/external/webkit/WebCore/storage/ |
DatabaseTracker.h | 49 class SecurityOrigin; 68 void setDatabaseDetails(SecurityOrigin*, const String& name, const String& displayName, unsigned long estimatedSize); 69 String fullPathForDatabase(SecurityOrigin*, const String& name, bool createIfDoesNotExist = true); 73 void getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<Database> >* databases); 82 typedef HashMap<RefPtr<SecurityOrigin>, DatabaseNameMap*, SecurityOriginHash> DatabaseOriginMap; 92 void origins(Vector<RefPtr<SecurityOrigin> >& result); 93 bool databaseNamesForOrigin(SecurityOrigin*, Vector<String>& result); 95 DatabaseDetails detailsForNameAndOrigin(const String&, SecurityOrigin*); 97 unsigned long long usageForDatabase(const String&, SecurityOrigin*); 98 unsigned long long usageForOrigin(SecurityOrigin*); [all...] |
OriginQuotaManager.h | 51 void trackOrigin(PassRefPtr<SecurityOrigin>); 52 bool tracksOrigin(SecurityOrigin*) const; 53 void addDatabase(SecurityOrigin*, const String& databaseIdentifier, const String& fullPath); 54 void removeDatabase(SecurityOrigin*, const String& databaseIdentifier); 55 void removeOrigin(SecurityOrigin*); 58 unsigned long long diskUsage(SecurityOrigin*) const; 66 typedef HashMap<RefPtr<SecurityOrigin>, OriginUsageRecord*, SecurityOriginHash> OriginUsageMap;
|
OriginQuotaManager.cpp | 61 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) 69 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const 75 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) 85 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) 93 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) 107 OriginUsageRecord* usageRecord = m_usageMap.get(database->securityOrigin()); 113 unsigned long long OriginQuotaManager::diskUsage(SecurityOrigin* origin) const
|
StorageEventDispatcher.cpp | 36 #include "SecurityOrigin.h" 41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) 53 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 65 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
DatabaseTrackerClient.h | 35 class SecurityOrigin; 41 virtual void dispatchDidModifyOrigin(SecurityOrigin*) = 0; 42 virtual void dispatchDidModifyDatabase(SecurityOrigin*, const String& databaseName) = 0;
|
StorageAreaImpl.h | 38 class SecurityOrigin; 44 static PassRefPtr<StorageAreaImpl> create(StorageType, PassRefPtr<SecurityOrigin>, PassRefPtr<StorageSyncManager>, unsigned quota); 63 StorageAreaImpl(StorageType, PassRefPtr<SecurityOrigin>, PassRefPtr<StorageSyncManager>, unsigned quota); 69 RefPtr<SecurityOrigin> m_securityOrigin;
|
DatabaseTracker.cpp | 43 #include "SecurityOrigin.h" 131 SecurityOrigin* origin = context->securityOrigin(); 150 pair<SecurityOrigin*, DatabaseDetails> details(origin, DatabaseDetails(name, displayName, estimatedSize, 0)); 159 bool DatabaseTracker::hasEntryForOrigin(SecurityOrigin* origin) 167 bool DatabaseTracker::hasEntryForDatabase(SecurityOrigin* origin, const String& databaseIdentifier) 190 SecurityOrigin* origin = database->securityOrigin(); 194 String DatabaseTracker::originPath(SecurityOrigin* origin) const 200 String DatabaseTracker::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool createIfNotExists [all...] |
/external/webkit/WebCore/page/ |
SecurityOriginHash.h | 33 #include "SecurityOrigin.h" 39 static unsigned hash(SecurityOrigin* origin) 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) 53 static bool equal(SecurityOrigin* a, SecurityOrigin* b) 57 // SecurityOrigin as mentioned in SecurityOrigin.h so we don't accidentally change 63 static bool equal(SecurityOrigin* a, const RefPtr<SecurityOrigin>& b) 67 static bool equal(const RefPtr<SecurityOrigin>& a, SecurityOrigin* b [all...] |
SecurityOrigin.h | 48 class SecurityOrigin : public ThreadSafeShared<SecurityOrigin> { 50 static PassRefPtr<SecurityOrigin> createFromDatabaseIdentifier(const String&); 51 static PassRefPtr<SecurityOrigin> createFromString(const String&); 52 static PassRefPtr<SecurityOrigin> create(const KURL&, SandboxFlags = SandboxNone); 53 static PassRefPtr<SecurityOrigin> createEmpty(); 55 // Create a deep copy of this SecurityOrigin. This method is useful 56 // when marshalling a SecurityOrigin to another thread. 57 PassRefPtr<SecurityOrigin> threadsafeCopy(); 73 // Returns true if this SecurityOrigin can script objects in the give [all...] |
SecurityOrigin.cpp | 30 #include "SecurityOrigin.h" 40 static SecurityOrigin::LocalLoadPolicy localLoadPolicy = SecurityOrigin::AllowLocalLoadsForLocalOnly; 80 SecurityOrigin::SecurityOrigin(const KURL& url, SandboxFlags sandboxFlags) 108 SecurityOrigin::SecurityOrigin(const SecurityOrigin* other) 121 bool SecurityOrigin::isEmpty() const 126 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const KURL& url, SandboxFlags sandboxFlags [all...] |
/external/webkit/WebKit/gtk/webkit/ |
webkitsecurityorigin.cpp | 65 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 66 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 76 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 77 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 90 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 94 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value)); 104 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 108 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin)); 111 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin)); 114 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin)); [all...] |
webkitsecurityorigin.h | 57 webkit_security_origin_get_protocol (WebKitSecurityOrigin* securityOrigin); 60 webkit_security_origin_get_host (WebKitSecurityOrigin* securityOrigin); 63 webkit_security_origin_get_port (WebKitSecurityOrigin* securityOrigin); 66 webkit_security_origin_get_web_database_usage (WebKitSecurityOrigin* securityOrigin); 69 webkit_security_origin_get_web_database_quota (WebKitSecurityOrigin* securityOrigin); 72 webkit_security_origin_set_web_database_quota (WebKitSecurityOrigin* securityOrigin, guint64 quota); 75 webkit_security_origin_get_all_web_databases (WebKitSecurityOrigin* securityOrigin);
|
/external/webkit/WebKit/android/jni/ |
WebStorage.cpp | 37 #include <WebCore/page/SecurityOrigin.h> 44 Vector<RefPtr<WebCore::SecurityOrigin> > coreOrigins; 50 RefPtr<WebCore::SecurityOrigin> manifestOrigin = WebCore::SecurityOrigin::create(manifestUrls[i]); 63 WebCore::SecurityOrigin* origin = coreOrigins[i].get(); 76 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); 77 unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get()); 84 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr) [all...] |
/external/webkit/WebKit/mac/Storage/ |
WebSecurityOrigin.mm | 33 #import <WebCore/SecurityOrigin.h> 44 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(KURL([url absoluteURL])); 53 return reinterpret_cast<SecurityOrigin*>(_private)->protocol(); 58 return reinterpret_cast<SecurityOrigin*>(_private)->host(); 69 return reinterpret_cast<SecurityOrigin*>(_private)->port(); 75 return DatabaseTracker::tracker().usageForOrigin(reinterpret_cast<SecurityOrigin*>(_private)); 84 return DatabaseTracker::tracker().quotaForOrigin(reinterpret_cast<SecurityOrigin*>(_private)); 96 DatabaseTracker::tracker().setQuota(reinterpret_cast<SecurityOrigin*>(_private), quota); 112 reinterpret_cast<SecurityOrigin*>(_private)->deref() [all...] |
/external/webkit/WebKit/chromium/src/ |
WebSecurityPolicy.cpp | 35 #include "SecurityOrigin.h" 46 SecurityOrigin::registerURLSchemeAsLocal(scheme); 51 SecurityOrigin::registerURLSchemeAsNoAccess(scheme); 59 SecurityOrigin::whiteListAccessFromOrigin( 60 *SecurityOrigin::create(sourceOrigin), destinationProtocol, 66 SecurityOrigin::resetOriginAccessWhiteLists(); 71 return SecurityOrigin::shouldHideReferrer(url, referrer);
|
WebSecurityOrigin.cpp | 34 #include "SecurityOrigin.h" 42 class WebSecurityOriginPrivate : public SecurityOrigin { 47 return new WebSecurityOrigin(SecurityOrigin::createFromDatabaseIdentifier(databaseIdentifier)); 52 return WebSecurityOrigin(SecurityOrigin::createFromString(origin)); 104 WebSecurityOrigin::WebSecurityOrigin(const WTF::PassRefPtr<WebCore::SecurityOrigin>& origin) 109 WebSecurityOrigin& WebSecurityOrigin::operator=(const WTF::PassRefPtr<WebCore::SecurityOrigin>& origin) 115 WebSecurityOrigin::operator WTF::PassRefPtr<WebCore::SecurityOrigin>() const 117 return PassRefPtr<SecurityOrigin>(const_cast<WebSecurityOriginPrivate*>(m_private));
|
WebStorageEventDispatcherImpl.cpp | 37 #include "SecurityOrigin.h" 66 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(origin); 67 m_eventDispatcher->dispatchStorageEvent(key, oldValue, newValue, securityOrigin.get(), url, storageType);
|
StorageAreaProxy.cpp | 39 #include "SecurityOrigin.h" 82 storageEvent(key, oldValue, value, m_storageType, frame->document()->securityOrigin(), frame); 91 storageEvent(key, oldValue, String(), m_storageType, frame->document()->securityOrigin(), frame); 100 storageEvent(String(), String(), String(), m_storageType, frame->document()->securityOrigin(), frame); 110 void StorageAreaProxy::storageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) 122 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 134 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) [all...] |
/external/webkit/WebKit/win/ |
WebSecurityOrigin.h | 33 #include <WebCore/SecurityOrigin.h> 38 static WebSecurityOrigin* createInstance(WebCore::SecurityOrigin* origin); 39 static WebSecurityOrigin* createInstance(RefPtr<WebCore::SecurityOrigin> origin) { return createInstance(origin.get()); } 40 WebCore::SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 71 WebSecurityOrigin(WebCore::SecurityOrigin*); 75 RefPtr<WebCore::SecurityOrigin> m_securityOrigin;
|
WebDatabaseManager.cpp | 45 #include <WebCore/SecurityOrigin.h> 195 template<> struct COMVariantSetter<RefPtr<SecurityOrigin> > : COMIUnknownVariantSetter<WebSecurityOrigin, RefPtr<SecurityOrigin> > {}; 220 Vector<RefPtr<SecurityOrigin> > origins; 222 COMPtr<COMEnumVariant<Vector<RefPtr<SecurityOrigin> > > > enumVariant(AdoptCOM, COMEnumVariant<Vector<RefPtr<SecurityOrigin> > >::adopt(origins)); 245 DatabaseTracker::tracker().databaseNamesForOrigin(webSecurityOrigin->securityOrigin(), databaseNames); 271 webSecurityOrigin->securityOrigin()); 303 DatabaseTracker::tracker().deleteOrigin(webSecurityOrigin->securityOrigin()); 325 DatabaseTracker::tracker().deleteDatabase(webSecurityOrigin->securityOrigin(), String(databaseName, SysStringLen(databaseName))) [all...] |
/external/webkit/WebCore/bindings/js/ |
JSDOMWindowCustom.h | 75 const SecurityOrigin* originSecurityOrigin = originWindow->impl()->securityOrigin(); 76 const SecurityOrigin* targetSecurityOrigin = targetWindow->impl()->securityOrigin();
|
/external/webkit/WebKit/qt/Api/ |
qwebsecurityorigin_p.h | 23 #include "SecurityOrigin.h" 28 QWebSecurityOriginPrivate(WebCore::SecurityOrigin* o) 36 WTF::RefPtr<WebCore::SecurityOrigin> origin;
|
qwebsecurityorigin.cpp | 28 #include "SecurityOrigin.h" 35 SecurityOrigin::whiteListAccessFromOrigin(*SecurityOrigin::createFromString(sourceOrigin), destinationProtocol, destinationHost, allowDestinationSubdomains); 40 SecurityOrigin::resetOriginAccessWhiteLists(); 45 SecurityOrigin::setDomainRelaxationForbiddenForURLScheme(forbidden, scheme); 66 Call QWebFrame::securityOrigin() to get the QWebSecurityOrigin for a frame in a 77 \sa QWebFrame::securityOrigin() 182 Vector<RefPtr<SecurityOrigin> > coreOrigins; 226 SecurityOrigin::registerURLSchemeAsLocal(scheme); 238 SecurityOrigin::removeURLSchemeRegisteredAsLocal(scheme) [all...] |
/external/webkit/WebCore/loader/ |
CrossOriginAccessControl.cpp | 33 #include "SecurityOrigin.h" 95 bool passesAccessControlCheck(const ResourceResponse& response, bool includeCredentials, SecurityOrigin* securityOrigin) 103 if (securityOrigin->isUnique()) 106 RefPtr<SecurityOrigin> accessControlOrigin = SecurityOrigin::createFromString(accessControlOriginString); 107 if (!accessControlOrigin->isSameSchemeHostPort(securityOrigin))
|
/external/webkit/WebCore/storage/chromium/ |
DatabaseTrackerChromium.cpp | 40 #include "SecurityOrigin.h" 67 void DatabaseTracker::setDatabaseDetails(SecurityOrigin*, const String&, const String&, unsigned long) 72 String DatabaseTracker::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool) 84 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 87 m_openDatabaseMap->set(database->securityOrigin(), nameMap); 132 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 143 m_openDatabaseMap->remove(database->securityOrigin()); 152 void DatabaseTracker::getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<Database> >* databases) 176 database->securityOrigin()->databaseIdentifier(),
|