% for type in domain.types %} 60 …= "object") or not ("properties" in type) or not protocol.is_exported(domain.domain, type.id) %}{%… 64 …static std::unique_ptr<protocol::{{domain.domain}}::API::{{type.id}}> fromJSONString(const {{confi… [all …]
|
/third_party/ffmpeg/tests/ref/fate/ |
D | noproxy | 1 The pattern "(null)" does not match the hostname domain.com 2 The pattern "example.com domain.com" matches the hostname domain.com 3 The pattern "example.com other.com" does not match the hostname domain.com 4 The pattern "example.com,domain.com" matches the hostname domain.com 5 The pattern "example.com,domain.com" does not match the hostname otherdomain.com 6 The pattern "example.com, *.domain.com" matches the hostname sub.domain.com 7 The pattern "example.com, *.domain.com" matches the hostname domain.com 8 The pattern "example.com, .domain.com" matches the hostname domain.com 9 The pattern "*" matches the hostname domain.com
|