/packages/apps/Browser/src/com/android/browser/ |
WebStorageSizeManager.java | 41 * - ApplicationCaches enforces a maximum size for all origins. 74 * sum of all other origins' quota) and deciding if a quota increase for the 217 * @param totalUsedQuota is the sum of all origins' quota. 306 * @param totalUsedQuota is the sum of all origins' quota.
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebsecurityorigin.cpp | 178 Returns a list of all security origins with a database quota defined. 186 DatabaseTracker::tracker().origins(coreOrigins);
|
qwebdatabase.cpp | 42 Databases are grouped together in security origins. To get access to all databases defined by
|
/frameworks/base/core/java/android/webkit/ |
WebStorage.java | 137 * Gets the origins currently using either the Application Cache or Web SQL 139 * being provided via a {@link ValueCallback}. The origins are provided as
|
/external/llvm/lib/Transforms/Instrumentation/ |
MemorySanitizer.cpp | 49 /// MemorySanitizer can track origins (allocation points) of all uninitialized 50 /// values. This behavior is controlled with a flag (msan-track-origins) and is 53 /// Origins are 4-byte values created and interpreted by the runtime library. 55 /// of application memory. Propagation of origins is basically a bunch of 62 /// MemorySanitizer reports can show unrelated origins, but this is unlikely in 65 /// Origins are meaningless for fully initialized values, so MemorySanitizer 106 /// \brief Track origins of uninitialized values. 110 static cl::opt<bool> ClTrackOrigins("msan-track-origins", 111 cl::desc("Track origins (allocation sites) of poisoned memory"), 181 /// \brief Track origins (allocation points) of uninitialized values [all...] |
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
ChromeClientAndroid.cpp | 457 Vector<RefPtr<SecurityOrigin> > origins; local 458 tracker.origins(origins); 460 for (unsigned i = 0; i < origins.size(); i++) { 461 SecurityOrigin* originToReclaimFrom = origins[i].get();
|
/external/jmonkeyengine/engine/src/core/com/jme3/collision/bih/ |
BIHNode.java | 320 float[] origins = {r.getOrigin().x, local 353 float origin = origins[a];
|
/external/chromium/chrome/browser/ |
browsing_data_remover.h | 177 // 'Protected' origins are not subject to data removal.
|
/external/harfbuzz_ng/test/api/ |
Makefile.am | 93 --track-origins=yes \
|
/external/proguard/src/proguard/evaluation/ |
TracedStack.java | 27 * of their origins and destinations.
|
TracedVariables.java | 27 * track of their origins.
|
/external/valgrind/main/memcheck/tests/ |
addressable.stderr.exp | 81 Use --track-origins=yes to see where uninitialised values come from
|
origin1-yes.c | 52 // Stack, 64-bit. XXX: gets reported with two identical origins.
|
/external/webkit/Source/WebCore/loader/ |
CrossOriginAccessControl.cpp | 109 // FIXME: Access-Control-Allow-Origin can contain a list of origins.
|
/external/webkit/Source/WebCore/platform/network/ |
CredentialStorage.cpp | 120 // Don't spend time iterating the path for origins that don't have any credentials.
|
/external/webkit/Source/WebCore/storage/ |
DatabaseTracker.h | 99 void origins(Vector<RefPtr<SecurityOrigin> >& result);
|
/external/webkit/Source/WebKit/android/jni/ |
WebStorage.cpp | 46 WebCore::DatabaseTracker::tracker().origins(coreOrigins);
|
/hardware/ti/omap4xxx/security/tee_client_api/ |
schannel6_protocol.h | 98 * return origins
|
/packages/apps/Browser/src/com/android/browser/preferences/ |
AdvancedPreferencesFragment.java | 79 * origins with active features (WebStorage, Geolocation etc) could have
|
/cts/tests/tests/webkit/src/android/webkit/cts/ |
GeolocationTest.java | 266 // Origins can have different strings even if they represent the same origin, 467 // Test if it gets added to origins
|
/external/clang/include/clang/Frontend/ |
CodeGenOptions.def | 90 CODEGENOPT(SanitizeMemoryTrackOrigins, 1, 0) ///< Enable tracking origins in
|
/external/clang/lib/Driver/ |
SanitizerArgs.h | 84 CmdArgs.push_back(Args.MakeArgString("-fsanitize-memory-track-origins"));
|