/external/chromium/chrome/common/ |
content_settings_helper.cc | 14 std::string OriginToString(const GURL& origin) { 15 std::string port_component(origin.IntPort() != url_parse::PORT_UNSPECIFIED ? 16 ":" + origin.port() : ""); 17 std::string scheme_component(!origin.SchemeIs(chrome::kHttpScheme) ? 18 origin.scheme() + chrome::kStandardSchemeSeparator : ""); 19 return scheme_component + origin.host() + port_component; 22 string16 OriginToString16(const GURL& origin) { 23 return UTF8ToUTF16(OriginToString(origin));
|
content_settings_helper.h | 17 // Return simplified string representing origin. If origin is using http or 19 std::string OriginToString(const GURL& origin); 20 string16 OriginToString16(const GURL& origin);
|
/external/webkit/Source/WebCore/page/ |
OriginAccessEntry.cpp | 49 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const 51 ASSERT(origin.host() == origin.host().lower()); 52 ASSERT(origin.protocol() == origin.protocol().lower()); 54 if (m_protocol != origin.protocol()) 62 if (m_host == origin.host()) 74 if (origin.host().length() > m_host.length() && origin.host()[origin.host().length() - m_host.length() - 1] == '.' && origin.host().endsWith(m_host) [all...] |
SecurityOriginHash.h | 39 static unsigned hash(SecurityOrigin* origin) 42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0, 43 origin->host().impl() ? origin->host().impl()->hash() : 0, 44 origin->port() 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) 50 return hash(origin.get());
|
/external/chromium/net/ftp/ |
ftp_auth_cache.cc | 15 FtpAuthCache::Entry::Entry(const GURL& origin, 18 : origin(origin), 29 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) { 31 if (it->origin == origin) 37 void FtpAuthCache::Add(const GURL& origin, const string16& username, 39 DCHECK(origin.SchemeIs("ftp")); 40 DCHECK_EQ(origin.GetOrigin(), origin); [all...] |
ftp_auth_cache.h | 30 Entry(const GURL& origin, const string16& username, 34 const GURL origin; member in struct:net::FtpAuthCache::Entry 42 // Return Entry corresponding to given |origin| or NULL if not found. 43 Entry* Lookup(const GURL& origin); 45 // Add an entry for |origin| to the cache (consisting of |username| and 46 // |password|). If there is already an entry for |origin|, it will be 48 void Add(const GURL& origin, const string16& username, 51 // Remove the entry for |origin| from the cache, if one exists and matches 53 void Remove(const GURL& origin, const string16& username,
|
/external/webkit/Source/WebKit/mac/Misc/ |
WebQuotaManager.h | 30 @discussion This protocol is used to view and manipulate a per-origin storage quota. 36 @param The security origin this will manage. 39 - (id)initWithOrigin:(WebSecurityOrigin *)origin; 42 @method origin 43 @result The security origin this manager is managing. 45 - (WebSecurityOrigin *)origin; 49 @result The current total usage of all relevant items in this security origin in bytes. 55 @result The current quota of security origin in bytes. 61 @param Sets a new quota, in bytes, on this security origin.
|
WebNSWindowExtras.m | 43 NSPoint origin; 44 origin.y = NSMaxY(frameToCenterOver) 47 origin.x = frameToCenterOver.origin.x 49 [self setFrameOrigin:origin];
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebsecurityorigin_p.h | 31 origin = o; 36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate
|
/external/webkit/Source/WebKit2/UIProcess/ |
WebDatabaseManagerProxyClient.cpp | 33 void WebDatabaseManagerProxyClient::didModifyOrigin(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin) 38 m_client.didModifyOrigin(toAPI(databaseManager), toAPI(origin), m_client.clientInfo); 41 void WebDatabaseManagerProxyClient::didModifyDatabase(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin, const String& databaseIdentifier) 46 m_client.didModifyDatabase(toAPI(databaseManager), toAPI(origin), toAPI(databaseIdentifier.impl()), m_client.clientInfo);
|
/external/webkit/Source/WebCore/storage/ |
OriginQuotaManager.cpp | 73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) 76 ASSERT(!m_usageMap.contains(origin.get())); 78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord); 81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const 84 return m_usageMap.contains(origin); 87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) 91 OriginUsageRecord* usageRecord = m_usageMap.get(origin); 97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) 101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin)) 105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) [all...] |
DatabaseTracker.cpp | 126 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) { 132 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) { 141 SecurityOrigin* origin = context->securityOrigin(); local 149 if (!canCreateDatabase(origin, name)) 152 recordCreatingDatabase(origin, name); 154 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker 156 unsigned long long usage = usageForOriginNoLock(origin); 159 if (hasEntryForDatabase(origin, name)) 165 doneCreatingDatabase(origin, name) 229 SecurityOrigin* origin = database->securityOrigin(); local 355 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local [all...] |
/external/webkit/Source/WebKit/mac/Storage/ |
WebDatabaseTrackerClient.mm | 58 static void dispatchToMainThread(WebDatabaseTrackerClient* client, SecurityOrigin* origin) 60 DidModifyOriginData* context = new DidModifyOriginData(client, origin->threadsafeCopy()); 65 DidModifyOriginData(WebDatabaseTrackerClient* client, PassRefPtr<SecurityOrigin> origin) 67 , origin(origin) 75 info->client->dispatchDidModifyOrigin(info->origin.get()); 80 RefPtr<SecurityOrigin> origin; 83 void WebDatabaseTrackerClient::dispatchDidModifyOrigin(SecurityOrigin* origin) 86 DidModifyOriginData::dispatchToMainThread(this, origin); 90 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin]); [all...] |
WebDatabaseManagerPrivate.h | 37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc 38 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 42 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 56 // Will return an array of strings, the identifiers of each database in the given origin. 57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin; 59 // Will return the dictionary describing everything about the database for the passed identifier and origin. 60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin; 63 - (BOOL)deleteOrigin:(WebSecurityOrigin *)origin; 64 - (BOOL)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
|
WebStorageTrackerClient.mm | 57 RefPtr<SecurityOrigin> origin = adoptRef(static_cast<SecurityOrigin*>(context)); 58 WebStorageTrackerClient::sharedWebStorageTrackerClient()->dispatchDidModifyOrigin(origin.get()); 61 void WebStorageTrackerClient::dispatchDidModifyOrigin(PassRefPtr<SecurityOrigin> origin) 63 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin.get()]); 71 PassRefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); 75 callOnMainThread(dispatchDidModifyOriginOnMainThread, origin.leakRef()); 79 dispatchDidModifyOrigin(origin);
|
/external/apache-http/src/org/apache/http/cookie/ |
CookieSpec.java | 46 * for a given host, port and path of origin 72 * @param origin details of the cookie origin 76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException; 83 * @param origin details of the cookie origin 86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException; 92 * @param origin the target to test against 97 boolean match(Cookie cookie, CookieOrigin origin);
|
CookieAttributeHandler.java | 62 * @param origin the cookie source to validate against 65 void validate(Cookie cookie, CookieOrigin origin) 73 * @param origin the cookie source to match against 76 boolean match(Cookie cookie, CookieOrigin origin);
|
/external/chromium/chrome/browser/chromeos/views/ |
copy_background.cc | 23 gfx::Point origin(0, 0); 26 &origin); 28 // Move the origin and paint as if it's paint onto the owner. 29 canvas->TranslateInt(-origin.x(), -origin.y());
|
/external/chromium/chrome/browser/notifications/ |
notifications_prefs_cache.cc | 21 const GURL& origin) { 24 allowed_origins_.insert(origin); 25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end()) 30 const GURL& origin) { 33 denied_origins_.insert(origin); 34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end()) 60 std::string origin; local 62 (*i)->GetAsString(&origin); 63 origin_vector->push_back(GURL(origin)); 67 int NotificationsPrefsCache::HasPermission(const GURL& origin) { [all...] |
notifications_prefs_cache.h | 32 // Checks to see if a given origin has permission to create desktop 35 int HasPermission(const GURL& origin); 37 // Updates the cache with a new origin allowed or denied. 38 void CacheAllowedOrigin(const GURL& origin); 39 void CacheDeniedOrigin(const GURL& origin); 61 bool IsOriginAllowed(const GURL& origin); 62 bool IsOriginDenied(const GURL& origin);
|
/external/chromium/webkit/glue/ |
form_data.cc | 16 origin(data.origin), 28 origin == form.origin &&
|
/external/chromium/chrome/browser/ |
browsing_data_database_helper_unittest.cc | 19 const GURL origin("http://host1:1/"); 26 helper->AddDatabase(origin, db, "");
|
browsing_data_indexed_db_helper_unittest.cc | 19 const GURL origin("http://host1:1/"); 26 helper->AddIndexedDB(origin, description);
|
browsing_data_local_storage_helper_unittest.cc | 18 const GURL origin("http://host1:1/"); 24 helper->AddLocalStorage(origin);
|
/external/webkit/Source/WebKit/chromium/src/ |
StorageEventDispatcherChromium.cpp | 48 SecurityOrigin* origin, Frame* sourceFrame) 51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage);
|