HomeSort by relevance Sort by last modified time
    Searched refs:origin (Results 1 - 25 of 424) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/webkit/WebCore/page/
OriginAccessEntry.cpp 50 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const
52 ASSERT(origin.host() == origin.host().lower());
53 ASSERT(origin.protocol() == origin.protocol().lower());
55 if (m_protocol != origin.protocol())
63 if (m_host == origin.host())
75 if (origin.host().length() > m_host.length() && origin.host()[origin.host().length() - m_host.length() - 1] == '.' && origin.host().endsWith(m_host)
    [all...]
SecurityOriginHash.h 39 static unsigned hash(SecurityOrigin* origin)
42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0,
43 origin->host().impl() ? origin->host().impl()->hash() : 0,
44 origin->port()
48 static unsigned hash(const RefPtr<SecurityOrigin>& origin)
50 return hash(origin.get());
  /external/chromium/net/ftp/
ftp_auth_cache.cc 15 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) {
17 if (it->origin == origin)
23 void FtpAuthCache::Add(const GURL& origin, const std::wstring& username,
25 DCHECK(origin.SchemeIs("ftp"));
26 DCHECK_EQ(origin.GetOrigin(), origin);
28 Entry* entry = Lookup(origin);
33 entries_.push_front(Entry(origin, username, password));
41 void FtpAuthCache::Remove(const GURL& origin, const std::wstring& username
    [all...]
ftp_auth_cache.h 29 Entry(const GURL& origin, const std::wstring& username,
31 : origin(origin),
36 const GURL origin; member in struct:net::FtpAuthCache::Entry
44 // Return Entry corresponding to given |origin| or NULL if not found.
45 Entry* Lookup(const GURL& origin);
47 // Add an entry for |origin| to the cache (consisting of |username| and
48 // |password|). If there is already an entry for |origin|, it will be
50 void Add(const GURL& origin, const std::wstring& username,
53 // Remove the entry for |origin| from the cache, if one exists and matche
    [all...]
  /external/webkit/WebKit/qt/Api/
qwebsecurityorigin_p.h 31 origin = o;
36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate
qwebdatabase.cpp 42 To get access to all databases defined by a security origin, use QWebSecurityOrigin::databases().
88 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
101 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
114 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
149 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false);
156 Returns the databases's security origin.
158 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase
160 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get());
161 QWebSecurityOrigin origin(priv);
162 return origin;
    [all...]
qwebdatabase_p.h 33 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebDatabasePrivate
  /external/webkit/WebCore/storage/
OriginQuotaManager.cpp 61 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin)
64 ASSERT(!m_usageMap.contains(origin.get()));
66 m_usageMap.set(origin, new OriginUsageRecord);
69 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const
72 return m_usageMap.contains(origin);
75 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath)
79 OriginUsageRecord* usageRecord = m_usageMap.get(origin);
85 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier)
89 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin))
93 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin)
    [all...]
DatabaseTracker.cpp 112 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) {
117 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) {
131 SecurityOrigin* origin = context->securityOrigin(); local
133 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker
135 unsigned long long usage = usageForOrigin(origin);
138 if (hasEntryForDatabase(origin, name))
145 if (requirement <= quotaForOrigin(origin))
150 pair<SecurityOrigin*, DatabaseDetails> details(origin, DatabaseDetails(name, displayName, estimatedSize, 0));
156 return requirement <= quotaForOrigin(origin);
190 SecurityOrigin* origin = database->securityOrigin(); local
276 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local
    [all...]
  /external/webkit/WebKit/mac/Misc/
WebNSWindowExtras.m 43 NSPoint origin;
44 origin.y = NSMaxY(frameToCenterOver)
47 origin.x = frameToCenterOver.origin.x
49 [self setFrameOrigin:origin];
  /external/apache-http/src/org/apache/http/cookie/
CookieSpec.java 46 * for a given host, port and path of origin
72 * @param origin details of the cookie origin
76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException;
83 * @param origin details of the cookie origin
86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException;
92 * @param origin the target to test against
97 boolean match(Cookie cookie, CookieOrigin origin);
CookieAttributeHandler.java 62 * @param origin the cookie source to validate against
65 void validate(Cookie cookie, CookieOrigin origin)
73 * @param origin the cookie source to match against
76 boolean match(Cookie cookie, CookieOrigin origin);
  /external/chromium/net/http/
http_auth_cache.cc 42 // Debug helper to check that |origin| arguments are properly formed.
43 void CheckOriginIsValid(const GURL& origin) {
44 DCHECK(origin.is_valid());
45 DCHECK(origin.SchemeIs("http") || origin.SchemeIs("https"));
46 DCHECK(origin.GetOrigin() == origin);
63 HttpAuthCache::Entry* HttpAuthCache::LookupByRealm(const GURL& origin,
65 CheckOriginIsValid(origin);
69 if (it->origin() == origin && it->realm() == realm
    [all...]
  /external/webkit/WebKit/chromium/src/
StorageEventDispatcherChromium.cpp 48 SecurityOrigin* origin, Frame* sourceFrame)
51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage);
  /external/webkit/WebKit/mac/Storage/
WebDatabaseManagerPrivate.h 37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc
38 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
42 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
56 // Will return an array of strings, the identifiers of each database in the given origin.
57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin;
59 // Will return the dictionary describing everything about the database for the passed identifier and origin.
60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
63 - (void)deleteOrigin:(WebSecurityOrigin *)origin;
64 - (void)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
WebSecurityOriginInternal.h 39 - (id)_initWithWebCoreSecurityOrigin:(WebCoreSecurityOrigin *)origin;
  /external/e2fsprogs/lib/ext2fs/
llseek.c 42 extern long long llseek (int fd, long long offset, int origin);
67 unsigned int, origin)
70 static ext2_loff_t my_llseek (int fd, ext2_loff_t offset, int origin)
81 &result, origin);
90 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin)
97 return lseek(fd, (off_t) offset, origin);
104 result = my_llseek (fd, offset, origin);
122 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin)
125 return lseek64 (fd, offset, origin);
132 return lseek (fd, (off_t) offset, origin);
    [all...]
  /external/webkit/WebKit/android/WebCoreSupport/
GeolocationPermissions.h 50 // browser. Permissions are managed on a per-origin basis, as required by
52 // origin specifies the scheme, host and port of particular frame. An
53 // origin is represented here as a string, using the output of
76 // the same origin as the requesting frame.
81 // permission is specified by 'allow' and applied to 'origin'. If
86 void providePermissionState(WebCore::String origin, bool allow, bool remember);
99 // Gets whether the specified origin is allowed.
100 static bool getAllowed(WebCore::String origin);
101 // Clears the permission state for the specified origin.
102 static void clear(WebCore::String origin);
165 WebCore::String origin; member in struct:android::GeolocationPermissions::CallbackData
    [all...]
  /external/apache-http/src/org/apache/http/impl/cookie/
BestMatchSpec.java 97 final CookieOrigin origin) throws MalformedCookieException {
101 if (origin == null) {
102 throw new IllegalArgumentException("Cookie origin may not be null");
120 return getStrict().parse(helems, origin);
125 return getNetscape().parse(header, origin);
127 return getCompat().parse(helems, origin);
133 final CookieOrigin origin) throws MalformedCookieException {
137 if (origin == null) {
138 throw new IllegalArgumentException("Cookie origin may not be null");
141 getStrict().validate(cookie, origin);
    [all...]
CookieSpecBase.java 54 protected static String getDefaultPath(final CookieOrigin origin) {
55 String defaultPath = origin.getPath();
67 protected static String getDefaultDomain(final CookieOrigin origin) {
68 return origin.getHost();
71 protected List<Cookie> parse(final HeaderElement[] elems, final CookieOrigin origin)
82 cookie.setPath(getDefaultPath(origin));
83 cookie.setDomain(getDefaultDomain(origin));
103 public void validate(final Cookie cookie, final CookieOrigin origin)
108 if (origin == null) {
109 throw new IllegalArgumentException("Cookie origin may not be null")
    [all...]
RFC2965Spec.java 79 final String name, final String value, final CookieOrigin origin) {
81 cookie.setPath(getDefaultPath(origin));
82 cookie.setDomain(getDefaultDomain(origin));
87 final String name, final String value, final CookieOrigin origin) {
89 cookie.setPath(getDefaultPath(origin));
90 cookie.setDomain(getDefaultDomain(origin));
91 cookie.setPorts(new int [] { origin.getPort() });
98 CookieOrigin origin) throws MalformedCookieException {
102 if (origin == null) {
103 throw new IllegalArgumentException("Cookie origin may not be null")
    [all...]
BasicSecureHandler.java 53 public boolean match(final Cookie cookie, final CookieOrigin origin) {
57 if (origin == null) {
58 throw new IllegalArgumentException("Cookie origin may not be null");
60 return !cookie.isSecure() || origin.isSecure();
  /external/quake/quake/src/WinQuake/
snd_null.cpp 53 void S_StaticSound (sfx_t *sfx, vec3_t origin, float vol, float attenuation)
57 void S_StartSound (int entnum, int entchannel, sfx_t *sfx, vec3_t origin, float fvol, float attenuation)
74 void S_Update (vec3_t origin, vec3_t v_forward, vec3_t v_right, vec3_t v_up)
  /frameworks/base/core/java/android/webkit/
WebStorage.java 68 private static final String ORIGIN = "origin";
73 private Map <String, Origin> mOrigins;
78 static class Origin {
83 public Origin(String origin, long quota, long usage) {
84 mOrigin = origin;
89 public Origin(String origin, long quota) {
90 mOrigin = origin;
    [all...]
  /external/webkit/WebKit/chromium/public/
WebStorageEventDispatcher.h 50 const WebString& newValue, const WebString& origin,

Completed in 1126 milliseconds

1 2 3 4 5 6 7 8 91011>>