/external/webkit/Source/WebKit/mac/WebCoreSupport/ |
WebApplicationCacheQuotaManager.mm | 35 - (id)initWithOrigin:(WebSecurityOrigin *)origin 41 _origin = origin; 45 - (WebSecurityOrigin *)origin
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
GeolocationPermissions.cpp | 85 // See if we have a record for this origin in the permanent permissions. 107 // Although multiple tabs may request permissions for the same origin 129 // one of these, since each frame maps to a single origin. We only cancel 131 // origin. 133 // We can use the origin string to avoid searching the map. 149 // If this is the origin currently being shown, cancel the prompt 158 void GeolocationPermissions::makeAsynchronousCallbackToGeolocation(String origin, bool allow) 160 m_callbackData.origin = origin; 165 void GeolocationPermissions::providePermissionState(String origin, bool allow, bool remember [all...] |
/external/chromium/chrome/browser/extensions/ |
extension_special_storage_policy.cc | 15 bool ExtensionSpecialStoragePolicy::IsStorageProtected(const GURL& origin) { 16 if (origin.SchemeIs(chrome::kExtensionScheme)) 19 return protected_apps_.Contains(origin); 22 bool ExtensionSpecialStoragePolicy::IsStorageUnlimited(const GURL& origin) { 24 return unlimited_extensions_.Contains(origin); 83 const GURL& origin) { 84 CachedResults::const_iterator found = cached_results_.find(origin); 90 if (iter->second->OverlapsWithOrigin(origin)) { 91 cached_results_[origin] = true; 95 cached_results_[origin] = false [all...] |
extension_special_storage_policy.h | 27 virtual bool IsStorageProtected(const GURL& origin); 28 virtual bool IsStorageUnlimited(const GURL& origin); 42 bool Contains(const GURL& origin);
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebsecurityorigin.cpp | 43 An origin consists of a host name, a scheme, and a port number. Web sites 44 with the same security origin can access each other's resources for client-side 51 because they are of a different security origin. 54 security origin, and can access each other's resources. You can add additional local schemes 55 by using QWebSecurityOrigin::addLocalScheme(), or override the default same-origin behavior 64 web page, and use host(), scheme() and port() to identify the security origin. 66 Use databases() to access the databases defined within a security origin. The 67 disk usage of the origin's databases can be limited with setDatabaseQuota(). 72 \l{http://en.wikipedia.org/wiki/Same_origin_policy}{"Same origin policy" Wikipedia Article}. 78 Constructs a security origin from \a other [all...] |
/external/chromium/chrome/browser/geolocation/ |
geolocation_exceptions_table_model.cc | 54 : origin(in_origin), 59 GURL origin; member in struct:GeolocationExceptionsTableModel::Entry 81 if ((entry.origin == entry.embedding_origin) && 84 (j < entries_.size()) && (entries_[j].origin == entry.origin); ++j) { 97 GURL entry_origin(entry->origin); // Copy, not reference, since we'll erase 100 (entries_[row + 1].origin == entry_origin); 123 } while (!next_has_same_origin && (entry->origin == entry_origin) && 124 (entry->origin == entry->embedding_origin) && 145 if (entry.origin == entry.embedding_origin) [all...] |
/external/chromium/chrome/browser/ |
browsing_data_database_helper.h | 38 const std::string& origin, 49 std::string origin; member in struct:BrowsingDataDatabaseHelper::DatabaseInfo 69 virtual void DeleteDatabase(const std::string& origin, 97 void DeleteDatabaseInWebKitThread(const std::string& origin, 119 void AddDatabase(const GURL& origin, 137 PendingDatabaseInfo(const GURL& origin, 142 GURL origin; member in struct:CannedBrowsingDataDatabaseHelper::PendingDatabaseInfo
|
load_notification_details.h | 22 PageTransition::Type origin, 29 origin_(origin), 35 PageTransition::Type origin() const { return origin_; } function in class:LoadNotificationDetails
|
/external/chromium/chrome/browser/notifications/ |
desktop_notification_service.h | 48 // Requests permission (using an info-bar) for a given origin. 53 void RequestPermission(const GURL& origin, 75 void GrantPermission(const GURL& origin); 76 void DenyPermission(const GURL& origin); 114 // Removes an origin from the "explicitly allowed" set. 115 void ResetAllowedOrigin(const GURL& origin); 117 // Removes an origin from the "explicitly denied" set. 118 void ResetBlockedOrigin(const GURL& origin); 125 ContentSetting GetContentSetting(const GURL& origin); 137 // Returns a display name for an origin, to be used in permission infoba [all...] |
/external/webkit/Source/WebKit/win/ |
WebDatabaseManager.cpp | 231 /* [in] */ IWebSecurityOrigin* origin, 234 if (!origin || !result) 242 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin); 257 /* [in] */ IWebSecurityOrigin* origin, 260 if (!origin || !result) 268 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin); 293 /* [in] */ IWebSecurityOrigin* origin) 295 if (!origin) 301 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin); 312 /* [in] */ IWebSecurityOrigin* origin) 357 RefPtr<SecurityOrigin> origin; member in class:DidModifyOriginData [all...] |
WebDatabaseManager.h | 58 /* [in] */ IWebSecurityOrigin* origin, 63 /* [in] */ IWebSecurityOrigin* origin, 69 /* [in] */ IWebSecurityOrigin* origin); 73 /* [in] */ IWebSecurityOrigin* origin); 76 /* [in] */ BSTR origin,
|
WebSecurityOrigin.h | 38 static WebSecurityOrigin* createInstance(WebCore::SecurityOrigin* origin); 39 static WebSecurityOrigin* createInstance(RefPtr<WebCore::SecurityOrigin> origin) { return createInstance(origin.get()); }
|
/external/webkit/Source/WebKit2/WebProcess/ApplicationCache/ |
WebApplicationCacheManager.cpp | 73 RefPtr<SecurityOrigin> origin = *i; local 76 originData.protocol = origin->protocol(); 77 originData.host = origin->host(); 78 originData.port = origin->port(); 91 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local 92 if (!origin) 95 ApplicationCache::deleteCacheForOrigin(origin.get());
|
/external/chromium/net/http/ |
http_auth_cache_unittest.cc | 76 GURL origin("http://www.google.com"); 87 cache.Add(origin, realm1_handler->realm(), realm1_handler->auth_scheme(), 95 cache.Add(origin, realm2_handler->realm(), realm2_handler->auth_scheme(), 103 cache.Add(origin, realm3_basic_handler->realm(), 112 cache.Add(origin, realm3_digest_handler->realm(), 121 cache.Add(origin, realm4_basic_handler->realm(), 127 entry = cache.Lookup(origin, kRealm5, HttpAuth::AUTH_SCHEME_BASIC); 130 // While Realm3 does exist, the origin scheme is wrong. 135 // Realm, origin scheme ok, authentication scheme wrong 140 // Valid lookup by origin, realm, scheme [all...] |
/external/quake/quake/src/QW/client/ |
gl_test.c | 28 vec3_t origin;
member in struct:__anon10407 64 void Test_Spawn (vec3_t origin)
82 VectorSubtract (r_refdef.vieworg, origin, incoming);
83 VectorSubtract (origin, incoming, temp);
91 VectorCopy (origin, p->origin);
122 pts[i][0][j] = p->origin[j] + p->up[j]*s + p->reflect[j]*d;
123 pts[i][1][j] = p->origin[j] + p->right[j]*s + p->reflect[j]*d;
124 pts[i][2][j] = p->origin[j] + -p->right[j]*s + p->reflect[j]*d;
132 glVertex3fv (p->origin);
[all...] |
cl_ents.c | 31 vec3_t origin; // predicted origin
member in struct:predicted_player 91 dl->origin[0] = x;
92 dl->origin[1] = y;
93 dl->origin[2] = z;
199 to->origin[0] = MSG_ReadCoord ();
205 to->origin[1] = MSG_ReadCoord ();
211 to->origin[2] = MSG_ReadCoord ();
434 CL_NewDlight (s1->number, s1->origin[0], s1->origin[1], s1->origin[2], 200 + (rand()&31), 0.1, 3); 562 vec3_t origin; member in struct:__anon10357 [all...] |
/external/quake/quake/src/WinQuake/ |
gl_test.cpp | 28 vec3_t origin;
member in struct:__anon10770 64 void Test_Spawn (vec3_t origin)
82 VectorSubtract (r_refdef.vieworg, origin, incoming);
83 VectorSubtract (origin, incoming, temp);
91 VectorCopy (origin, p->origin);
122 pts[i][0][j] = p->origin[j] + p->up[j]*s + p->reflect[j]*d;
123 pts[i][1][j] = p->origin[j] + p->right[j]*s + p->reflect[j]*d;
124 pts[i][2][j] = p->origin[j] + -p->right[j]*s + p->reflect[j]*d;
132 glVertex3fv (p->origin);
[all...] |
/external/webkit/Source/WebKit2/WebProcess/WebCoreSupport/ |
WebDatabaseManager.cpp | 73 // to get both the origins and the Vector of DatabaseDetails for each origin in one 131 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local 132 if (!origin) 135 DatabaseTracker::tracker().deleteDatabase(origin.get(), databaseIdentifier); 142 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local 143 if (!origin) 146 DatabaseTracker::tracker().deleteOrigin(origin.get()); 162 // prevent new data from being added to databases in that origin. 164 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local 165 if (!origin) [all...] |
/external/chromium/chrome/browser/ui/views/ |
theme_background.cc | 47 gfx::Point origin(0, 0); 50 &origin); 56 origin.Offset(0, kCustomFrameBackgroundVerticalOffset + 1); 60 origin.x(), origin.y(), 0, 0,
|
/external/webkit/Source/WebKit/mac/Misc/ |
WebNSViewExtras.m | 163 NSPoint origin; 168 origin = rect.origin; 180 origin.x = mouseDownPoint.x - (((mouseDownPoint.x - origin.x) / originalSize.width) * newSize.width); 181 origin.y = origin.y + originalSize.height; 182 origin.y = mouseDownPoint.y - (((mouseDownPoint.y - origin.y) / originalSize.height) * newSize.height); 190 origin = NSMakePoint(mouseDownPoint.x - offset.width, mouseDownPoint.y - offset.height) [all...] |
/external/webkit/Source/WebKit/chromium/src/mac/ |
WebScreenInfoFactory.mm | 57 userRect.origin.y = 58 NSMaxY([screenForWindow(destination) frame]) - (userRect.origin.y + userRect.size.height); // flip 62 userRect.origin.x *= scale; 63 userRect.origin.y *= scale; 68 return WebRect(userRect.origin.x, 69 userRect.origin.y,
|
/external/webkit/Source/WebKit2/Shared/ |
SecurityOriginData.cpp | 61 RefPtr<APIObject> origin = WebSecurityOrigin::create(originData.protocol, originData.host, originData.port); local 62 if (!origin) 64 securityOrigins.uncheckedAppend(origin);
|
/external/webkit/Tools/WebKitTestRunner/mac/ |
PlatformWebViewMac.mm | 71 wkFrame.origin.x = frame.origin.x; 72 wkFrame.origin.y = frame.origin.y; 80 [m_window setFrame:NSMakeRect(frame.origin.x, frame.origin.y, frame.size.width, frame.size.height) display:YES];
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
BasicDomainHandler.java | 59 public void validate(final Cookie cookie, final CookieOrigin origin) 64 if (origin == null) { 65 throw new IllegalArgumentException("Cookie origin may not be null"); 71 // back to the origin-server. 72 String host = origin.getHost(); 89 + "\". Domain of origin: \"" + host + "\""); 96 + "\". Domain of origin: \"" + host + "\""); 101 public boolean match(final Cookie cookie, final CookieOrigin origin) { 105 if (origin == null) { 106 throw new IllegalArgumentException("Cookie origin may not be null") [all...] |
RFC2109DomainHandler.java | 61 public void validate(final Cookie cookie, final CookieOrigin origin) 66 if (origin == null) { 67 throw new IllegalArgumentException("Cookie origin may not be null"); 69 String host = origin.getHost(); 99 + "\". Domain of origin: \"" + host + "\""); 111 public boolean match(final Cookie cookie, final CookieOrigin origin) { 115 if (origin == null) { 116 throw new IllegalArgumentException("Cookie origin may not be null"); 118 String host = origin.getHost();
|