/external/e2fsprogs/lib/ext2fs/ |
llseek.c | 42 extern long long llseek (int fd, long long offset, int origin); 67 unsigned int, origin) 70 static ext2_loff_t my_llseek (int fd, ext2_loff_t offset, int origin) 81 &result, origin); 90 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) 97 return lseek(fd, (off_t) offset, origin); 104 result = my_llseek (fd, offset, origin); 122 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) 125 return lseek64 (fd, offset, origin); 132 return lseek (fd, (off_t) offset, origin); [all...] |
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
GeolocationPermissions.h | 49 // browser. Permissions are managed on a per-origin basis, as required by 51 // origin specifies the scheme, host and port of particular frame. An 52 // origin is represented here as a string, using the output of 75 // the same origin as the requesting frame. 80 // permission is specified by 'allow' and applied to 'origin'. If 85 void providePermissionState(WTF::String origin, bool allow, bool remember); 98 // Gets whether the specified origin is allowed. 99 static bool getAllowed(WTF::String origin); 100 // Clears the permission state for the specified origin. 101 static void clear(WTF::String origin); 164 WTF::String origin; member in struct:android::GeolocationPermissions::CallbackData [all...] |
/external/apache-http/src/org/apache/http/impl/cookie/ |
BestMatchSpec.java | 97 final CookieOrigin origin) throws MalformedCookieException { 101 if (origin == null) { 102 throw new IllegalArgumentException("Cookie origin may not be null"); 120 return getStrict().parse(helems, origin); 125 return getNetscape().parse(header, origin); 127 return getCompat().parse(helems, origin); 133 final CookieOrigin origin) throws MalformedCookieException { 137 if (origin == null) { 138 throw new IllegalArgumentException("Cookie origin may not be null"); 141 getStrict().validate(cookie, origin); [all...] |
CookieSpecBase.java | 54 protected static String getDefaultPath(final CookieOrigin origin) { 55 String defaultPath = origin.getPath(); 67 protected static String getDefaultDomain(final CookieOrigin origin) { 68 return origin.getHost(); 71 protected List<Cookie> parse(final HeaderElement[] elems, final CookieOrigin origin) 82 cookie.setPath(getDefaultPath(origin)); 83 cookie.setDomain(getDefaultDomain(origin)); 103 public void validate(final Cookie cookie, final CookieOrigin origin) 108 if (origin == null) { 109 throw new IllegalArgumentException("Cookie origin may not be null") [all...] |
RFC2965Spec.java | 79 final String name, final String value, final CookieOrigin origin) { 81 cookie.setPath(getDefaultPath(origin)); 82 cookie.setDomain(getDefaultDomain(origin)); 87 final String name, final String value, final CookieOrigin origin) { 89 cookie.setPath(getDefaultPath(origin)); 90 cookie.setDomain(getDefaultDomain(origin)); 91 cookie.setPorts(new int [] { origin.getPort() }); 98 CookieOrigin origin) throws MalformedCookieException { 102 if (origin == null) { 103 throw new IllegalArgumentException("Cookie origin may not be null") [all...] |
BasicSecureHandler.java | 53 public boolean match(final Cookie cookie, final CookieOrigin origin) { 57 if (origin == null) { 58 throw new IllegalArgumentException("Cookie origin may not be null"); 60 return !cookie.isSecure() || origin.isSecure();
|
AbstractCookieAttributeHandler.java | 40 public void validate(final Cookie cookie, final CookieOrigin origin) 45 public boolean match(final Cookie cookie, final CookieOrigin origin) {
|
BasicPathHandler.java | 56 public void validate(final Cookie cookie, final CookieOrigin origin) 58 if (!match(cookie, origin)) { 61 + "\". Path of origin: \"" + origin.getPath() + "\""); 65 public boolean match(final Cookie cookie, final CookieOrigin origin) { 69 if (origin == null) { 70 throw new IllegalArgumentException("Cookie origin may not be null"); 72 String targetpath = origin.getPath();
|
NetscapeDomainHandler.java | 47 public void validate(final Cookie cookie, final CookieOrigin origin) 49 super.validate(cookie, origin); 51 String host = origin.getHost(); 91 public boolean match(Cookie cookie, CookieOrigin origin) { 95 if (origin == null) { 96 throw new IllegalArgumentException("Cookie origin may not be null"); 98 String host = origin.getHost();
|
/external/chromium/chrome/browser/content_settings/ |
content_settings_notification_provider.h | 29 static ContentSettingsPattern ToContentSettingsPattern(const GURL& origin); 84 void GrantPermission(const GURL& origin); 85 void DenyPermission(const GURL& origin); 87 void PersistPermissionChange(const GURL& origin, bool is_allowed); 89 ContentSetting GetContentSetting(const GURL& origin) const; 91 // Removes an origin from the "explicitly allowed" set. 92 void ResetAllowedOrigin(const GURL& origin); 94 // Removes an origin from the "explicitly denied" set. 95 void ResetBlockedOrigin(const GURL& origin);
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebdatabase.cpp | 43 a security origin, use QWebSecurityOrigin::databases(). Each database has an internal name(), 90 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 103 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 116 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 151 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false); 158 Returns the databases's security origin. 160 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase 162 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get()); 163 QWebSecurityOrigin origin(priv); 164 return origin; [all...] |
qwebdatabase_p.h | 33 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebDatabasePrivate
|
/external/quake/quake/src/WinQuake/ |
snd_null.cpp | 53 void S_StaticSound (sfx_t *sfx, vec3_t origin, float vol, float attenuation)
57 void S_StartSound (int entnum, int entchannel, sfx_t *sfx, vec3_t origin, float fvol, float attenuation)
74 void S_Update (vec3_t origin, vec3_t v_forward, vec3_t v_right, vec3_t v_up)
|
/frameworks/base/core/java/android/webkit/ |
WebStorage.java | 68 private static final String ORIGIN = "origin"; 73 private Map <String, Origin> mOrigins; 79 * Class containing the HTML5 database quota and usage for an origin. 81 public static class Origin { 86 private Origin(String origin, long quota, long usage) { 87 mOrigin = origin; 92 private Origin(String origin, long quota) [all...] |
/external/webkit/Source/WebCore/storage/ |
DatabaseTracker.h | 77 void getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases); 121 bool hasEntryForOriginNoLock(SecurityOrigin* origin); 123 bool databaseNamesForOriginNoLock(SecurityOrigin* origin, Vector<String>& resultVector); 124 unsigned long long usageForOriginNoLock(SecurityOrigin* origin); 125 unsigned long long quotaForOriginNoLock(SecurityOrigin* origin); 159 bool canCreateDatabase(SecurityOrigin *origin, const String& name); 160 void recordCreatingDatabase(SecurityOrigin *origin, const String& name); 161 void doneCreatingDatabase(SecurityOrigin *origin, const String& name); 162 bool creatingDatabase(SecurityOrigin *origin, const String& name); 163 bool canDeleteDatabase(SecurityOrigin *origin, const String& name) [all...] |
/external/chromium/net/http/ |
http_auth_cache.cc | 42 // Debug helper to check that |origin| arguments are properly formed. 43 void CheckOriginIsValid(const GURL& origin) { 44 DCHECK(origin.is_valid()); 45 DCHECK(origin.SchemeIs("http") || origin.SchemeIs("https")); 46 DCHECK(origin.GetOrigin() == origin); 69 HttpAuthCache::Entry* HttpAuthCache::Lookup(const GURL& origin, 72 CheckOriginIsValid(origin); 76 if (it->origin() == origin && it->realm() == realm & [all...] |
/external/webkit/Source/WebKit/mac/WebCoreSupport/ |
WebSecurityOriginInternal.h | 39 - (id)_initWithWebCoreSecurityOrigin:(WebCoreSecurityOrigin *)origin;
|
/external/e2fsprogs/lib/blkid/ |
llseek.c | 41 extern long long llseek(int fd, long long offset, int origin); 66 unsigned int, origin) 69 static blkid_loff_t my_llseek(int fd, blkid_loff_t offset, int origin) 77 &result, origin); 81 &result, origin); 126 blkid_loff_t blkid_llseek(int fd, blkid_loff_t offset, int origin) 129 return lseek64 (fd, offset, origin); 136 return lseek(fd, (off_t) offset, origin);
|
/external/webkit/Source/WebKit/mac/Storage/ |
WebStorageManagerPrivate.h | 39 - (void)deleteOrigin:(WebSecurityOrigin *)origin;
|
WebDatabaseQuotaManager.mm | 35 - (id)initWithOrigin:(WebSecurityOrigin *)origin 41 _origin = origin; 45 - (WebSecurityOrigin *)origin 70 // prevent new data from being added to databases in that origin.
|
/external/webkit/Source/WebKit/win/Interfaces/ |
IWebDatabaseManager.idl | 56 HRESULT databasesWithOrigin([in] IWebSecurityOrigin* origin, [out, retval] IEnumVARIANT** result); 57 HRESULT detailsForDatabase([in] BSTR databaseName, [in] IWebSecurityOrigin* origin, [out, retval] IPropertyBag **result); 60 HRESULT deleteOrigin([in] IWebSecurityOrigin* origin); 61 HRESULT deleteDatabase([in] BSTR databaseName, [in] IWebSecurityOrigin* origin);
|
/external/chromium/chrome/browser/chromeos/notifications/ |
desktop_notifications_unittest.h | 75 void AllowOrigin(const GURL& origin) { 76 service_->GrantPermission(origin); 79 void DenyOrigin(const GURL& origin) { 80 service_->DenyPermission(origin); 83 int HasPermission(const GURL& origin) { 84 return service_->prefs_cache()->HasPermission(origin);
|
/external/chromium/chrome/browser/notifications/ |
desktop_notifications_unittest.h | 86 void AllowOrigin(const GURL& origin) { 87 service_->GrantPermission(origin); 90 void DenyOrigin(const GURL& origin) { 91 service_->DenyPermission(origin); 94 int HasPermission(const GURL& origin) { 95 return service_->prefs_cache()->HasPermission(origin);
|
/external/webkit/Source/WebCore/dom/ |
MessageEvent.cpp | 41 MessageEvent::MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray> ports) 44 , m_origin(origin) 55 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray> ports) 63 m_origin = origin; 78 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort* port) 85 initMessageEvent(type, canBubble, cancelable, data, origin, lastEventId, source, ports);
|
MessageEvent.h | 46 static PassRefPtr<MessageEvent> create(PassOwnPtr<MessagePortArray> ports, PassRefPtr<SerializedScriptValue> data = 0, const String& origin = "", const String& lastEventId = "", PassRefPtr<DOMWindow> source = 0) 48 return adoptRef(new MessageEvent(data, origin, lastEventId, source, ports)); 52 void initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray>); 55 const String& origin() const { return m_origin; } function in class:WebCore::MessageEvent 63 void initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort*); 69 MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray>);
|