HomeSort by relevance Sort by last modified time
    Searched refs:origin (Results 1 - 25 of 847) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/chromium/chrome/common/
content_settings_helper.cc 14 std::string OriginToString(const GURL& origin) {
15 std::string port_component(origin.IntPort() != url_parse::PORT_UNSPECIFIED ?
16 ":" + origin.port() : "");
17 std::string scheme_component(!origin.SchemeIs(chrome::kHttpScheme) ?
18 origin.scheme() + chrome::kStandardSchemeSeparator : "");
19 return scheme_component + origin.host() + port_component;
22 string16 OriginToString16(const GURL& origin) {
23 return UTF8ToUTF16(OriginToString(origin));
content_settings_helper.h 17 // Return simplified string representing origin. If origin is using http or
19 std::string OriginToString(const GURL& origin);
20 string16 OriginToString16(const GURL& origin);
  /external/webkit/Source/WebCore/page/
OriginAccessEntry.cpp 49 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const
51 ASSERT(origin.host() == origin.host().lower());
52 ASSERT(origin.protocol() == origin.protocol().lower());
54 if (m_protocol != origin.protocol())
62 if (m_host == origin.host())
74 if (origin.host().length() > m_host.length() && origin.host()[origin.host().length() - m_host.length() - 1] == '.' && origin.host().endsWith(m_host)
    [all...]
SecurityOriginHash.h 39 static unsigned hash(SecurityOrigin* origin)
42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0,
43 origin->host().impl() ? origin->host().impl()->hash() : 0,
44 origin->port()
48 static unsigned hash(const RefPtr<SecurityOrigin>& origin)
50 return hash(origin.get());
  /external/chromium/net/ftp/
ftp_auth_cache.cc 15 FtpAuthCache::Entry::Entry(const GURL& origin,
18 : origin(origin),
29 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) {
31 if (it->origin == origin)
37 void FtpAuthCache::Add(const GURL& origin, const string16& username,
39 DCHECK(origin.SchemeIs("ftp"));
40 DCHECK_EQ(origin.GetOrigin(), origin);
    [all...]
ftp_auth_cache.h 30 Entry(const GURL& origin, const string16& username,
34 const GURL origin; member in struct:net::FtpAuthCache::Entry
42 // Return Entry corresponding to given |origin| or NULL if not found.
43 Entry* Lookup(const GURL& origin);
45 // Add an entry for |origin| to the cache (consisting of |username| and
46 // |password|). If there is already an entry for |origin|, it will be
48 void Add(const GURL& origin, const string16& username,
51 // Remove the entry for |origin| from the cache, if one exists and matches
53 void Remove(const GURL& origin, const string16& username,
  /external/webkit/Source/WebKit/mac/Misc/
WebQuotaManager.h 30 @discussion This protocol is used to view and manipulate a per-origin storage quota.
36 @param The security origin this will manage.
39 - (id)initWithOrigin:(WebSecurityOrigin *)origin;
42 @method origin
43 @result The security origin this manager is managing.
45 - (WebSecurityOrigin *)origin;
49 @result The current total usage of all relevant items in this security origin in bytes.
55 @result The current quota of security origin in bytes.
61 @param Sets a new quota, in bytes, on this security origin.
WebNSWindowExtras.m 43 NSPoint origin;
44 origin.y = NSMaxY(frameToCenterOver)
47 origin.x = frameToCenterOver.origin.x
49 [self setFrameOrigin:origin];
  /frameworks/base/core/java/android/webkit/
WebStorage.java 28 * Cache API can be attributed to an origin {@link WebStorage.Origin}, however
29 * it is not possible to set per-origin quotas. Note that there can be only
32 * The Web SQL Database API provides storage which is private to a given origin.
34 * to an origin. It is also possible to set per-origin quotas.
61 * currently used by an origin for the JavaScript storage APIs.
62 * An origin comprises the host, scheme and port of a URI.
65 public static class Origin {
71 protected Origin(String origin, long quota, long usage)
    [all...]
GeolocationPermissions.java 25 * Geolocation permissions are applied to an origin, which consists of the
27 * Geolocation API, permission must be granted for that content's origin.
29 * This class stores Geolocation permissions. An origin's permission state can
31 * an origin.
33 * When an origin attempts to use the Geolocation API, but no permission state
34 * is currently set for that origin,
36 * is called. This allows the permission state to be set for that origin.
47 * permission state for an origin.
51 * Sets the Geolocation permission state for the supplied origin.
53 * @param origin the origin for which permissions are se
    [all...]
  /external/webkit/Source/WebKit/qt/Api/
qwebsecurityorigin_p.h 31 origin = o;
36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate
  /external/webkit/Source/WebKit2/UIProcess/
WebDatabaseManagerProxyClient.cpp 33 void WebDatabaseManagerProxyClient::didModifyOrigin(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin)
38 m_client.didModifyOrigin(toAPI(databaseManager), toAPI(origin), m_client.clientInfo);
41 void WebDatabaseManagerProxyClient::didModifyDatabase(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin, const String& databaseIdentifier)
46 m_client.didModifyDatabase(toAPI(databaseManager), toAPI(origin), toAPI(databaseIdentifier.impl()), m_client.clientInfo);
  /external/webkit/Source/WebCore/storage/
OriginQuotaManager.cpp 73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin)
76 ASSERT(!m_usageMap.contains(origin.get()));
78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord);
81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const
84 return m_usageMap.contains(origin);
87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath)
91 OriginUsageRecord* usageRecord = m_usageMap.get(origin);
97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier)
101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin))
105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin)
    [all...]
DatabaseTracker.cpp 126 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) {
132 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) {
141 SecurityOrigin* origin = context->securityOrigin(); local
149 if (!canCreateDatabase(origin, name))
152 recordCreatingDatabase(origin, name);
154 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker
156 unsigned long long usage = usageForOriginNoLock(origin);
159 if (hasEntryForDatabase(origin, name))
165 doneCreatingDatabase(origin, name)
229 SecurityOrigin* origin = database->securityOrigin(); local
355 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local
    [all...]
  /external/webkit/Source/WebKit/mac/Storage/
WebDatabaseTrackerClient.mm 58 static void dispatchToMainThread(WebDatabaseTrackerClient* client, SecurityOrigin* origin)
60 DidModifyOriginData* context = new DidModifyOriginData(client, origin->threadsafeCopy());
65 DidModifyOriginData(WebDatabaseTrackerClient* client, PassRefPtr<SecurityOrigin> origin)
67 , origin(origin)
75 info->client->dispatchDidModifyOrigin(info->origin.get());
80 RefPtr<SecurityOrigin> origin;
83 void WebDatabaseTrackerClient::dispatchDidModifyOrigin(SecurityOrigin* origin)
86 DidModifyOriginData::dispatchToMainThread(this, origin);
90 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin]);
    [all...]
WebDatabaseManagerPrivate.h 37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc
38 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
42 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
56 // Will return an array of strings, the identifiers of each database in the given origin.
57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin;
59 // Will return the dictionary describing everything about the database for the passed identifier and origin.
60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
63 - (BOOL)deleteOrigin:(WebSecurityOrigin *)origin;
64 - (BOOL)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
  /external/apache-http/src/org/apache/http/cookie/
CookieSpec.java 46 * for a given host, port and path of origin
72 * @param origin details of the cookie origin
76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException;
83 * @param origin details of the cookie origin
86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException;
92 * @param origin the target to test against
97 boolean match(Cookie cookie, CookieOrigin origin);
CookieAttributeHandler.java 62 * @param origin the cookie source to validate against
65 void validate(Cookie cookie, CookieOrigin origin)
73 * @param origin the cookie source to match against
76 boolean match(Cookie cookie, CookieOrigin origin);
  /external/chromium/chrome/browser/chromeos/views/
copy_background.cc 23 gfx::Point origin(0, 0);
26 &origin);
28 // Move the origin and paint as if it's paint onto the owner.
29 canvas->TranslateInt(-origin.x(), -origin.y());
  /external/chromium/chrome/browser/notifications/
notifications_prefs_cache.cc 21 const GURL& origin) {
24 allowed_origins_.insert(origin);
25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end())
30 const GURL& origin) {
33 denied_origins_.insert(origin);
34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end())
60 std::string origin; local
62 (*i)->GetAsString(&origin);
63 origin_vector->push_back(GURL(origin));
67 int NotificationsPrefsCache::HasPermission(const GURL& origin) {
    [all...]
  /external/chromium/webkit/glue/
form_data.cc 16 origin(data.origin),
28 origin == form.origin &&
  /external/chromium/chrome/browser/
browsing_data_database_helper_unittest.cc 19 const GURL origin("http://host1:1/");
26 helper->AddDatabase(origin, db, "");
browsing_data_indexed_db_helper_unittest.cc 19 const GURL origin("http://host1:1/");
26 helper->AddIndexedDB(origin, description);
browsing_data_local_storage_helper_unittest.cc 18 const GURL origin("http://host1:1/");
24 helper->AddLocalStorage(origin);
  /external/webkit/Source/WebKit/chromium/src/
StorageEventDispatcherChromium.cpp 48 SecurityOrigin* origin, Frame* sourceFrame)
51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage);

Completed in 666 milliseconds

1 2 3 4 5 6 7 8 91011>>