/external/chromium/chrome/common/ |
H A D | content_settings_helper.cc | 14 std::string OriginToString(const GURL& origin) { argument 15 std::string port_component(origin.IntPort() != url_parse::PORT_UNSPECIFIED ? 16 ":" + origin.port() : ""); 17 std::string scheme_component(!origin.SchemeIs(chrome::kHttpScheme) ? 18 origin.scheme() + chrome::kStandardSchemeSeparator : ""); 19 return scheme_component + origin.host() + port_component; 22 string16 OriginToString16(const GURL& origin) { argument 23 return UTF8ToUTF16(OriginToString(origin));
|
H A D | content_settings_helper.h | 17 // Return simplified string representing origin. If origin is using http or 19 std::string OriginToString(const GURL& origin); 20 string16 OriginToString16(const GURL& origin);
|
/external/webkit/Source/WebCore/page/ |
H A D | OriginAccessEntry.cpp | 49 bool OriginAccessEntry::matchesOrigin(const SecurityOrigin& origin) const 51 ASSERT(origin.host() == origin.host().lower()); 52 ASSERT(origin.protocol() == origin.protocol().lower()); 54 if (m_protocol != origin.protocol()) 62 if (m_host == origin.host()) 74 if (origin.host().length() > m_host.length() && origin.host()[origin [all...] |
H A D | SecurityOriginHash.h | 39 static unsigned hash(SecurityOrigin* origin) argument 42 origin->protocol().impl() ? origin->protocol().impl()->hash() : 0, 43 origin->host().impl() ? origin->host().impl()->hash() : 0, 44 origin->port() 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) argument 50 return hash(origin.get());
|
/external/chromium/net/ftp/ |
H A D | ftp_auth_cache.cc | 15 FtpAuthCache::Entry::Entry(const GURL& origin, argument 18 : origin(origin), 29 FtpAuthCache::Entry* FtpAuthCache::Lookup(const GURL& origin) { argument 31 if (it->origin == origin) 37 void FtpAuthCache::Add(const GURL& origin, const string16& username, argument 39 DCHECK(origin.SchemeIs("ftp")); 40 DCHECK_EQ(origin.GetOrigin(), origin); 55 Remove(const GURL& origin, const string16& username, const string16& password) argument [all...] |
H A D | ftp_auth_cache.h | 30 Entry(const GURL& origin, const string16& username, 34 const GURL origin; member in struct:net::FtpAuthCache::Entry 42 // Return Entry corresponding to given |origin| or NULL if not found. 43 Entry* Lookup(const GURL& origin); 45 // Add an entry for |origin| to the cache (consisting of |username| and 46 // |password|). If there is already an entry for |origin|, it will be 48 void Add(const GURL& origin, const string16& username, 51 // Remove the entry for |origin| from the cache, if one exists and matches 53 void Remove(const GURL& origin, const string16& username,
|
/external/webkit/Source/WebKit/mac/Misc/ |
H A D | WebQuotaManager.h | 30 @discussion This protocol is used to view and manipulate a per-origin storage quota. 36 @param The security origin this will manage. 39 - (id)initWithOrigin:(WebSecurityOrigin *)origin; 42 @method origin 43 @result The security origin this manager is managing. 45 - (WebSecurityOrigin *)origin; 49 @result The current total usage of all relevant items in this security origin in bytes. 55 @result The current quota of security origin in bytes. 61 @param Sets a new quota, in bytes, on this security origin.
|
H A D | WebNSWindowExtras.m | 43 NSPoint origin; 44 origin.y = NSMaxY(frameToCenterOver) 47 origin.x = frameToCenterOver.origin.x 49 [self setFrameOrigin:origin];
|
/external/webkit/Source/WebKit2/UIProcess/ |
H A D | WebDatabaseManagerProxyClient.cpp | 33 void WebDatabaseManagerProxyClient::didModifyOrigin(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin) argument 38 m_client.didModifyOrigin(toAPI(databaseManager), toAPI(origin), m_client.clientInfo); 41 void WebDatabaseManagerProxyClient::didModifyDatabase(WebDatabaseManagerProxy* databaseManager, WebSecurityOrigin* origin, const String& databaseIdentifier) argument 46 m_client.didModifyDatabase(toAPI(databaseManager), toAPI(origin), toAPI(databaseIdentifier.impl()), m_client.clientInfo);
|
/external/webkit/Source/WebCore/storage/ |
H A D | OriginQuotaManager.cpp | 73 void OriginQuotaManager::trackOrigin(PassRefPtr<SecurityOrigin> origin) argument 76 ASSERT(!m_usageMap.contains(origin.get())); 78 m_usageMap.set(origin->threadsafeCopy(), new OriginUsageRecord); 81 bool OriginQuotaManager::tracksOrigin(SecurityOrigin* origin) const 84 return m_usageMap.contains(origin); 87 void OriginQuotaManager::addDatabase(SecurityOrigin* origin, const String& databaseIdentifier, const String& fullPath) argument 91 OriginUsageRecord* usageRecord = m_usageMap.get(origin); 97 void OriginQuotaManager::removeDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument 101 if (OriginUsageRecord* usageRecord = m_usageMap.get(origin)) 105 void OriginQuotaManager::removeOrigin(SecurityOrigin* origin) argument [all...] |
H A D | DatabaseTracker.cpp | 126 if (!m_database.executeCommand("CREATE TABLE Origins (origin TEXT UNIQUE ON CONFLICT REPLACE, quota INTEGER NOT NULL ON CONFLICT FAIL);")) { 132 if (!m_database.executeCommand("CREATE TABLE Databases (guid INTEGER PRIMARY KEY AUTOINCREMENT, origin TEXT, name TEXT, displayName TEXT, estimatedSize INTEGER, path TEXT);")) { 141 SecurityOrigin* origin = context->securityOrigin(); local 149 if (!canCreateDatabase(origin, name)) 152 recordCreatingDatabase(origin, name); 154 // Since we're imminently opening a database within this context's origin, make sure this origin is being tracked by the QuotaTracker 156 unsigned long long usage = usageForOriginNoLock(origin); 159 if (hasEntryForDatabase(origin, name)) 165 doneCreatingDatabase(origin, nam 193 hasEntryForOriginNoLock(SecurityOrigin* origin) argument 200 hasEntryForOrigin(SecurityOrigin* origin) argument 206 hasEntryForDatabase(SecurityOrigin* origin, const String& databaseIdentifier) argument 229 SecurityOrigin* origin = database->securityOrigin(); local 273 fullPathForDatabaseNoLock(SecurityOrigin* origin, const String& name, bool createIfNotExists) argument 326 fullPathForDatabase(SecurityOrigin* origin, const String& name, bool createIfNotExists) argument 355 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(statement.getColumnText(0)); local 370 databaseNamesForOriginNoLock(SecurityOrigin* origin, Vector<String>& resultVector) argument 396 databaseNamesForOrigin(SecurityOrigin* origin, Vector<String>& resultVector) argument 410 detailsForNameAndOrigin(const String& name, SecurityOrigin* origin) argument 450 setDatabaseDetails(SecurityOrigin* origin, const String& name, const String& displayName, unsigned long estimatedSize) argument 502 usageForDatabase(const String& name, SecurityOrigin* origin) argument 597 getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases) argument 615 usageForOriginNoLock(SecurityOrigin* origin) argument 637 usageForOrigin(SecurityOrigin* origin) argument 644 quotaForOriginNoLock(SecurityOrigin* origin) argument 651 quotaForOrigin(SecurityOrigin* origin) argument 657 setQuota(SecurityOrigin* origin, unsigned long long quota) argument 704 addDatabase(SecurityOrigin* origin, const String& name, const String& path) argument 746 deleteOrigin(SecurityOrigin* origin) argument 832 canCreateDatabase(SecurityOrigin *origin, const String& name) argument 839 recordCreatingDatabase(SecurityOrigin *origin, const String& name) argument 851 doneCreatingDatabase(SecurityOrigin *origin, const String& name) argument 870 creatingDatabase(SecurityOrigin *origin, const String& name) argument 877 canDeleteDatabase(SecurityOrigin *origin, const String& name) argument 883 recordDeletingDatabase(SecurityOrigin *origin, const String& name) argument 896 doneDeletingDatabase(SecurityOrigin *origin, const String& name) argument 912 deletingDatabase(SecurityOrigin *origin, const String& name) argument 919 canDeleteOrigin(SecurityOrigin *origin) argument 925 deletingOrigin(SecurityOrigin *origin) argument 931 recordDeletingOrigin(SecurityOrigin *origin) argument 938 doneDeletingOrigin(SecurityOrigin *origin) argument 945 deleteDatabase(SecurityOrigin* origin, const String& name) argument 1002 deleteDatabaseFile(SecurityOrigin* origin, const String& name) argument 1064 scheduleNotifyDatabaseChanged(SecurityOrigin* origin, const String& name) argument [all...] |
/external/webkit/Source/WebKit/mac/Storage/ |
H A D | WebDatabaseTrackerClient.mm | 58 static void dispatchToMainThread(WebDatabaseTrackerClient* client, SecurityOrigin* origin) 60 DidModifyOriginData* context = new DidModifyOriginData(client, origin->threadsafeCopy()); 65 DidModifyOriginData(WebDatabaseTrackerClient* client, PassRefPtr<SecurityOrigin> origin) 67 , origin(origin) 75 info->client->dispatchDidModifyOrigin(info->origin.get()); 80 RefPtr<SecurityOrigin> origin; 83 void WebDatabaseTrackerClient::dispatchDidModifyOrigin(SecurityOrigin* origin) 86 DidModifyOriginData::dispatchToMainThread(this, origin); 90 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin]); [all...] |
H A D | WebDatabaseManagerPrivate.h | 37 // Posted with an origin is created from scratch, gets a new database, has a database deleted, has a quota change, etc 38 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 42 // The notification object will be a WebSecurityOrigin object corresponding to the origin. 56 // Will return an array of strings, the identifiers of each database in the given origin. 57 - (NSArray *)databasesWithOrigin:(WebSecurityOrigin *)origin; 59 // Will return the dictionary describing everything about the database for the passed identifier and origin. 60 - (NSDictionary *)detailsForDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin; 63 - (BOOL)deleteOrigin:(WebSecurityOrigin *)origin; 64 - (BOOL)deleteDatabase:(NSString *)databaseIdentifier withOrigin:(WebSecurityOrigin *)origin;
|
H A D | WebStorageTrackerClient.mm | 57 RefPtr<SecurityOrigin> origin = adoptRef(static_cast<SecurityOrigin*>(context)); 58 WebStorageTrackerClient::sharedWebStorageTrackerClient()->dispatchDidModifyOrigin(origin.get()); 61 void WebStorageTrackerClient::dispatchDidModifyOrigin(PassRefPtr<SecurityOrigin> origin) 63 RetainPtr<WebSecurityOrigin> webSecurityOrigin(AdoptNS, [[WebSecurityOrigin alloc] _initWithWebCoreSecurityOrigin:origin.get()]); 71 PassRefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier); 75 callOnMainThread(dispatchDidModifyOriginOnMainThread, origin.leakRef()); 79 dispatchDidModifyOrigin(origin);
|
/external/apache-http/src/org/apache/http/cookie/ |
H A D | CookieSpec.java | 46 * for a given host, port and path of origin 72 * @param origin details of the cookie origin 76 List<Cookie> parse(Header header, CookieOrigin origin) throws MalformedCookieException; argument 83 * @param origin details of the cookie origin 86 void validate(Cookie cookie, CookieOrigin origin) throws MalformedCookieException; argument 92 * @param origin the target to test against 97 boolean match(Cookie cookie, CookieOrigin origin); argument
|
H A D | CookieAttributeHandler.java | 62 * @param origin the cookie source to validate against 65 void validate(Cookie cookie, CookieOrigin origin) argument 73 * @param origin the cookie source to match against 76 boolean match(Cookie cookie, CookieOrigin origin); argument
|
/external/chromium/chrome/browser/chromeos/views/ |
H A D | copy_background.cc | 23 gfx::Point origin(0, 0); 26 &origin); 28 // Move the origin and paint as if it's paint onto the owner. 29 canvas->TranslateInt(-origin.x(), -origin.y());
|
/external/chromium/chrome/browser/notifications/ |
H A D | notifications_prefs_cache.cc | 21 const GURL& origin) { 24 allowed_origins_.insert(origin); 25 if ((iter = denied_origins_.find(origin)) != denied_origins_.end()) 30 const GURL& origin) { 33 denied_origins_.insert(origin); 34 if ((iter = allowed_origins_.find(origin)) != allowed_origins_.end()) 60 std::string origin; local 62 (*i)->GetAsString(&origin); 63 origin_vector->push_back(GURL(origin)); 67 int NotificationsPrefsCache::HasPermission(const GURL& origin) { argument 20 CacheAllowedOrigin( const GURL& origin) argument 29 CacheDeniedOrigin( const GURL& origin) argument 86 IsOriginAllowed( const GURL& origin) argument 92 IsOriginDenied( const GURL& origin) argument [all...] |
H A D | notifications_prefs_cache.h | 32 // Checks to see if a given origin has permission to create desktop 35 int HasPermission(const GURL& origin); 37 // Updates the cache with a new origin allowed or denied. 38 void CacheAllowedOrigin(const GURL& origin); 39 void CacheDeniedOrigin(const GURL& origin); 61 bool IsOriginAllowed(const GURL& origin); 62 bool IsOriginDenied(const GURL& origin);
|
/external/chromium/webkit/glue/ |
H A D | form_data.cc | 16 origin(data.origin), 28 origin == form.origin &&
|
/external/chromium/chrome/browser/ |
H A D | browsing_data_database_helper_unittest.cc | 19 const GURL origin("http://host1:1/"); 26 helper->AddDatabase(origin, db, "");
|
H A D | browsing_data_indexed_db_helper_unittest.cc | 19 const GURL origin("http://host1:1/"); 26 helper->AddIndexedDB(origin, description);
|
H A D | browsing_data_local_storage_helper_unittest.cc | 18 const GURL origin("http://host1:1/"); 24 helper->AddLocalStorage(origin);
|
/external/webkit/Source/WebKit/chromium/src/ |
H A D | StorageEventDispatcherChromium.cpp | 48 SecurityOrigin* origin, Frame* sourceFrame) 51 WebKit::webKitClient()->dispatchStorageEvent(key, oldValue, newValue, origin->toString(), WebKit::WebURL(), storageType == LocalStorage); 46 dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* origin, Frame* sourceFrame) argument
|
/external/webkit/Source/WebKit/qt/Api/ |
H A D | qwebsecurityorigin_p.h | 31 origin = o; 36 WTF::RefPtr<WebCore::SecurityOrigin> origin; member in class:QWebSecurityOriginPrivate
|