/external/webkit/Source/WebKit2/UIProcess/win/ |
H A D | WebContextMenuProxyWin.cpp | 74 void WebContextMenuProxyWin::showContextMenu(const IntPoint& origin, const Vector<WebContextMenuItemData>& items) argument 85 POINT point = POINT(origin);
|
/external/webkit/Source/WebKit2/WebProcess/Geolocation/ |
H A D | GeolocationPermissionRequestManager.cpp | 63 SecurityOrigin* origin = frame->document()->securityOrigin(); local 65 m_page->send(Messages::WebPageProxy::RequestGeolocationPermissionForFrame(geolocationID, webFrame->frameID(), origin->databaseIdentifier()));
|
/external/webkit/Source/WebKit2/WebProcess/KeyValueStorage/ |
H A D | WebKeyValueStorageManager.cpp | 87 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local 88 if (!origin) 91 StorageTracker::tracker().deleteOrigin(origin.get());
|
/external/chromium/chrome/browser/ |
H A D | browsing_data_local_storage_helper.h | 40 const std::string& origin, 54 std::string origin; member in struct:BrowsingDataLocalStorageHelper::LocalStorageInfo 120 void AddLocalStorage(const GURL& origin);
|
H A D | browsing_data_database_helper.h | 38 const std::string& origin, 49 std::string origin; member in struct:BrowsingDataDatabaseHelper::DatabaseInfo 69 virtual void DeleteDatabase(const std::string& origin, 97 void DeleteDatabaseInWebKitThread(const std::string& origin, 119 void AddDatabase(const GURL& origin, 137 PendingDatabaseInfo(const GURL& origin, 142 GURL origin; member in struct:CannedBrowsingDataDatabaseHelper::PendingDatabaseInfo
|
H A D | browsing_data_indexed_db_helper.h | 39 const std::string& origin, 53 std::string origin; member in struct:BrowsingDataIndexedDBHelper::IndexedDBInfo 95 void AddIndexedDB(const GURL& origin, 113 PendingIndexedDBInfo(const GURL& origin, const string16& description); 116 GURL origin; member in struct:CannedBrowsingDataIndexedDBHelper::PendingIndexedDBInfo
|
/external/clang/test/CXX/dcl.dcl/dcl.spec/dcl.constexpr/ |
H A D | p9.cpp | 37 constexpr pixel origin; // expected-error {{default initialization of an object of const type 'const pixel' requires a user-provided default constructor}} variable
|
/external/webkit/Source/WebCore/bindings/v8/ |
H A D | ScriptEventListener.cpp | 116 v8::ScriptOrigin origin = function->GetScriptOrigin(); local 117 if (!origin.ResourceName().IsEmpty()) { 118 sourceName = toWebCoreString(origin.ResourceName());
|
/external/webkit/Source/WebCore/dom/ |
H A D | MessageEvent.cpp | 41 MessageEvent::MessageEvent(PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortArray> ports) argument 44 , m_origin(origin) 55 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, PassOwnPtr<MessagePortArray> ports) argument 63 m_origin = origin; 78 void MessageEvent::initMessageEvent(const AtomicString& type, bool canBubble, bool cancelable, PassRefPtr<SerializedScriptValue> data, const String& origin, const String& lastEventId, DOMWindow* source, MessagePort* port) argument 85 initMessageEvent(type, canBubble, cancelable, data, origin, lastEventId, source, ports);
|
/external/webkit/Source/WebCore/page/ |
H A D | SpeechInput.cpp | 96 bool SpeechInput::startRecognition(int listenerId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin) argument 99 return m_client->startRecognition(listenerId, elementRect, language, grammar, origin);
|
/external/webkit/Source/WebCore/platform/mock/ |
H A D | SpeechInputClientMock.cpp | 54 bool SpeechInputClientMock::startRecognition(int requestId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin) argument
|
/external/webkit/Source/WebCore/storage/ |
H A D | OriginQuotaManager.cpp | 73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) argument 76 ASSERT(!m_usageMap.contains(origin.get())); 78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord); 81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const 84 return m_usageMap.contains(origin); 87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) argument 91 OriginUsageRecord* usageRecord = m_usageMap.get(origin); 97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument 101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin)) 105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) argument [all...] |
/external/webkit/Source/WebKit/android/jni/ |
H A D | GeolocationPermissionsBridge.cpp | 61 static bool getAllowed(JNIEnv* env, jobject obj, jstring origin) argument 63 WTF::String originString = jstringToWtfString(env, origin); 67 static void clear(JNIEnv* env, jobject obj, jstring origin) argument 69 WTF::String originString = jstringToWtfString(env, origin); 73 static void allow(JNIEnv* env, jobject obj, jstring origin) argument 75 WTF::String originString = jstringToWtfString(env, origin);
|
/external/webkit/Source/WebKit/qt/Api/ |
H A D | qwebdatabase.cpp | 43 a security origin, use QWebSecurityOrigin::databases(). Each database has an internal name(), 90 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 103 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 116 DatabaseDetails details = DatabaseTracker::tracker().detailsForNameAndOrigin(d->name, d->origin.get()); 151 return DatabaseTracker::tracker().fullPathForDatabase(d->origin.get(), d->name, false); 158 Returns the databases's security origin. 160 QWebSecurityOrigin QWebDatabase::origin() const function in class:QWebDatabase 162 QWebSecurityOriginPrivate* priv = new QWebSecurityOriginPrivate(d->origin.get()); 163 QWebSecurityOrigin origin(priv); 164 return origin; [all...] |
/external/webkit/Source/WebKit/win/ |
H A D | WebSecurityOrigin.cpp | 45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); local 46 origin->AddRef(); 47 return origin;
|
/external/webkit/Source/WebKit2/UIProcess/ |
H A D | WebResourceCacheManagerProxy.cpp | 81 void WebResourceCacheManagerProxy::clearCacheForOrigin(WebSecurityOrigin* origin, ResourceCachesToClear cachesToClear) argument 84 securityOrigin.protocol = origin->protocol(); 85 securityOrigin.host = origin->host(); 86 securityOrigin.port = origin->port();
|
/external/webkit/Source/WebKit2/WebProcess/ApplicationCache/ |
H A D | WebApplicationCacheManager.cpp | 73 RefPtr<SecurityOrigin> origin = *i; local 76 originData.protocol = origin->protocol(); 77 originData.host = origin->host(); 78 originData.port = origin->port(); 91 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(originData.protocol, originData.host, originData.port); local 92 if (!origin) 95 ApplicationCache::deleteCacheForOrigin(origin.get());
|
/external/webkit/Tools/DumpRenderTree/chromium/ |
H A D | NotificationPresenter.cpp | 61 void NotificationPresenter::grantPermission(const WebString& origin) argument 63 // Make sure it's in the form of an origin. 64 GURL url(origin); 135 WTF::String origin = WTF::String(static_cast<GURL>(url).GetOrigin().spec().c_str()); local 136 bool allowed = m_allowedOrigins.find(origin) != m_allowedOrigins.end(); 142 const WebSecurityOrigin& origin, 146 origin.toString().utf8().data()); 141 requestPermission( const WebSecurityOrigin& origin, WebNotificationPermissionCallback* callback) argument
|
/external/apache-http/src/org/apache/http/impl/cookie/ |
H A D | BestMatchSpec.java | 97 final CookieOrigin origin) throws MalformedCookieException { 101 if (origin == null) { 102 throw new IllegalArgumentException("Cookie origin may not be null"); 120 return getStrict().parse(helems, origin); 125 return getNetscape().parse(header, origin); 127 return getCompat().parse(helems, origin); 133 final CookieOrigin origin) throws MalformedCookieException { 137 if (origin == null) { 138 throw new IllegalArgumentException("Cookie origin may not be null"); 141 getStrict().validate(cookie, origin); 95 parse( final Header header, final CookieOrigin origin) argument 131 validate( final Cookie cookie, final CookieOrigin origin) argument 147 match(final Cookie cookie, final CookieOrigin origin) argument [all...] |
H A D | RFC2109Spec.java | 103 public List<Cookie> parse(final Header header, final CookieOrigin origin) argument 108 if (origin == null) { 109 throw new IllegalArgumentException("Cookie origin may not be null"); 112 return parse(elems, origin); 116 public void validate(final Cookie cookie, final CookieOrigin origin) argument 128 super.validate(cookie, origin);
|
H A D | RFC2965Spec.java | 79 final String name, final String value, final CookieOrigin origin) { 81 cookie.setPath(getDefaultPath(origin)); 82 cookie.setDomain(getDefaultDomain(origin)); 87 final String name, final String value, final CookieOrigin origin) { 89 cookie.setPath(getDefaultPath(origin)); 90 cookie.setDomain(getDefaultDomain(origin)); 91 cookie.setPorts(new int [] { origin.getPort() }); 98 CookieOrigin origin) throws MalformedCookieException { 102 if (origin == null) { 103 throw new IllegalArgumentException("Cookie origin ma 78 createCookie( final String name, final String value, final CookieOrigin origin) argument 86 createCookie2( final String name, final String value, final CookieOrigin origin) argument 96 parse( final Header header, CookieOrigin origin) argument 153 validate(final Cookie cookie, CookieOrigin origin) argument 166 match(final Cookie cookie, CookieOrigin origin) argument 218 adjustEffectiveHost(final CookieOrigin origin) argument [all...] |
/external/chromium/chrome/browser/chromeos/notifications/ |
H A D | desktop_notifications_unittest.h | 75 void AllowOrigin(const GURL& origin) { argument 76 service_->GrantPermission(origin); 79 void DenyOrigin(const GURL& origin) { argument 80 service_->DenyPermission(origin); 83 int HasPermission(const GURL& origin) { argument 84 return service_->prefs_cache()->HasPermission(origin);
|
/external/chromium/chrome/browser/extensions/ |
H A D | extension_special_storage_policy.cc | 15 bool ExtensionSpecialStoragePolicy::IsStorageProtected(const GURL& origin) { argument 16 if (origin.SchemeIs(chrome::kExtensionScheme)) 19 return protected_apps_.Contains(origin); 22 bool ExtensionSpecialStoragePolicy::IsStorageUnlimited(const GURL& origin) { argument 24 return unlimited_extensions_.Contains(origin); 83 const GURL& origin) { 84 CachedResults::const_iterator found = cached_results_.find(origin); 90 if (iter->second->OverlapsWithOrigin(origin)) { 91 cached_results_[origin] = true; 95 cached_results_[origin] 82 Contains( const GURL& origin) argument [all...] |
/external/chromium/chrome/browser/notifications/ |
H A D | notification_exceptions_table_model.cc | 19 Entry(const GURL& origin, ContentSetting setting); 22 GURL origin; member in struct:NotificationExceptionsTableModel::Entry 50 service_->ResetAllowedOrigin(entry->origin); 53 service_->ResetBlockedOrigin(entry->origin); 77 return content_settings_helper::OriginToString16(entry.origin); 128 : origin(in_origin), 134 DCHECK_NE(origin, b.origin); 135 return origin < b.origin; [all...] |
H A D | notifications_prefs_cache.cc | 21 const GURL& origin) { 24 allowed_origins_.insert(origin); 25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end()) 30 const GURL& origin) { 33 denied_origins_.insert(origin); 34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end()) 60 std::string origin; local 62 (*i)->GetAsString(&origin); 63 origin_vector->push_back(GURL(origin)); 67 int NotificationsPrefsCache::HasPermission(const GURL& origin) { argument 20 CacheAllowedOrigin( const GURL& origin) argument 29 CacheDeniedOrigin( const GURL& origin) argument 86 IsOriginAllowed( const GURL& origin) argument 92 IsOriginDenied( const GURL& origin) argument [all...] |