Searched defs:origin (Results 51 - 75 of 332) sorted by relevance

1234567891011>>

/external/webkit/Source/WebKit2/UIProcess/win/
H A DWebContextMenuProxyWin.cpp74 void WebContextMenuProxyWin::showContextMenu(const IntPoint& origin, const Vector<WebContextMenuItemData>& items) argument
85 POINT point = POINT(origin);
/external/webkit/Source/WebKit2/WebProcess/Geolocation/
H A DGeolocationPermissionRequestManager.cpp63 SecurityOrigin* origin = frame->document()->securityOrigin(); local
65 m_page->send(Messages::WebPageProxy::RequestGeolocationPermissionForFrame(geolocationID, webFrame->frameID(), origin->databaseIdentifier()));
/external/webkit/Source/WebKit2/WebProcess/KeyValueStorage/
H A DWebKeyValueStorageManager.cpp87 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local
88 if (!origin)
91 StorageTracker::tracker().deleteOrigin(origin.get());
/external/chromium/chrome/browser/
H A Dbrowsing_data_local_storage_helper.h40 const std::string& origin,
54 std::string origin; member in struct:BrowsingDataLocalStorageHelper::LocalStorageInfo
120 void AddLocalStorage(const GURL& origin);
H A Dbrowsing_data_database_helper.h38 const std::string& origin,
49 std::string origin; member in struct:BrowsingDataDatabaseHelper::DatabaseInfo
69 virtual void DeleteDatabase(const std::string& origin,
97 void DeleteDatabaseInWebKitThread(const std::string& origin,
119 void AddDatabase(const GURL& origin,
137 PendingDatabaseInfo(const GURL& origin,
142 GURL origin; member in struct:CannedBrowsingDataDatabaseHelper::PendingDatabaseInfo
H A Dbrowsing_data_indexed_db_helper.h39 const std::string& origin,
53 std::string origin; member in struct:BrowsingDataIndexedDBHelper::IndexedDBInfo
95 void AddIndexedDB(const GURL& origin,
113 PendingIndexedDBInfo(const GURL& origin, const string16& description);
116 GURL origin; member in struct:CannedBrowsingDataIndexedDBHelper::PendingIndexedDBInfo
/external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.constexpr/
H A Dp9.cpp37 constexpr pixel origin; // expected-error {{default initialization of an object of const type 'const pixel' requires a user-provided default constructor}} variable
/external/webkit/Source/WebCore/bindings/v8/
H A DScriptEventListener.cpp116 v8::ScriptOrigin origin = function->GetScriptOrigin(); local
117 if (!origin.ResourceName().IsEmpty()) {
118 sourceName = toWebCoreString(origin.ResourceName());
/external/webkit/Source/WebCore/dom/
H A DMessageEvent.cpp41 MessageEvent::MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray> ports) argument
44 , m_origin(origin)
55 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray> ports) argument
63 m_origin = origin;
78 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort* port) argument
85 initMessageEvent(type, canBubble, cancelable, data, origin, lastEventId, source, ports);
/external/webkit/Source/WebCore/page/
H A DSpeechInput.cpp96 bool SpeechInput::startRecognition(int listenerId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin) argument
99 return m_client->startRecognition(listenerId, elementRect, language, grammar, origin);
/external/webkit/Source/WebCore/platform/mock/
H A DSpeechInputClientMock.cpp54 bool SpeechInputClientMock::startRecognition(int requestId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin) argument
/external/webkit/Source/WebCore/storage/
H A DOriginQuotaManager.cpp73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) argument
76 ASSERT(!m_usageMap.contains(origin.get()));
78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord);
81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const
84 return m_usageMap.contains(origin);
87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) argument
91 OriginUsageRecord* usageRecord = m_usageMap.get(origin);
97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument
101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin))
105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) argument
[all...]
/external/webkit/Source/WebKit/android/jni/
H A DGeolocationPermissionsBridge.cpp61 static bool getAllowed(JNIEnv* env, jobject obj, jstring origin) argument
63 WTF::String originString = jstringToWtfString(env, origin);
67 static void clear(JNIEnv* env, jobject obj, jstring origin) argument
69 WTF::String originString = jstringToWtfString(env, origin);
73 static void allow(JNIEnv* env, jobject obj, jstring origin) argument
75 WTF::String originString = jstringToWtfString(env, origin);
/external/webkit/Source/WebKit/qt/Api/
H A Dqwebdatabase.cpp43 a security origin, use QWebSecurityOrigin::databases(). Each database has an internal name(),
90 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
103 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
116 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get());
151 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false);
158 Returns the databases's security origin.
160 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase
162 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get());
163 QWebSecurityOrigin origin(priv);
164 return origin;
[all...]
/external/webkit/Source/WebKit/win/
H A DWebSecurityOrigin.cpp45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); local
46 origin->AddRef();
47 return origin;
/external/webkit/Source/WebKit2/UIProcess/
H A DWebResourceCacheManagerProxy.cpp81 void WebResourceCacheManagerProxy::clearCacheForOrigin(WebSecurityOrigin* origin, ResourceCachesToClear cachesToClear) argument
84 securityOrigin.protocol = origin->protocol();
85 securityOrigin.host = origin->host();
86 securityOrigin.port = origin->port();
/external/webkit/Source/WebKit2/WebProcess/ApplicationCache/
H A DWebApplicationCacheManager.cpp73 RefPtr<SecurityOrigin> origin = *i; local
76 originData.protocol = origin->protocol();
77 originData.host = origin->host();
78 originData.port = origin->port();
91 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local
92 if (!origin)
95 ApplicationCache::deleteCacheForOrigin(origin.get());
/external/webkit/Tools/DumpRenderTree/chromium/
H A DNotificationPresenter.cpp61 void NotificationPresenter::grantPermission(const WebString& origin) argument
63 // Make sure it's in the form of an origin.
64 GURL url(origin);
135 WTF::String origin = WTF::String(static_cast<GURL>(url).GetOrigin().spec().c_str()); local
136 bool allowed = m_allowedOrigins.find(origin) != m_allowedOrigins.end();
142 const WebSecurityOrigin& origin,
146 origin.toString().utf8().data());
141 requestPermission( const WebSecurityOrigin& origin, WebNotificationPermissionCallback* callback) argument
/external/apache-http/src/org/apache/http/impl/cookie/
H A DBestMatchSpec.java97 final CookieOrigin origin) throws MalformedCookieException {
101 if (origin == null) {
102 throw new IllegalArgumentException("Cookie origin may not be null");
120 return getStrict().parse(helems, origin);
125 return getNetscape().parse(header, origin);
127 return getCompat().parse(helems, origin);
133 final CookieOrigin origin) throws MalformedCookieException {
137 if (origin == null) {
138 throw new IllegalArgumentException("Cookie origin may not be null");
141 getStrict().validate(cookie, origin);
95 parse( final Header header, final CookieOrigin origin) argument
131 validate( final Cookie cookie, final CookieOrigin origin) argument
147 match(final Cookie cookie, final CookieOrigin origin) argument
[all...]
H A DRFC2109Spec.java103 public List<Cookie> parse(final Header header, final CookieOrigin origin) argument
108 if (origin == null) {
109 throw new IllegalArgumentException("Cookie origin may not be null");
112 return parse(elems, origin);
116 public void validate(final Cookie cookie, final CookieOrigin origin) argument
128 super.validate(cookie, origin);
H A DRFC2965Spec.java79 final String name, final String value, final CookieOrigin origin) {
81 cookie.setPath(getDefaultPath(origin));
82 cookie.setDomain(getDefaultDomain(origin));
87 final String name, final String value, final CookieOrigin origin) {
89 cookie.setPath(getDefaultPath(origin));
90 cookie.setDomain(getDefaultDomain(origin));
91 cookie.setPorts(new int [] { origin.getPort() });
98 CookieOrigin origin) throws MalformedCookieException {
102 if (origin == null) {
103 throw new IllegalArgumentException("Cookie origin ma
78 createCookie( final String name, final String value, final CookieOrigin origin) argument
86 createCookie2( final String name, final String value, final CookieOrigin origin) argument
96 parse( final Header header, CookieOrigin origin) argument
153 validate(final Cookie cookie, CookieOrigin origin) argument
166 match(final Cookie cookie, CookieOrigin origin) argument
218 adjustEffectiveHost(final CookieOrigin origin) argument
[all...]
/external/chromium/chrome/browser/chromeos/notifications/
H A Ddesktop_notifications_unittest.h75 void AllowOrigin(const GURL& origin) { argument
76 service_->GrantPermission(origin);
79 void DenyOrigin(const GURL& origin) { argument
80 service_->DenyPermission(origin);
83 int HasPermission(const GURL& origin) { argument
84 return service_->prefs_cache()->HasPermission(origin);
/external/chromium/chrome/browser/extensions/
H A Dextension_special_storage_policy.cc15 bool ExtensionSpecialStoragePolicy::IsStorageProtected(const GURL& origin) { argument
16 if (origin.SchemeIs(chrome::kExtensionScheme))
19 return protected_apps_.Contains(origin);
22 bool ExtensionSpecialStoragePolicy::IsStorageUnlimited(const GURL& origin) { argument
24 return unlimited_extensions_.Contains(origin);
83 const GURL& origin) {
84 CachedResults::const_iterator found = cached_results_.find(origin);
90 if (iter->second->OverlapsWithOrigin(origin)) {
91 cached_results_[origin] = true;
95 cached_results_[origin]
82 Contains( const GURL& origin) argument
[all...]
/external/chromium/chrome/browser/notifications/
H A Dnotification_exceptions_table_model.cc19 Entry(const GURL& origin, ContentSetting setting);
22 GURL origin; member in struct:NotificationExceptionsTableModel::Entry
50 service_->ResetAllowedOrigin(entry->origin);
53 service_->ResetBlockedOrigin(entry->origin);
77 return content_settings_helper::OriginToString16(entry.origin);
128 : origin(in_origin),
134 DCHECK_NE(origin, b.origin);
135 return origin < b.origin;
[all...]
H A Dnotifications_prefs_cache.cc21 const GURL& origin) {
24 allowed_origins_.insert(origin);
25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end())
30 const GURL& origin) {
33 denied_origins_.insert(origin);
34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end())
60 std::string origin; local
62 (*i)->GetAsString(&origin);
63 origin_vector->push_back(GURL(origin));
67 int NotificationsPrefsCache::HasPermission(const GURL& origin) { argument
20 CacheAllowedOrigin( const GURL& origin) argument
29 CacheDeniedOrigin( const GURL& origin) argument
86 IsOriginAllowed( const GURL& origin) argument
92 IsOriginDenied( const GURL& origin) argument
[all...]

Completed in 376 milliseconds

1234567891011>>