HomeSort by relevance Sort by last modified time
    Searched refs:origin (Results 51 - 75 of 764) sorted by null

1 23 4 5 6 7 8 91011>>

  /external/webkit/Source/WebKit/mac/WebCoreSupport/
WebApplicationCacheQuotaManager.mm 35 - (id)initWithOrigin:(WebSecurityOrigin *)origin
41 _origin = origin;
45 - (WebSecurityOrigin *)origin
  /external/webkit/Source/WebKit/android/WebCoreSupport/
GeolocationPermissions.cpp 85 // See if we have a record for this origin in the permanent permissions.
107 // Although multiple tabs may request permissions for the same origin
129 // one of these, since each frame maps to a single origin. We only cancel
131 // origin.
133 // We can use the origin string to avoid searching the map.
149 // If this is the origin currently being shown, cancel the prompt
158 void GeolocationPermissions::makeAsynchronousCallbackToGeolocation(String origin, bool allow)
160 m_callbackData.origin = origin;
165 void GeolocationPermissions::providePermissionState(String origin, bool allow, bool remember
    [all...]
  /external/chromium/chrome/browser/extensions/
extension_special_storage_policy.cc 15 bool ExtensionSpecialStoragePolicy::IsStorageProtected(const GURL& origin) {
16 if (origin.SchemeIs(chrome::kExtensionScheme))
19 return protected_apps_.Contains(origin);
22 bool ExtensionSpecialStoragePolicy::IsStorageUnlimited(const GURL& origin) {
24 return unlimited_extensions_.Contains(origin);
83 const GURL& origin) {
84 CachedResults::const_iterator found = cached_results_.find(origin);
90 if (iter->second->OverlapsWithOrigin(origin)) {
91 cached_results_[origin] = true;
95 cached_results_[origin] = false
    [all...]
extension_special_storage_policy.h 27 virtual bool IsStorageProtected(const GURL& origin);
28 virtual bool IsStorageUnlimited(const GURL& origin);
42 bool Contains(const GURL& origin);
  /external/webkit/Source/WebKit/qt/Api/
qwebsecurityorigin.cpp 43 An origin consists of a host name, a scheme, and a port number. Web sites
44 with the same security origin can access each other's resources for client-side
51 because they are of a different security origin.
54 security origin, and can access each other's resources. You can add additional local schemes
55 by using QWebSecurityOrigin::addLocalScheme(), or override the default same-origin behavior
64 web page, and use host(), scheme() and port() to identify the security origin.
66 Use databases() to access the databases defined within a security origin. The
67 disk usage of the origin's databases can be limited with setDatabaseQuota().
72 \l{http://en.wikipedia.org/wiki/Same_origin_policy}{"Same origin policy" Wikipedia Article}.
78 Constructs a security origin from \a other
    [all...]
  /external/chromium/chrome/browser/geolocation/
geolocation_exceptions_table_model.cc 54 : origin(in_origin),
59 GURL origin; member in struct:GeolocationExceptionsTableModel::Entry
81 if ((entry.origin == entry.embedding_origin) &&
84 (j < entries_.size()) && (entries_[j].origin == entry.origin); ++j) {
97 GURL entry_origin(entry->origin); // Copy, not reference, since we'll erase
100 (entries_[row + 1].origin == entry_origin);
123 } while (!next_has_same_origin && (entry->origin == entry_origin) &&
124 (entry->origin == entry->embedding_origin) &&
145 if (entry.origin == entry.embedding_origin)
    [all...]
  /external/chromium/chrome/browser/
browsing_data_database_helper.h 38 const std::string& origin,
49 std::string origin; member in struct:BrowsingDataDatabaseHelper::DatabaseInfo
69 virtual void DeleteDatabase(const std::string& origin,
97 void DeleteDatabaseInWebKitThread(const std::string& origin,
119 void AddDatabase(const GURL& origin,
137 PendingDatabaseInfo(const GURL& origin,
142 GURL origin; member in struct:CannedBrowsingDataDatabaseHelper::PendingDatabaseInfo
load_notification_details.h 22 PageTransition::Type origin,
29 origin_(origin),
35 PageTransition::Type origin() const { return origin_; } function in class:LoadNotificationDetails
  /external/chromium/chrome/browser/notifications/
desktop_notification_service.h 48 // Requests permission (using an info-bar) for a given origin.
53 void RequestPermission(const GURL& origin,
75 void GrantPermission(const GURL& origin);
76 void DenyPermission(const GURL& origin);
114 // Removes an origin from the "explicitly allowed" set.
115 void ResetAllowedOrigin(const GURL& origin);
117 // Removes an origin from the "explicitly denied" set.
118 void ResetBlockedOrigin(const GURL& origin);
125 ContentSetting GetContentSetting(const GURL& origin);
137 // Returns a display name for an origin, to be used in permission infoba
    [all...]
  /external/webkit/Source/WebKit/win/
WebDatabaseManager.cpp 231 /* [in] */ IWebSecurityOrigin* origin,
234 if (!origin || !result)
242 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin);
257 /* [in] */ IWebSecurityOrigin* origin,
260 if (!origin || !result)
268 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin);
293 /* [in] */ IWebSecurityOrigin* origin)
295 if (!origin)
301 COMPtr<WebSecurityOrigin> webSecurityOrigin(Query, origin);
312 /* [in] */ IWebSecurityOrigin* origin)
357 RefPtr<SecurityOrigin> origin; member in class:DidModifyOriginData
    [all...]
WebDatabaseManager.h 58 /* [in] */ IWebSecurityOrigin* origin,
63 /* [in] */ IWebSecurityOrigin* origin,
69 /* [in] */ IWebSecurityOrigin* origin);
73 /* [in] */ IWebSecurityOrigin* origin);
76 /* [in] */ BSTR origin,
WebSecurityOrigin.h 38 static WebSecurityOrigin* createInstance(WebCore::SecurityOrigin* origin);
39 static WebSecurityOrigin* createInstance(RefPtr<WebCore::SecurityOrigin> origin) { return createInstance(origin.get()); }
  /external/webkit/Source/WebKit2/WebProcess/ApplicationCache/
WebApplicationCacheManager.cpp 73 RefPtr<SecurityOrigin> origin = *i; local
76 originData.protocol = origin->protocol();
77 originData.host = origin->host();
78 originData.port = origin->port();
91 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local
92 if (!origin)
95 ApplicationCache::deleteCacheForOrigin(origin.get());
  /external/chromium/net/http/
http_auth_cache_unittest.cc 76 GURL origin("http://www.google.com");
87 cache.Add(origin, realm1_handler->realm(), realm1_handler->auth_scheme(),
95 cache.Add(origin, realm2_handler->realm(), realm2_handler->auth_scheme(),
103 cache.Add(origin, realm3_basic_handler->realm(),
112 cache.Add(origin, realm3_digest_handler->realm(),
121 cache.Add(origin, realm4_basic_handler->realm(),
127 entry = cache.Lookup(origin, kRealm5, HttpAuth::AUTH_SCHEME_BASIC);
130 // While Realm3 does exist, the origin scheme is wrong.
135 // Realm, origin scheme ok, authentication scheme wrong
140 // Valid lookup by origin, realm, scheme
    [all...]
  /external/quake/quake/src/QW/client/
gl_test.c 28 vec3_t origin; member in struct:__anon10407
64 void Test_Spawn (vec3_t origin)
82 VectorSubtract (r_refdef.vieworg, origin, incoming);
83 VectorSubtract (origin, incoming, temp);
91 VectorCopy (origin, p->origin);
122 pts[i][0][j] = p->origin[j] + p->up[j]*s + p->reflect[j]*d;
123 pts[i][1][j] = p->origin[j] + p->right[j]*s + p->reflect[j]*d;
124 pts[i][2][j] = p->origin[j] + -p->right[j]*s + p->reflect[j]*d;
132 glVertex3fv (p->origin);
    [all...]
cl_ents.c 31 vec3_t origin; // predicted origin member in struct:predicted_player
91 dl->origin[0] = x;
92 dl->origin[1] = y;
93 dl->origin[2] = z;
199 to->origin[0] = MSG_ReadCoord ();
205 to->origin[1] = MSG_ReadCoord ();
211 to->origin[2] = MSG_ReadCoord ();
434 CL_NewDlight (s1->number, s1->origin[0], s1->origin[1], s1->origin[2], 200 + (rand()&31), 0.1, 3);
562 vec3_t origin; member in struct:__anon10357
    [all...]
  /external/quake/quake/src/WinQuake/
gl_test.cpp 28 vec3_t origin; member in struct:__anon10770
64 void Test_Spawn (vec3_t origin)
82 VectorSubtract (r_refdef.vieworg, origin, incoming);
83 VectorSubtract (origin, incoming, temp);
91 VectorCopy (origin, p->origin);
122 pts[i][0][j] = p->origin[j] + p->up[j]*s + p->reflect[j]*d;
123 pts[i][1][j] = p->origin[j] + p->right[j]*s + p->reflect[j]*d;
124 pts[i][2][j] = p->origin[j] + -p->right[j]*s + p->reflect[j]*d;
132 glVertex3fv (p->origin);
    [all...]
  /external/webkit/Source/WebKit2/WebProcess/WebCoreSupport/
WebDatabaseManager.cpp 73 // to get both the origins and the Vector of DatabaseDetails for each origin in one
131 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local
132 if (!origin)
135 DatabaseTracker::tracker().deleteDatabase(origin.get(), databaseIdentifier);
142 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local
143 if (!origin)
146 DatabaseTracker::tracker().deleteOrigin(origin.get());
162 // prevent new data from being added to databases in that origin.
164 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); local
165 if (!origin)
    [all...]
  /external/chromium/chrome/browser/ui/views/
theme_background.cc 47 gfx::Point origin(0, 0);
50 &origin);
56 origin.Offset(0, kCustomFrameBackgroundVerticalOffset + 1);
60 origin.x(), origin.y(), 0, 0,
  /external/webkit/Source/WebKit/mac/Misc/
WebNSViewExtras.m 163 NSPoint origin;
168 origin = rect.origin;
180 origin.x = mouseDownPoint.x - (((mouseDownPoint.x - origin.x) / originalSize.width) * newSize.width);
181 origin.y = origin.y + originalSize.height;
182 origin.y = mouseDownPoint.y - (((mouseDownPoint.y - origin.y) / originalSize.height) * newSize.height);
190 origin = NSMakePoint(mouseDownPoint.x - offset.width, mouseDownPoint.y - offset.height)
    [all...]
  /external/webkit/Source/WebKit/chromium/src/mac/
WebScreenInfoFactory.mm 57 userRect.origin.y =
58 NSMaxY([screenForWindow(destination) frame]) - (userRect.origin.y + userRect.size.height); // flip
62 userRect.origin.x *= scale;
63 userRect.origin.y *= scale;
68 return WebRect(userRect.origin.x,
69 userRect.origin.y,
  /external/webkit/Source/WebKit2/Shared/
SecurityOriginData.cpp 61 RefPtr<APIObject> origin = WebSecurityOrigin::create(originData.protocol, originData.host, originData.port); local
62 if (!origin)
64 securityOrigins.uncheckedAppend(origin);
  /external/webkit/Tools/WebKitTestRunner/mac/
PlatformWebViewMac.mm 71 wkFrame.origin.x = frame.origin.x;
72 wkFrame.origin.y = frame.origin.y;
80 [m_window setFrame:NSMakeRect(frame.origin.x, frame.origin.y, frame.size.width, frame.size.height) display:YES];
  /external/apache-http/src/org/apache/http/impl/cookie/
BasicDomainHandler.java 59 public void validate(final Cookie cookie, final CookieOrigin origin)
64 if (origin == null) {
65 throw new IllegalArgumentException("Cookie origin may not be null");
71 // back to the origin-server.
72 String host = origin.getHost();
89 + "\". Domain of origin: \"" + host + "\"");
96 + "\". Domain of origin: \"" + host + "\"");
101 public boolean match(final Cookie cookie, final CookieOrigin origin) {
105 if (origin == null) {
106 throw new IllegalArgumentException("Cookie origin may not be null")
    [all...]
RFC2109DomainHandler.java 61 public void validate(final Cookie cookie, final CookieOrigin origin)
66 if (origin == null) {
67 throw new IllegalArgumentException("Cookie origin may not be null");
69 String host = origin.getHost();
99 + "\". Domain of origin: \"" + host + "\"");
111 public boolean match(final Cookie cookie, final CookieOrigin origin) {
115 if (origin == null) {
116 throw new IllegalArgumentException("Cookie origin may not be null");
118 String host = origin.getHost();

Completed in 628 milliseconds

1 23 4 5 6 7 8 91011>>