Searched refs:origin (Results 1 - 25 of 761) sorted by relevance

1234567891011>>

/external/chromium/chrome/common/
H A Dcontent_settings_helper.cc14 std::string OriginToString(const GURL& origin) { argument
15 std::string port_component(origin.IntPort() != url_parse::PORT_UNSPECIFIED ?
16 ":" + origin.port() : "");
17 std::string scheme_component(!origin.SchemeIs(chrome::kHttpScheme) ?
18 origin.scheme() + chrome::kStandardSchemeSeparator : "");
19 return scheme_component + origin.host() + port_component;
22 string16 OriginToString16(const GURL& origin) { argument
23 return UTF8ToUTF16(OriginToString(origin));
H A Dcontent_settings_helper.h17 // Return simplified string representing origin. If origin is using http or
19 std::string OriginToString(const GURL& origin);
20 string16 OriginToString16(const GURL& origin);
/external/webkit/Source/WebCore/page/
H A DOriginAccessEntry.cpp49 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const
51 ASSERT(origin.host() == origin.host().lower());
52 ASSERT(origin.protocol() == origin.protocol().lower());
54 if (m_protocol != origin.protocol())
62 if (m_host == origin.host())
74 if (origin.host().length() > m_host.length() && origin.host()[origin
[all...]
H A DSecurityOriginHash.h39 static unsigned hash(SecurityOrigin* origin) argument
42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0,
43 origin->host().impl() ? origin->host().impl()->hash() : 0,
44 origin->port()
48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) argument
50 return hash(origin.get());
/external/chromium/net/ftp/
H A Dftp_auth_cache.cc15 FtpAuthCache::Entry::Entry(const GURL& origin, argument
18 : origin(origin),
29 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) { argument
31 if (it->origin == origin)
37 void FtpAuthCache::Add(const GURL& origin, const string16& username, argument
39 DCHECK(origin.SchemeIs("ftp"));
40 DCHECK_EQ(origin.GetOrigin(), origin);
55 Remove(const GURL& origin, const string16& username, const string16& password) argument
[all...]
H A Dftp_auth_cache.h30 Entry(const GURL& origin, const string16& username,
34 const GURL origin; member in struct:net::FtpAuthCache::Entry
42 // Return Entry corresponding to given |origin| or NULL if not found.
43 Entry* Lookup(const GURL& origin);
45 // Add an entry for |origin| to the cache (consisting of |username| and
46 // |password|). If there is already an entry for |origin|, it will be
48 void Add(const GURL& origin, const string16& username,
51 // Remove the entry for |origin| from the cache, if one exists and matches
53 void Remove(const GURL& origin, const string16& username,
/external/webkit/Source/WebKit/mac/Misc/
H A DWebQuotaManager.h30 @discussion This protocol is used to view and manipulate a per-origin storage quota.
36 @param The security origin this will manage.
39 - (id)initWithOrigin:(WebSecurityOrigin *)origin;
42 @method origin
43 @result The security origin this manager is managing.
45 - (WebSecurityOrigin *)origin;
49 @result The current total usage of all relevant items in this security origin in bytes.
55 @result The current quota of security origin in bytes.
61 @param Sets a new quota, in bytes, on this security origin.
H A DWebNSWindowExtras.m43 NSPoint origin;
44 origin.y = NSMaxY(frameToCenterOver)
47 origin.x = frameToCenterOver.origin.x
49 [self setFrameOrigin:origin];
/external/webkit/Source/WebKit2/UIProcess/
H A DWebDatabaseManagerProxyClient.cpp33 void WebDatabaseManagerProxyClient::didModifyOrigin(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin) argument
38 m_client.didModifyOrigin(toAPI(databaseManager), toAPI(origin), m_client.clientInfo);
41 void WebDatabaseManagerProxyClient::didModifyDatabase(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin, const String& databaseIdentifier) argument
46 m_client.didModifyDatabase(toAPI(databaseManager), toAPI(origin), toAPI(databaseIdentifier.impl()), m_client.clientInfo);
/external/webkit/Source/WebCore/storage/
H A DOriginQuotaManager.cpp73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) argument
76 ASSERT(!m_usageMap.contains(origin.get()));
78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord);
81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const
84 return m_usageMap.contains(origin);
87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) argument
91 OriginUsageRecord* usageRecord = m_usageMap.get(origin);
97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument
101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin))
105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) argument
[all...]
H A DDatabaseTracker.cpp126 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) {
132 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) {
141 SecurityOrigin* origin = context->securityOrigin(); local
149 if (!canCreateDatabase(origin, name))
152 recordCreatingDatabase(origin, name);
154 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker
156 unsigned long long usage = usageForOriginNoLock(origin);
159 if (hasEntryForDatabase(origin, name))
165 doneCreatingDatabase(origin, nam
193 hasEntryForOriginNoLock(SecurityOrigin* origin) argument
200 hasEntryForOrigin(SecurityOrigin* origin) argument
206 hasEntryForDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument
229 SecurityOrigin* origin = database->securityOrigin(); local
273 fullPathForDatabaseNoLock(SecurityOrigin* origin, const String& name, bool createIfNotExists) argument
326 fullPathForDatabase(SecurityOrigin* origin, const String& name, bool createIfNotExists) argument
355 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local
370 databaseNamesForOriginNoLock(SecurityOrigin* origin, Vector<String>& resultVector) argument
396 databaseNamesForOrigin(SecurityOrigin* origin, Vector<String>& resultVector) argument
410 detailsForNameAndOrigin(const String& name, SecurityOrigin* origin) argument
450 setDatabaseDetails(SecurityOrigin* origin, const String& name, const String& displayName, unsigned long estimatedSize) argument
502 usageForDatabase(const String& name, SecurityOrigin* origin) argument
597 getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases) argument
615 usageForOriginNoLock(SecurityOrigin* origin) argument
637 usageForOrigin(SecurityOrigin* origin) argument
644 quotaForOriginNoLock(SecurityOrigin* origin) argument
651 quotaForOrigin(SecurityOrigin* origin) argument
657 setQuota(SecurityOrigin* origin, unsigned long long quota) argument
704 addDatabase(SecurityOrigin* origin, const String& name, const String& path) argument
746 deleteOrigin(SecurityOrigin* origin) argument
832 canCreateDatabase(SecurityOrigin *origin, const String& name) argument
839 recordCreatingDatabase(SecurityOrigin *origin, const String& name) argument
851 doneCreatingDatabase(SecurityOrigin *origin, const String& name) argument
870 creatingDatabase(SecurityOrigin *origin, const String& name) argument
877 canDeleteDatabase(SecurityOrigin *origin, const String& name) argument
883 recordDeletingDatabase(SecurityOrigin *origin, const String& name) argument
896 doneDeletingDatabase(SecurityOrigin *origin, const String& name) argument
912 deletingDatabase(SecurityOrigin *origin, const String& name) argument
919 canDeleteOrigin(SecurityOrigin *origin) argument
925 deletingOrigin(SecurityOrigin *origin) argument
931 recordDeletingOrigin(SecurityOrigin *origin) argument
938 doneDeletingOrigin(SecurityOrigin *origin) argument
945 deleteDatabase(SecurityOrigin* origin, const String& name) argument
1002 deleteDatabaseFile(SecurityOrigin* origin, const String& name) argument
1064 scheduleNotifyDatabaseChanged(SecurityOrigin* origin, const String& name) argument
[all...]
/external/webkit/Source/WebKit/mac/Storage/
H A DWebDatabaseTrackerClient.mm58 static void dispatchToMainThread(WebDatabaseTrackerClient* client, SecurityOrigin* origin)
60 DidModifyOriginData* context = new DidModifyOriginData(client, origin->threadsafeCopy());
65 DidModifyOriginData(WebDatabaseTrackerClient* client, PassRefPtr<SecurityOrigin> origin)
67 , origin(origin)
75 info->client->dispatchDidModifyOrigin(info->origin.get());
80 RefPtr<SecurityOrigin> origin;
83 void WebDatabaseTrackerClient::dispatchDidModifyOrigin(SecurityOrigin* origin)
86 DidModifyOriginData::dispatchToMainThread(this, origin);
90 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin]);
[all...]
H A DWebDatabaseManagerPrivate.h37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc
38 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
42 // The notification object will be a WebSecurityOrigin object corresponding to the origin.
56 // Will return an array of strings, the identifiers of each database in the given origin.
57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin;
59 // Will return the dictionary describing everything about the database for the passed identifier and origin.
60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
63 - (BOOL)deleteOrigin:(WebSecurityOrigin *)origin;
64 - (BOOL)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
H A DWebStorageTrackerClient.mm57 RefPtr<SecurityOrigin> origin = adoptRef(static_cast<SecurityOrigin*>(context));
58 WebStorageTrackerClient::sharedWebStorageTrackerClient()->dispatchDidModifyOrigin(origin.get());
61 void WebStorageTrackerClient::dispatchDidModifyOrigin(PassRefPtr<SecurityOrigin> origin)
63 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin.get()]);
71 PassRefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier);
75 callOnMainThread(dispatchDidModifyOriginOnMainThread, origin.leakRef());
79 dispatchDidModifyOrigin(origin);
/external/apache-http/src/org/apache/http/cookie/
H A DCookieSpec.java46 * for a given host, port and path of origin
72 * @param origin details of the cookie origin
76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException; argument
83 * @param origin details of the cookie origin
86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException; argument
92 * @param origin the target to test against
97 boolean match(Cookie cookie, CookieOrigin origin); argument
H A DCookieAttributeHandler.java62 * @param origin the cookie source to validate against
65 void validate(Cookie cookie, CookieOrigin origin) argument
73 * @param origin the cookie source to match against
76 boolean match(Cookie cookie, CookieOrigin origin); argument
/external/chromium/chrome/browser/chromeos/views/
H A Dcopy_background.cc23 gfx::Point origin(0, 0);
26 &origin);
28 // Move the origin and paint as if it's paint onto the owner.
29 canvas->TranslateInt(-origin.x(), -origin.y());
/external/chromium/chrome/browser/notifications/
H A Dnotifications_prefs_cache.cc21 const GURL& origin) {
24 allowed_origins_.insert(origin);
25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end())
30 const GURL& origin) {
33 denied_origins_.insert(origin);
34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end())
60 std::string origin; local
62 (*i)->GetAsString(&origin);
63 origin_vector->push_back(GURL(origin));
67 int NotificationsPrefsCache::HasPermission(const GURL& origin) { argument
20 CacheAllowedOrigin( const GURL& origin) argument
29 CacheDeniedOrigin( const GURL& origin) argument
86 IsOriginAllowed( const GURL& origin) argument
92 IsOriginDenied( const GURL& origin) argument
[all...]
H A Dnotifications_prefs_cache.h32 // Checks to see if a given origin has permission to create desktop
35 int HasPermission(const GURL& origin);
37 // Updates the cache with a new origin allowed or denied.
38 void CacheAllowedOrigin(const GURL& origin);
39 void CacheDeniedOrigin(const GURL& origin);
61 bool IsOriginAllowed(const GURL& origin);
62 bool IsOriginDenied(const GURL& origin);
/external/chromium/webkit/glue/
H A Dform_data.cc16 origin(data.origin),
28 origin == form.origin &&
/external/chromium/chrome/browser/
H A Dbrowsing_data_database_helper_unittest.cc19 const GURL origin("http://host1:1/");
26 helper->AddDatabase(origin, db, "");
H A Dbrowsing_data_indexed_db_helper_unittest.cc19 const GURL origin("http://host1:1/");
26 helper->AddIndexedDB(origin, description);
H A Dbrowsing_data_local_storage_helper_unittest.cc18 const GURL origin("http://host1:1/");
24 helper->AddLocalStorage(origin);
/external/webkit/Source/WebKit/chromium/src/
H A DStorageEventDispatcherChromium.cpp48 SecurityOrigin* origin, Frame* sourceFrame)
51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage);
46 dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* origin, Frame* sourceFrame) argument
/external/webkit/Source/WebKit/qt/Api/
H A Dqwebsecurityorigin_p.h31 origin = o;
36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate

Completed in 319 milliseconds

1234567891011>>