/external/webkit/WebCore/page/ |
OriginAccessEntry.cpp | 50 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const 52 ASSERT(origin.host() == origin.host().lower()); 53 ASSERT(origin.protocol() == origin.protocol().lower()); 55 if (m_protocol != origin.protocol()) 63 if (m_host == origin.host()) 75 if (origin.host().length() > m_host.length() && origin.host()[origin.host().length() - m_host.length() - 1] == '.' && origin.host().endsWith(m_host) [all...] |
SecurityOriginHash.h | 39 static unsigned hash(SecurityOrigin* origin) 42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0, 43 origin->host().impl() ? origin->host().impl()->hash() : 0, 44 origin->port() 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) 50 return hash(origin.get());
|
/external/chromium/net/ftp/ |
ftp_auth_cache.cc | 15 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) { 17 if (it->origin == origin) 23 void FtpAuthCache::Add(const GURL& origin, const std::wstring& username, 25 DCHECK(origin.SchemeIs("ftp")); 26 DCHECK_EQ(origin.GetOrigin(), origin); 28 Entry* entry = Lookup(origin); 33 entries_.push_front(Entry(origin, username, password)); 41 void FtpAuthCache::Remove(const GURL& origin, const std::wstring& username [all...] |
ftp_auth_cache.h | 29 Entry(const GURL& origin, const std::wstring& username, 31 : origin(origin), 36 const GURL origin; member in struct:net::FtpAuthCache::Entry 44 // Return Entry corresponding to given |origin| or NULL if not found. 45 Entry* Lookup(const GURL& origin); 47 // Add an entry for |origin| to the cache (consisting of |username| and 48 // |password|). If there is already an entry for |origin|, it will be 50 void Add(const GURL& origin, const std::wstring& username, 53 // Remove the entry for |origin| from the cache, if one exists and matche [all...] |
/external/webkit/WebKit/qt/Api/ |
qwebsecurityorigin_p.h | 31 origin = o; 36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate
|
qwebdatabase.cpp | 42 To get access to all databases defined by a security origin, use QWebSecurityOrigin::databases(). 88 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 101 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 114 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 149 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false); 156 Returns the databases's security origin. 158 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase 160 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get()); 161 QWebSecurityOrigin origin(priv); 162 return origin; [all...] |
qwebdatabase_p.h | 33 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebDatabasePrivate
|
/external/webkit/WebCore/storage/ |
OriginQuotaManager.cpp | 61 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) 64 ASSERT(!m_usageMap.contains(origin.get())); 66 m_usageMap.set(origin, new OriginUsageRecord); 69 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const 72 return m_usageMap.contains(origin); 75 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) 79 OriginUsageRecord* usageRecord = m_usageMap.get(origin); 85 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) 89 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin)) 93 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) [all...] |
DatabaseTracker.cpp | 112 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) { 117 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) { 131 SecurityOrigin* origin = context->securityOrigin(); local 133 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker 135 unsigned long long usage = usageForOrigin(origin); 138 if (hasEntryForDatabase(origin, name)) 145 if (requirement <= quotaForOrigin(origin)) 150 pair<SecurityOrigin*, DatabaseDetails> details(origin, DatabaseDetails(name, displayName, estimatedSize, 0)); 156 return requirement <= quotaForOrigin(origin); 190 SecurityOrigin* origin = database->securityOrigin(); local 276 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local [all...] |
/external/webkit/WebKit/mac/Misc/ |
WebNSWindowExtras.m | 43 NSPoint origin; 44 origin.y = NSMaxY(frameToCenterOver) 47 origin.x = frameToCenterOver.origin.x 49 [self setFrameOrigin:origin];
|
/external/apache-http/src/org/apache/http/cookie/ |
CookieSpec.java | 46 * for a given host, port and path of origin 72 * @param origin details of the cookie origin 76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException; 83 * @param origin details of the cookie origin 86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException; 92 * @param origin the target to test against 97 boolean match(Cookie cookie, CookieOrigin origin);
|
CookieAttributeHandler.java | 62 * @param origin the cookie source to validate against 65 void validate(Cookie cookie, CookieOrigin origin) 73 * @param origin the cookie source to match against 76 boolean match(Cookie cookie, CookieOrigin origin);
|
/external/chromium/net/http/ |
http_auth_cache.cc | 42 // Debug helper to check that |origin| arguments are properly formed. 43 void CheckOriginIsValid(const GURL& origin) { 44 DCHECK(origin.is_valid()); 45 DCHECK(origin.SchemeIs("http") || origin.SchemeIs("https")); 46 DCHECK(origin.GetOrigin() == origin); 63 HttpAuthCache::Entry* HttpAuthCache::LookupByRealm(const GURL& origin, 65 CheckOriginIsValid(origin); 69 if (it->origin() == origin && it->realm() == realm [all...] |
/external/webkit/WebKit/chromium/src/ |
StorageEventDispatcherChromium.cpp | 48 SecurityOrigin* origin, Frame* sourceFrame) 51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage);
|
/external/webkit/WebKit/mac/Storage/ |
WebDatabaseManagerPrivate.h | 37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc 38 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 42 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 56 // Will return an array of strings, the identifiers of each database in the given origin. 57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin; 59 // Will return the dictionary describing everything about the database for the passed identifier and origin. 60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin; 63 - (void)deleteOrigin:(WebSecurityOrigin *)origin; 64 - (void)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
|
WebSecurityOriginInternal.h | 39 - (id)_initWithWebCoreSecurityOrigin:(WebCoreSecurityOrigin *)origin;
|
/external/e2fsprogs/lib/ext2fs/ |
llseek.c | 42 extern long long llseek (int fd, long long offset, int origin); 67 unsigned int, origin) 70 static ext2_loff_t my_llseek (int fd, ext2_loff_t offset, int origin) 81 &result, origin); 90 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) 97 return lseek(fd, (off_t) offset, origin); 104 result = my_llseek (fd, offset, origin); 122 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) 125 return lseek64 (fd, offset, origin); 132 return lseek (fd, (off_t) offset, origin); [all...] |
/external/webkit/WebKit/android/WebCoreSupport/ |
GeolocationPermissions.h | 50 // browser. Permissions are managed on a per-origin basis, as required by 52 // origin specifies the scheme, host and port of particular frame. An 53 // origin is represented here as a string, using the output of 76 // the same origin as the requesting frame. 81 // permission is specified by 'allow' and applied to 'origin'. If 86 void providePermissionState(WebCore::String origin, bool allow, bool remember); 99 // Gets whether the specified origin is allowed. 100 static bool getAllowed(WebCore::String origin); 101 // Clears the permission state for the specified origin. 102 static void clear(WebCore::String origin); 165 WebCore::String origin; member in struct:android::GeolocationPermissions::CallbackData [all...] |
/external/apache-http/src/org/apache/http/impl/cookie/ |
BestMatchSpec.java | 97 final CookieOrigin origin) throws MalformedCookieException { 101 if (origin == null) { 102 throw new IllegalArgumentException("Cookie origin may not be null"); 120 return getStrict().parse(helems, origin); 125 return getNetscape().parse(header, origin); 127 return getCompat().parse(helems, origin); 133 final CookieOrigin origin) throws MalformedCookieException { 137 if (origin == null) { 138 throw new IllegalArgumentException("Cookie origin may not be null"); 141 getStrict().validate(cookie, origin); [all...] |
CookieSpecBase.java | 54 protected static String getDefaultPath(final CookieOrigin origin) { 55 String defaultPath = origin.getPath(); 67 protected static String getDefaultDomain(final CookieOrigin origin) { 68 return origin.getHost(); 71 protected List<Cookie> parse(final HeaderElement[] elems, final CookieOrigin origin) 82 cookie.setPath(getDefaultPath(origin)); 83 cookie.setDomain(getDefaultDomain(origin)); 103 public void validate(final Cookie cookie, final CookieOrigin origin) 108 if (origin == null) { 109 throw new IllegalArgumentException("Cookie origin may not be null") [all...] |
RFC2965Spec.java | 79 final String name, final String value, final CookieOrigin origin) { 81 cookie.setPath(getDefaultPath(origin)); 82 cookie.setDomain(getDefaultDomain(origin)); 87 final String name, final String value, final CookieOrigin origin) { 89 cookie.setPath(getDefaultPath(origin)); 90 cookie.setDomain(getDefaultDomain(origin)); 91 cookie.setPorts(new int [] { origin.getPort() }); 98 CookieOrigin origin) throws MalformedCookieException { 102 if (origin == null) { 103 throw new IllegalArgumentException("Cookie origin may not be null") [all...] |
BasicSecureHandler.java | 53 public boolean match(final Cookie cookie, final CookieOrigin origin) { 57 if (origin == null) { 58 throw new IllegalArgumentException("Cookie origin may not be null"); 60 return !cookie.isSecure() || origin.isSecure();
|
/external/quake/quake/src/WinQuake/ |
snd_null.cpp | 53 void S_StaticSound (sfx_t *sfx, vec3_t origin, float vol, float attenuation)
57 void S_StartSound (int entnum, int entchannel, sfx_t *sfx, vec3_t origin, float fvol, float attenuation)
74 void S_Update (vec3_t origin, vec3_t v_forward, vec3_t v_right, vec3_t v_up)
|
/frameworks/base/core/java/android/webkit/ |
WebStorage.java | 68 private static final String ORIGIN = "origin"; 73 private Map <String, Origin> mOrigins; 78 static class Origin { 83 public Origin(String origin, long quota, long usage) { 84 mOrigin = origin; 89 public Origin(String origin, long quota) { 90 mOrigin = origin; [all...] |
/external/webkit/WebKit/chromium/public/ |
WebStorageEventDispatcher.h | 50 const WebString& newValue, const WebString& origin,
|