/packages/apps/Browser/src/com/android/browser/ |
Bookmarks.java | 61 * @param url URL of the website to be bookmarked. 69 /* package */ static void addBookmark(Context context, boolean showToast, String url, 76 values.put(BrowserContract.Bookmarks.URL, url); 92 * Remove a bookmark from the database. If the url is a visited site, it 99 * @param url URL of the website to be removed. 102 ContentResolver cr, String url, String title) { 108 BrowserContract.Bookmarks.URL + " = ? AND " [all...] |
/cts/tests/tests/webkit/src/android/webkit/cts/ |
URLUtilTest.java | 104 assertFalse(URLUtil.isValidUrl("Error URL")); 125 byte[] url = new byte[0]; 126 byte[] result = URLUtil.decode(url); 129 url = new byte[] { 'w', 'w', 'w', '.', 'n', 'a', 'm', 'e', '.', 'c', 'o', 'm', '/', 131 result = URLUtil.decode(url); 136 url = new byte[] { 'w', 'w', 'w', '.', 'n', 'a', 'm', 'e', '.', 'c', 'o', 'm', '/', 139 result = URLUtil.decode(url); 146 String url = "ftp://example.url/test"; local 147 assertEquals("test.jpeg", URLUtil.guessFileName(url, null, "image/jpeg")) 158 String url = "domainName"; local 171 String url = "http:\/\/www.google.com#test"; local [all...] |
/external/chromium/chrome/browser/extensions/ |
app_process_apitest.cc | 21 // Simulates a page calling window.open on an URL, and waits for the navigation. 24 const GURL& url, 27 opener_host, L"", L"window.open('" + UTF8ToWide(url.spec()) + L"');")); 37 newtab->controller().GetLastCommittedEntry()->url() != url) 39 EXPECT_EQ(url, newtab->controller().GetLastCommittedEntry()->url()); 46 // Simulates a page navigating itself to an URL, and waits for the navigation. 47 static void NavigateTabHelper(TabContents* contents, const GURL& url) { 54 L"window.location = '" + UTF8ToWide(url.spec()) + L"';" [all...] |
extension_webnavigation_unittest.cc | 56 const GURL url("http://www.google.com/"); 58 navigation_state.TrackFrame(frame_id, url, true, false, contents()); 70 navigation_state.TrackFrame(frame_id, url, true, false, contents()); 80 const GURL url("http://www.google.com/"); 82 navigation_state.TrackFrame(frame_id1, url, true, false, contents()); 83 navigation_state.TrackFrame(frame_id2, url, false, false, contents()); 98 navigation_state.TrackFrame(frame_id2, url, false, false, contents()); 107 const GURL url("unsafe://www.google.com/"); 109 navigation_state.TrackFrame(frame_id, url, true, false, contents());
|
extension_infobar_module.cc | 37 GURL url = extension->GetResourceURL(extension->url(), html_path); local 57 GetExtension(), url));
|
/external/chromium/chrome/browser/chromeos/login/ |
account_screen.cc | 79 void AccountScreen::set_new_account_page_url(const GURL& url) { 80 new_account_page_url_.reset(new GURL(url)); 98 GURL url(*new_account_page_url_); 101 SiteInstance::CreateSiteInstanceForURL(profile, url)); 103 view()->LoadURL(url); 113 std::string url = source->GetURL().spec(); local 114 if (url == kCreateAccountDoneUrl) { 117 } else if (url == kCreateAccountBackUrl) { 156 void AccountScreen::OnPageLoadFailed(const std::string& url) {
|
help_app_launcher.cc | 41 GURL url(base::StringPrintf(kHelpAppFormat, 45 if (service->GetExtensionByURL(url)) 46 ShowHelpTopicDialog(GURL(url));
|
/external/chromium/chrome/browser/net/ |
referrer.cc | 26 // If we visit the containing url, but don't end up needing a connection, then 31 // to the containing URL, and consider doing a preconnection), and then IFF we 55 void Referrer::SuggestHost(const GURL& url) { 64 if (!url.has_host()) // TODO(jar): Is this really needed???? 66 DCHECK(url == url.GetWithEmptyPath()); 67 SubresourceMap::iterator it = find(url); 77 (*this)[url].SubresourceIsNeeded(); 136 GURL url(url_spec); 142 SuggestHost(url); [all...] |
url_request_slow_http_job.cc | 39 std::string url = "http://"; local 40 url.append(kMockHostname); 41 url.append("/"); 44 url.append(path_str); 45 return GURL(url);
|
/external/chromium/chrome/browser/ |
desktop_notification_handler.cc | 43 GURL url = params.contents_url; local 45 !url.SchemeIs(chrome::kHttpScheme) && 46 !url.SchemeIs(chrome::kHttpsScheme) && 47 !url.SchemeIs(chrome::kExtensionScheme) && 48 !url.SchemeIs(chrome::kDataScheme)) {
|
load_notification_details.h | 21 LoadNotificationDetails(const GURL& url, 26 : url_(url), 34 const GURL& url() const { return url_; } function in class:LoadNotificationDetails 41 GURL url_; // the URL loaded
|
/external/chromium/net/socket_stream/ |
socket_stream_job.cc | 23 const GURL& url, 26 GURL socket_url(url); 28 if (url.scheme() == "ws" && 31 &domain_state, url.host(), context.IsSNIAvailable()) && 37 socket_url = url.ReplaceComponents(replacements);
|
/external/webkit/Source/WebCore/css/ |
CSSImageValue.cpp | 33 CSSImageValue::CSSImageValue(const String& url) 34 : CSSPrimitiveValue(url, CSS_URI) 67 StyleCachedImage* CSSImageValue::cachedImage(CachedResourceLoader* loader, const String& url) 74 if (CachedImage* cachedImage = loader->requestImage(url)) { 87 return static_cast<StyleCachedImage*>(m_image.get())->cachedImage()->url();
|
/external/webkit/Source/WebCore/html/canvas/ |
CanvasRenderingContext.cpp | 72 checkOrigin(cachedImage->response().url()); 87 void CanvasRenderingContext::checkOrigin(const KURL& url) 89 if (!canvas()->originClean() || m_cleanOrigins.contains(url.string())) 92 if (canvas()->securityOrigin().taintsCanvas(url)) 95 m_cleanOrigins.add(url.string());
|
/external/webkit/Source/WebCore/inspector/front-end/ |
AuditFormatters.js | 82 url: function(url, displayText, allowExternalNavigation) 85 a.href = url; 86 a.title = url; 87 a.textContent = displayText || url;
|
/external/webkit/Source/WebKit2/Shared/ |
WebBackForwardListItem.cpp | 36 WebBackForwardListItem::WebBackForwardListItem(const String& originalURL, const String& url, const String& title, const uint8_t* backForwardData, size_t backForwardDataSize, uint64_t itemID) 38 , m_url(url) 78 String url; 79 if (!decoder.decode(url)) 94 return create(originalURL, url, title, data.data(), data.size(), itemID);
|
/external/webkit/Source/WebKit2/WebProcess/WebCoreSupport/ |
WebContextMenuClient.cpp | 65 void WebContextMenuClient::downloadURL(const KURL& url) 78 String url("http://www.google.com/search?q="); 79 url.append(encoded); 80 url.append("&ie=UTF-8&oe=UTF-8"); 84 page->mainFrame()->loader()->urlSelected(KURL(ParsedURLString, url), String(), 0, false, false, SendReferrer);
|
/external/webkit/Source/WebKit2/WebProcess/WebCoreSupport/win/ |
WebErrorsWin.cpp | 45 return ResourceError(kCFErrorDomainCFNetwork, kCFURLErrorCancelled, request.url().string(), String()); 53 return ResourceError(WebError::webKitErrorDomain(), kWKErrorCodeCannotUseRestrictedPort, request.url().string(), String()); 58 return ResourceError(WebError::webKitErrorDomain(), kWKErrorCodeCannotShowURL, request.url().string(), String()); 63 return ResourceError(WebError::webKitErrorDomain(), kWKErrorCodeFrameLoadInterruptedByPolicyChange, request.url().string(), String()); 78 return ResourceError(WebError::webKitErrorDomain(), kWKErrorCodePlugInWillHandleLoad, response.url().string(), String());
|
/external/chromium/googleurl/src/ |
url_parse_unittest.cc | 50 // guessing that it maps internally to the empty URL. 73 // Used for regular URL parse cases. 168 const char* url; member in struct:CountCase 216 int length = static_cast<int>(strlen(count_cases[i].url)); 220 if (length > 0 && count_cases[i].url[0] == 'f') 221 url_parse::ParseFileURL(count_cases[i].url, length, &parsed); 223 url_parse::ParseStandardURL(count_cases[i].url, length, &parsed); 236 // Regular URL with all the parts 334 const char* url = cases[i].input; local 335 url_parse::ParseStandardURL(url, static_cast<int>(strlen(url)), &parsed) 369 const char* url = path_cases[i].input; local 425 const char* url = file_cases[i].input; local 460 const char* url = file_cases[i].input; local 568 const char* url = mailto_cases[i].input; local [all...] |
/external/webkit/Source/WebCore/loader/ |
MainResourceLoader.cpp | 182 // Check if the redirected url is allowed to access the redirecting url's timing information. 183 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(newRequest.url()); 184 if (!securityOrigin->canRequest(redirectResponse.url())) 194 // Update cookie policy base URL as URL changes, except for subframes, which use the 195 // URL of the main frame which doesn't change when we redirect. 197 newRequest.setFirstPartyForCookies(newRequest.url()); 213 frameLoader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), newRequest.url()); 217 // We checked application cache for initial URL, now we need to check it for redirected one 244 KURL url = request().url(); local 515 KURL url = m_substituteData.responseURL(); local 564 const KURL& url = r.url(); local [all...] |
SubframeLoader.cpp | 75 KURL url; local 77 scriptURL = completeURL(urlString); // completeURL() encodes the URL. 78 url = blankURL(); 80 url = completeURL(urlString); 82 Frame* frame = loadOrRedirectSubframe(ownerElement, url, frameName, lockHistory, lockBackForwardList); 92 bool SubframeLoader::resourceWillUsePlugin(const String& url, const String& mimeType, bool shouldPreferPlugInsForImages) 95 if (!url.isEmpty()) 96 completedURL = completeURL(url); 102 bool SubframeLoader::requestPlugin(HTMLPlugInImageElement* ownerElement, const KURL& url, const String& mimeType, const Vector<String>& paramNames, const Vector<String>& paramValues, bool useFallback) 116 if (!m_frame->document()->contentSecurityPolicy()->allowObjectFromSource(url)) [all...] |
/external/chromium/chrome/browser/automation/ |
automation_util.h | 35 // Gets the size and value of the cookie string for |url| in the given tab. 37 void GetCookies(const GURL& url, 42 // Sets a cookie for |url| in the given tab. Can be called from any thread. 43 void SetCookie(const GURL& url, 48 // Deletes a cookie for |url| in the given tab. Can be called from any thread. 49 void DeleteCookie(const GURL& url, 54 // Gets the cookies for the given URL. Uses the JSON interface. 60 // Deletes the cookie with the given name for the URL. Uses the JSON interface. 66 // Sets a cookie for the given URL. Uses the JSON interface.
|
/external/chromium/chrome/browser/content_settings/ |
content_settings_pattern.h | 20 // Returns a pattern that matches the host of this URL and all subdomains. 21 static ContentSettingsPattern FromURL(const GURL& url); 23 // Returns a pattern that matches exactly this URL. 24 static ContentSettingsPattern FromURLNoWildcard(const GURL& url); 37 // TODO(jochen): should also return true for a complete URL without a host. 40 // True if |url| matches this pattern. 41 bool Matches(const GURL& url) const;
|
/external/chromium/chrome/browser/history/ |
history_publisher.h | 38 const GURL& url, const base::Time& time) const; 39 void PublishPageContent(const base::Time& time, const GURL& url, 48 const GURL& url; member in struct:history::HistoryPublisher::PageData
|
/external/chromium/chrome/browser/safe_browsing/ |
client_side_detection_host_unittest.cc | 164 void ExpectPreClassificationChecks(const GURL& url, 180 EXPECT_CALL(*sb_service_, MatchCsdWhitelistUrl(url)) 184 EXPECT_CALL(*csd_service_, GetValidCachedResult(url, NotNull())) 189 EXPECT_CALL(*csd_service_, IsInCache(url)).WillOnce(Return(*is_in_cache)); 246 cb->Run(GURL(verdict.url()), false); 277 cb->Run(GURL(verdict.url()), false); 342 // a single interstitial is shown for the second URL. 377 // We expect that the interstitial is shown for the second phishing URL and 378 // not for the first phishing URL. 420 GURL first_url("http://first.phishy.url.com") [all...] |