/external/chromium_org/chrome/test/chromedriver/ |
H A D | basic_types.cc | 24 WebRect::WebRect() : origin(0, 0), size(0, 0) {} 27 : origin(x, y), size(width, height) {} 29 WebRect::WebRect(const WebPoint& origin, const WebSize& size) argument 30 : origin(origin), size(size) {} 34 int WebRect::X() const { return origin.x; } 36 int WebRect::Y() const { return origin.y; }
|
/external/chromium_org/chrome/browser/prerender/ |
H A D | prerender_histograms.cc | 35 std::string GetHistogramName(Origin origin, uint8 experiment_id, argument 40 if (origin == ORIGIN_GWS_PRERENDER) { 50 switch (origin) { 78 bool OriginIsOmnibox(Origin origin) { argument 79 return origin == ORIGIN_OMNIBOX; 84 // Helper macros for experiment-based and origin-based histogram reporting. 88 #define PREFIXED_HISTOGRAM(histogram_name, origin, HISTOGRAM) \ 89 PREFIXED_HISTOGRAM_INTERNAL(origin, GetCurrentExperimentId(), \ 93 #define PREFIXED_HISTOGRAM_ORIGIN_EXPERIMENT(histogram_name, origin, \ 95 PREFIXED_HISTOGRAM_INTERNAL(origin, experimen 153 RecordPrerender(Origin origin, const GURL& url) argument 207 RecordTimeSinceLastRecentVisit( Origin origin, base::TimeDelta delta) const argument 253 RecordPerceivedPageLoadTime( Origin origin, base::TimeDelta perceived_page_load_time, NavigationType navigation_type, const GURL& url) argument 306 RecordPageLoadTimeNotSwappedIn( Origin origin, base::TimeDelta page_load_time, const GURL& url) const argument 317 RecordPercentLoadDoneAtSwapin(Origin origin, double fraction) const argument 339 RecordTimeUntilUsed( Origin origin, base::TimeDelta time_until_used) const argument 352 RecordAbandonTimeUntilUsed( Origin origin, base::TimeDelta time_until_used) const argument 365 RecordPerSessionCount(Origin origin, int count) const argument 372 RecordTimeBetweenPrerenderRequests( Origin origin, base::TimeDelta time) const argument 379 RecordFinalStatus( Origin origin, uint8 experiment_id, PrerenderContents::MatchCompleteStatus mc_status, FinalStatus final_status) const argument 401 RecordEvent(Origin origin, uint8 experiment_id, PrerenderEvent event) const argument 409 RecordCookieStatus(Origin origin, uint8 experiment_id, int cookie_status) const argument 420 RecordCookieSendType( Origin origin, uint8 experiment_id, int cookie_send_type) const argument 432 RecordPrerenderPageVisitedStatus( Origin origin, uint8 experiment_id, bool visited_before) const argument 441 RecordNetworkBytes(Origin origin, bool used, int64 prerender_bytes, int64 profile_bytes) argument [all...] |
/external/chromium_org/storage/browser/fileapi/ |
H A D | sandbox_prioritized_origin_database.cc | 22 FILE_PATH_LITERAL("primary.origin"); 25 const std::string& origin) { 32 pickle.WriteString(origin); 39 std::string* origin) { 45 return pickle.ReadString(&iter, origin) && !origin->empty(); 63 const std::string& origin) { 65 if (!MaybeLoadPrimaryOrigin() && ResetPrimaryOrigin(origin)) { 66 MaybeMigrateDatabase(origin); 69 origin, 24 WritePrimaryOriginFile(const base::FilePath& path, const std::string& origin) argument 38 ReadPrimaryOriginFile(const base::FilePath& path, std::string* origin) argument 62 InitializePrimaryOrigin( const std::string& origin) argument 89 HasOriginPath( const std::string& origin) argument 100 GetPathForOrigin( const std::string& origin, base::FilePath* directory) argument 110 RemovePathForOrigin( const std::string& origin) argument 156 ResetPrimaryOrigin( const std::string& origin) argument 170 MaybeMigrateDatabase( const std::string& origin) argument [all...] |
H A D | sandbox_isolated_origin_database.cc | 13 // Special directory name for isolated origin. 19 const std::string& origin, 23 origin_(origin), 32 const std::string& origin) { 33 return (origin_ == origin); 37 const std::string& origin, base::FilePath* directory) { 38 if (origin != origin_) 45 const std::string& origin) { 59 const std::string& origin, 65 if (database->HasOriginPath(origin)) { 18 SandboxIsolatedOriginDatabase( const std::string& origin, const base::FilePath& file_system_directory, const base::FilePath& origin_directory) argument 31 HasOriginPath( const std::string& origin) argument 36 GetPathForOrigin( const std::string& origin, base::FilePath* directory) argument 44 RemovePathForOrigin( const std::string& origin) argument 58 MigrateBackFromObsoleteOriginDatabase( const std::string& origin, const base::FilePath& file_system_directory, SandboxOriginDatabase* database) argument [all...] |
/external/chromium_org/chrome/browser/browsing_data/ |
H A D | browsing_data_helper.cc | 35 bool BrowsingDataHelper::HasWebScheme(const GURL& origin) { argument 36 return BrowsingDataHelper::IsWebScheme(origin.scheme()); 45 bool BrowsingDataHelper::HasExtensionScheme(const GURL& origin) { argument 46 return BrowsingDataHelper::IsExtensionScheme(origin.scheme()); 51 const GURL& origin, 55 if (BrowsingDataHelper::HasExtensionScheme(origin.GetOrigin()) && 59 // If a websafe origin is unprotected, it matches iff UNPROTECTED_WEB. 60 if ((!policy || !policy->IsStorageProtected(origin.GetOrigin())) && 61 BrowsingDataHelper::HasWebScheme(origin.GetOrigin()) && 67 policy->IsStorageProtected(origin 50 DoesOriginMatchMask( const GURL& origin, int origin_set_mask, storage::SpecialStoragePolicy* policy) argument [all...] |
H A D | browsing_data_service_worker_helper.cc | 47 void BrowsingDataServiceWorkerHelper::DeleteServiceWorkers(const GURL& origin) { argument 55 origin)); 72 const ServiceWorkerUsageInfo& origin = *iter; local 73 if (!BrowsingDataHelper::HasWebScheme(origin.origin)) 76 service_worker_info_.push_back(origin); 94 const GURL& origin) { 96 service_worker_context_->DeleteForOrigin(origin); 100 PendingServiceWorkerUsageInfo(const GURL& origin, argument 102 : origin(origi 93 DeleteServiceWorkersOnIOThread( const GURL& origin) argument 125 AddServiceWorker( const GURL& origin, const std::vector<GURL>& scopes) argument 172 DeleteServiceWorkers( const GURL& origin) argument [all...] |
H A D | browsing_data_indexed_db_helper.cc | 49 const GURL& origin) { 56 origin)); 64 const IndexedDBInfo& origin = *iter; local 65 if (!BrowsingDataHelper::HasWebScheme(origin.origin_)) 68 indexed_db_info_.push_back(origin); 85 const GURL& origin) { 87 indexed_db_context_->DeleteForOrigin(origin); 91 PendingIndexedDBInfo::PendingIndexedDBInfo(const GURL& origin, argument 93 : origin(origin), 48 DeleteIndexedDB( const GURL& origin) argument 84 DeleteIndexedDBInIndexedDBThread( const GURL& origin) argument 115 AddIndexedDB( const GURL& origin, const base::string16& name) argument 159 DeleteIndexedDB( const GURL& origin) argument [all...] |
/external/chromium_org/chrome/browser/media/ |
H A D | protected_media_identifier_permission_context.cc | 50 const GURL& origin, 63 this, render_process_id, render_view_id, origin); 67 render_process_id, render_view_id, 0, origin); 77 NotifyPermissionSet(id, origin, result_callback, false); 83 if (!origin.is_valid() || !embedder.is_valid()) { 86 << origin << "," << embedder 88 NotifyPermissionSet(id, origin, result_callback, false); 93 DecidePermission(id, origin, embedder, rvh, result_callback); 100 const GURL& origin) { 102 render_process_id, render_view_id, origin); 48 RequestProtectedMediaIdentifierPermission( content::WebContents* web_contents, const GURL& origin, base::Callback<void(bool)> result_callback, base::Closure* cancel_callback) argument 97 CancelProtectedMediaIdentifierPermissionRequests( int render_process_id, int render_view_id, const GURL& origin) argument 105 DecidePermission( const PermissionRequestID& id, const GURL& origin, const GURL& embedder, content::RenderViewHost* rvh, const base::Callback<void(bool)>& callback) argument 158 PermissionDecided( const PermissionRequestID& id, const GURL& origin, const GURL& embedder, const base::Callback<void(bool)>& callback, bool allowed) argument 167 NotifyPermissionSet( const PermissionRequestID& id, const GURL& origin, const base::Callback<void(bool)>& callback, bool allowed) argument 203 CancelPendingInfobarRequests( int render_process_id, int render_view_id, const GURL& origin) argument [all...] |
/external/chromium_org/chrome/browser/resources/print_preview/data/ |
H A D | printable_area.js | 10 * @param {!print_preview.Coordinate2d} origin Top left corner of the 16 function PrintableArea(origin, size) { 22 this.origin_ = origin; 37 get origin() {
|
/external/apache-http/src/org/apache/http/cookie/ |
H A D | CookieSpec.java | 46 * for a given host, port and path of origin 77 * @param origin details of the cookie origin 81 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException; argument 88 * @param origin details of the cookie origin 91 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException; argument 97 * @param origin the target to test against 102 boolean match(Cookie cookie, CookieOrigin origin); argument
|
H A D | CookieAttributeHandler.java | 67 * @param origin the cookie source to validate against 70 void validate(Cookie cookie, CookieOrigin origin) argument 78 * @param origin the cookie source to match against 81 boolean match(Cookie cookie, CookieOrigin origin); argument
|
/external/chromium_org/content/shell/browser/ |
H A D | shell_notification_manager.h | 24 // Checks whether |origin| has permission to display notifications in tests. 26 const GURL& origin); 28 // Requests permission for |origin| to display notifications in layout tests. 30 const GURL& origin, 33 // Sets the permission to display notifications for |origin| to |permission|. 34 void SetPermission(const GURL& origin,
|
/external/chromium_org/third_party/WebKit/public/platform/ |
H A D | WebSerializedOrigin.h | 11 #include <url/origin.h> 25 WebSerializedOrigin(const url::Origin& origin) : m_string(WebString::fromUTF8(origin.string())) { } argument
|
/external/chromium_org/chrome/browser/notifications/ |
H A D | desktop_notification_profile_util.h | 25 static void GrantPermission(Profile* profile, const GURL& origin); 26 static void DenyPermission(Profile* profile, const GURL& origin); 29 static ContentSetting GetContentSetting(Profile* profile, const GURL& origin); 30 static void UsePermission(Profile* profile, const GURL& origin);
|
H A D | desktop_notification_profile_util.cc | 32 Profile* profile, const GURL& origin) { 34 ContentSettingsPattern::FromURLNoWildcard(origin); 44 Profile* profile, const GURL& origin) { 46 ContentSettingsPattern::FromURLNoWildcard(origin); 64 Profile* profile, const GURL& origin) { 66 origin, 67 origin, 73 const GURL& origin) { 75 ContentSettingsPattern::FromURLNoWildcard(origin), 31 GrantPermission( Profile* profile, const GURL& origin) argument 43 DenyPermission( Profile* profile, const GURL& origin) argument 63 GetContentSetting( Profile* profile, const GURL& origin) argument 72 UsePermission(Profile* profile, const GURL& origin) argument
|
/external/chromium_org/content/public/browser/ |
H A D | session_storage_usage_info.h | 12 GURL origin; member in struct:content::SessionStorageUsageInfo
|
H A D | indexed_db_info.cc | 9 IndexedDBInfo::IndexedDBInfo(const GURL& origin, argument 14 : origin_(origin),
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
H A D | StorageNamespace.cpp | 47 PassOwnPtrWillBeRawPtr<StorageArea> StorageNamespace::localStorageArea(SecurityOrigin* origin) argument 53 return StorageArea::create(adoptPtr(localStorageNamespace->createStorageArea(origin->toString())), LocalStorage); 56 PassOwnPtrWillBeRawPtr<StorageArea> StorageNamespace::storageArea(SecurityOrigin* origin) argument 58 return StorageArea::create(adoptPtr(m_webStorageNamespace->createStorageArea(origin->toString())), SessionStorage);
|
/external/chromium_org/storage/browser/quota/ |
H A D | special_storage_policy.h | 35 virtual void OnGranted(const GURL& origin, int change_flags) = 0; 36 virtual void OnRevoked(const GURL& origin, int change_flags) = 0; 46 virtual bool IsStorageProtected(const GURL& origin) = 0; 49 virtual bool IsStorageUnlimited(const GURL& origin) = 0; 53 virtual bool CanQueryDiskSize(const GURL& origin) = 0; 59 // Checks if the origin contains per-site isolated storage. 60 virtual bool HasIsolatedStorage(const GURL& origin) = 0; 64 virtual bool IsStorageSessionOnly(const GURL& origin) = 0; 77 void NotifyGranted(const GURL& origin, int change_flags); 78 void NotifyRevoked(const GURL& origin, in [all...] |
/external/chromium_org/android_webview/java/src/org/chromium/android_webview/ |
H A D | AwGeolocationPermissions.java | 32 * Set one origin to be allowed. 34 public void allow(String origin) { argument 35 String key = getOriginKey(origin); 42 * Set one origin to be denied. 44 public void deny(String origin) { argument 45 String key = getOriginKey(origin); 52 * Clear the stored permission for a particular origin. 54 public void clear(String origin) { argument 55 String key = getOriginKey(origin); 80 * Synchronous method to get if an origin i 82 isOriginAllowed(String origin) argument 89 hasOrigin(String origin) argument 96 getAllowed(String origin, final ValueCallback<Boolean> callback) argument [all...] |
/external/e2fsprogs/lib/ext2fs/ |
H A D | llseek.c | 42 extern long long llseek (int fd, long long offset, int origin); 67 unsigned int, origin) 70 static ext2_loff_t my_llseek (int fd, ext2_loff_t offset, int origin) argument 81 &result, origin); 90 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) argument 93 return my_llseek (fd, offset, origin); 101 result = my_llseek (fd, offset, origin); 110 return lseek(fd, (off_t) offset, origin); 124 ext2_loff_t ext2fs_llseek (int fd, ext2_loff_t offset, int origin) argument 127 return lseek64 (fd, offset, origin); [all...] |
/external/chromium_org/android_webview/native/permission/ |
H A D | simple_permission_request.cc | 13 const GURL& origin, 16 : origin_(origin), 12 SimplePermissionRequest( const GURL& origin, int64 resources, const base::Callback<void(bool)>& callback) argument
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | SecurityOriginHash.h | 39 static unsigned hash(SecurityOrigin* origin) argument 42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0, 43 origin->host().impl() ? origin->host().impl()->hash() : 0, 44 origin->port() 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) argument 50 return hash(origin.get());
|
H A D | DatabaseIdentifierTest.cpp | 70 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(cases[i].protocol, cases[i].host, cases[i].port); local 71 String identifier = createDatabaseIdentifierFromSecurityOrigin(origin.get()); 72 EXPECT_EQ(cases[i].expectedIdentifier, identifier) << "test case " << origin->toString(); 192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80); local 193 String identifier = createDatabaseIdentifierFromSecurityOrigin(origin.get()); 229 RefPtr<SecurityOrigin> origin = createSecurityOriginFromDatabaseIdentifier(validCases[i].identifier); local 230 EXPECT_EQ(validCases[i].expectedProtocol, origin->protocol()) << "test case " << i; 231 EXPECT_EQ(validCases[i].expectedHost, origin->host()) << "test case " << i; 232 EXPECT_EQ(validCases[i].expectedPort, origin->port()) << "test case " << i; 233 EXPECT_EQ(validCases[i].expectedStringRepresentation, origin 255 RefPtr<SecurityOrigin> origin = createSecurityOriginFromDatabaseIdentifier(bogusIdentifiers[i]); local [all...] |
/external/chromium_org/content/browser/quota/ |
H A D | usage_tracker_unittest.cc | 56 virtual void GetOriginUsage(const GURL& origin, 60 int64 usage = GetUsage(origin); 91 virtual void DeleteOriginData(const GURL& origin, 95 usage_map_.erase(origin); 104 int64 GetUsage(const GURL& origin) { argument 105 UsageMap::const_iterator found = usage_map_.find(origin); 111 void SetUsage(const GURL& origin, int64 usage) { argument 112 usage_map_[origin] = usage; 115 int64 UpdateUsage(const GURL& origin, int64 delta) { argument 116 return usage_map_[origin] 141 UpdateUsage(const GURL& origin, int64 delta) argument 147 UpdateUsageWithoutNotification(const GURL& origin, int64 delta) argument 178 GrantUnlimitedStoragePolicy(const GURL& origin) argument 186 RevokeUnlimitedStoragePolicy(const GURL& origin) argument 194 SetUsageCacheEnabled(const GURL& origin, bool enabled) argument [all...] |