HomeSort by relevance Sort by last modified time
    Searched refs:origin (Results 26 - 50 of 764) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/e2fsprogs/lib/ext2fs/
llseek.c 42 extern long long llseek (int fd, long long offset, int origin);
67 unsigned int, origin)
70 static ext2_loff_t my_llseek (int fd, ext2_loff_t offset, int origin)
81 &result, origin);
90 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin)
97 return lseek(fd, (off_t) offset, origin);
104 result = my_llseek (fd, offset, origin);
122 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin)
125 return lseek64 (fd, offset, origin);
132 return lseek (fd, (off_t) offset, origin);
    [all...]
  /external/webkit/Source/WebKit/android/WebCoreSupport/
GeolocationPermissions.h 49 // browser. Permissions are managed on a per-origin basis, as required by
51 // origin specifies the scheme, host and port of particular frame. An
52 // origin is represented here as a string, using the output of
75 // the same origin as the requesting frame.
80 // permission is specified by 'allow' and applied to 'origin'. If
85 void providePermissionState(WTF::String origin, bool allow, bool remember);
98 // Gets whether the specified origin is allowed.
99 static bool getAllowed(WTF::String origin);
100 // Clears the permission state for the specified origin.
101 static void clear(WTF::String origin);
164 WTF::String origin; member in struct:android::GeolocationPermissions::CallbackData
    [all...]
  /external/apache-http/src/org/apache/http/impl/cookie/
BestMatchSpec.java 97 final CookieOrigin origin) throws MalformedCookieException {
101 if (origin == null) {
102 throw new IllegalArgumentException("Cookie origin may not be null");
120 return getStrict().parse(helems, origin);
125 return getNetscape().parse(header, origin);
127 return getCompat().parse(helems, origin);
133 final CookieOrigin origin) throws MalformedCookieException {
137 if (origin == null) {
138 throw new IllegalArgumentException("Cookie origin may not be null");
141 getStrict().validate(cookie, origin);
    [all...]
CookieSpecBase.java 54 protected static String getDefaultPath(final CookieOrigin origin) {
55 String defaultPath = origin.getPath();
67 protected static String getDefaultDomain(final CookieOrigin origin) {
68 return origin.getHost();
71 protected List<Cookie> parse(final HeaderElement[] elems, final CookieOrigin origin)
82 cookie.setPath(getDefaultPath(origin));
83 cookie.setDomain(getDefaultDomain(origin));
103 public void validate(final Cookie cookie, final CookieOrigin origin)
108 if (origin == null) {
109 throw new IllegalArgumentException("Cookie origin may not be null")
    [all...]
RFC2965Spec.java 79 final String name, final String value, final CookieOrigin origin) {
81 cookie.setPath(getDefaultPath(origin));
82 cookie.setDomain(getDefaultDomain(origin));
87 final String name, final String value, final CookieOrigin origin) {
89 cookie.setPath(getDefaultPath(origin));
90 cookie.setDomain(getDefaultDomain(origin));
91 cookie.setPorts(new int [] { origin.getPort() });
98 CookieOrigin origin) throws MalformedCookieException {
102 if (origin == null) {
103 throw new IllegalArgumentException("Cookie origin may not be null")
    [all...]
BasicSecureHandler.java 53 public boolean match(final Cookie cookie, final CookieOrigin origin) {
57 if (origin == null) {
58 throw new IllegalArgumentException("Cookie origin may not be null");
60 return !cookie.isSecure() || origin.isSecure();
AbstractCookieAttributeHandler.java 40 public void validate(final Cookie cookie, final CookieOrigin origin)
45 public boolean match(final Cookie cookie, final CookieOrigin origin) {
BasicPathHandler.java 56 public void validate(final Cookie cookie, final CookieOrigin origin)
58 if (!match(cookie, origin)) {
61 + "\". Path of origin: \"" + origin.getPath() + "\"");
65 public boolean match(final Cookie cookie, final CookieOrigin origin) {
69 if (origin == null) {
70 throw new IllegalArgumentException("Cookie origin may not be null");
72 String targetpath = origin.getPath();
NetscapeDomainHandler.java 47 public void validate(final Cookie cookie, final CookieOrigin origin)
49 super.validate(cookie, origin);
51 String host = origin.getHost();
91 public boolean match(Cookie cookie, CookieOrigin origin) {
95 if (origin == null) {
96 throw new IllegalArgumentException("Cookie origin may not be null");
98 String host = origin.getHost();
  /external/chromium/chrome/browser/content_settings/
content_settings_notification_provider.h 29 static ContentSettingsPattern ToContentSettingsPattern(const GURL& origin);
84 void GrantPermission(const GURL& origin);
85 void DenyPermission(const GURL& origin);
87 void PersistPermissionChange(const GURL& origin, bool is_allowed);
89 ContentSetting GetContentSetting(const GURL& origin) const;
91 // Removes an origin from the "explicitly allowed" set.
92 void ResetAllowedOrigin(const GURL& origin);
94 // Removes an origin from the "explicitly denied" set.
95 void ResetBlockedOrigin(const GURL& origin);
  /external/webkit/Source/WebKit/qt/Api/
qwebdatabase.cpp 43 a security origin, use QWebSecurityOrigin::databases(). Each database has an internal name(),
90 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
103 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
116 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
151 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false);
158 Returns the databases's security origin.
160 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase
162 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get());
163 QWebSecurityOrigin origin(priv);
164 return origin;
    [all...]
qwebdatabase_p.h 33 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebDatabasePrivate
  /external/quake/quake/src/WinQuake/
snd_null.cpp 53 void S_StaticSound (sfx_t *sfx, vec3_t origin, float vol, float attenuation)
57 void S_StartSound (int entnum, int entchannel, sfx_t *sfx, vec3_t origin, float fvol, float attenuation)
74 void S_Update (vec3_t origin, vec3_t v_forward, vec3_t v_right, vec3_t v_up)
  /frameworks/base/core/java/android/webkit/
WebStorage.java 68 private static final String ORIGIN = "origin";
73 private Map <String, Origin> mOrigins;
79 * Class containing the HTML5 database quota and usage for an origin.
81 public static class Origin {
86 private Origin(String origin, long quota, long usage) {
87 mOrigin = origin;
92 private Origin(String origin, long quota)
    [all...]
  /external/webkit/Source/WebCore/storage/
DatabaseTracker.h 77 void getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases);
121 bool hasEntryForOriginNoLock(SecurityOrigin* origin);
123 bool databaseNamesForOriginNoLock(SecurityOrigin* origin, Vector<String>& resultVector);
124 unsigned long long usageForOriginNoLock(SecurityOrigin* origin);
125 unsigned long long quotaForOriginNoLock(SecurityOrigin* origin);
159 bool canCreateDatabase(SecurityOrigin *origin, const String& name);
160 void recordCreatingDatabase(SecurityOrigin *origin, const String& name);
161 void doneCreatingDatabase(SecurityOrigin *origin, const String& name);
162 bool creatingDatabase(SecurityOrigin *origin, const String& name);
163 bool canDeleteDatabase(SecurityOrigin *origin, const String& name)
    [all...]
  /external/chromium/net/http/
http_auth_cache.cc 42 // Debug helper to check that |origin| arguments are properly formed.
43 void CheckOriginIsValid(const GURL& origin) {
44 DCHECK(origin.is_valid());
45 DCHECK(origin.SchemeIs("http") || origin.SchemeIs("https"));
46 DCHECK(origin.GetOrigin() == origin);
69 HttpAuthCache::Entry* HttpAuthCache::Lookup(const GURL& origin,
72 CheckOriginIsValid(origin);
76 if (it->origin() == origin && it->realm() == realm &
    [all...]
  /external/webkit/Source/WebKit/mac/WebCoreSupport/
WebSecurityOriginInternal.h 39 - (id)_initWithWebCoreSecurityOrigin:(WebCoreSecurityOrigin *)origin;
  /external/e2fsprogs/lib/blkid/
llseek.c 41 extern long long llseek(int fd, long long offset, int origin);
66 unsigned int, origin)
69 static blkid_loff_t my_llseek(int fd, blkid_loff_t offset, int origin)
77 &result, origin);
81 &result, origin);
126 blkid_loff_t blkid_llseek(int fd, blkid_loff_t offset, int origin)
129 return lseek64 (fd, offset, origin);
136 return lseek(fd, (off_t) offset, origin);
  /external/webkit/Source/WebKit/mac/Storage/
WebStorageManagerPrivate.h 39 - (void)deleteOrigin:(WebSecurityOrigin *)origin;
WebDatabaseQuotaManager.mm 35 - (id)initWithOrigin:(WebSecurityOrigin *)origin
41 _origin = origin;
45 - (WebSecurityOrigin *)origin
70 // prevent new data from being added to databases in that origin.
  /external/webkit/Source/WebKit/win/Interfaces/
IWebDatabaseManager.idl 56 HRESULT databasesWithOrigin([in] IWebSecurityOrigin* origin, [out, retval] IEnumVARIANT** result);
57 HRESULT detailsForDatabase([in] BSTR databaseName, [in] IWebSecurityOrigin* origin, [out, retval] IPropertyBag **result);
60 HRESULT deleteOrigin([in] IWebSecurityOrigin* origin);
61 HRESULT deleteDatabase([in] BSTR databaseName, [in] IWebSecurityOrigin* origin);
  /external/chromium/chrome/browser/chromeos/notifications/
desktop_notifications_unittest.h 75 void AllowOrigin(const GURL& origin) {
76 service_->GrantPermission(origin);
79 void DenyOrigin(const GURL& origin) {
80 service_->DenyPermission(origin);
83 int HasPermission(const GURL& origin) {
84 return service_->prefs_cache()->HasPermission(origin);
  /external/chromium/chrome/browser/notifications/
desktop_notifications_unittest.h 86 void AllowOrigin(const GURL& origin) {
87 service_->GrantPermission(origin);
90 void DenyOrigin(const GURL& origin) {
91 service_->DenyPermission(origin);
94 int HasPermission(const GURL& origin) {
95 return service_->prefs_cache()->HasPermission(origin);
  /external/webkit/Source/WebCore/dom/
MessageEvent.cpp 41 MessageEvent::MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray> ports)
44 , m_origin(origin)
55 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray> ports)
63 m_origin = origin;
78 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort* port)
85 initMessageEvent(type, canBubble, cancelable, data, origin, lastEventId, source, ports);
MessageEvent.h 46 static PassRefPtr<MessageEvent> create(PassOwnPtr<MessagePortArray> ports, PassRefPtr<SerializedScriptValue> data = 0, const String& origin = "", const String& lastEventId = "", PassRefPtr<DOMWindow> source = 0)
48 return adoptRef(new MessageEvent(data, origin, lastEventId, source, ports));
52 void initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray>);
55 const String& origin() const { return m_origin; } function in class:WebCore::MessageEvent
63 void initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort*);
69 MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray>);

Completed in 508 milliseconds

12 3 4 5 6 7 8 91011>>