/external/webkit/Source/WebKit2/Shared/API/c/ |
H A D | WKSecurityOrigin.cpp | 41 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(identifier)->string()); local 42 return toAPI(securityOrigin.release().leakRef()); 47 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(protocol)->string(), toImpl(host)->string(), port); local 48 return toAPI(securityOrigin.release().leakRef()); 51 WKStringRef WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin) argument 53 return toCopiedAPI(toImpl(securityOrigin)->protocol()); 56 WKStringRef WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin) argument 58 return toCopiedAPI(toImpl(securityOrigin)->host()); 61 unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin) argument 63 return toImpl(securityOrigin) [all...] |
H A D | WKSecurityOrigin.h | 40 WK_EXPORT WKStringRef WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin); 41 WK_EXPORT WKStringRef WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin); 42 WK_EXPORT unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin);
|
/external/webkit/Source/WebKit/chromium/src/ |
H A D | WebGeolocationPermissionRequest.cpp | 39 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:WebKit::WebGeolocationPermissionRequest 41 return WebSecurityOrigin(m_private->frame()->document()->securityOrigin());
|
H A D | StorageAreaProxy.cpp | 84 storageEvent(key, oldValue, value, m_storageType, frame->document()->securityOrigin(), frame); 93 storageEvent(key, oldValue, String(), m_storageType, frame->document()->securityOrigin(), frame); 102 storageEvent(String(), String(), String(), m_storageType, frame->document()->securityOrigin(), frame); 112 void StorageAreaProxy::storageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 124 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 140 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
H A D | WebStorageEventDispatcherImpl.cpp | 66 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(origin); local 67 m_eventDispatcher->dispatchStorageEvent(key, oldValue, newValue, securityOrigin.get(), url, storageType);
|
H A D | StorageEventDispatcherImpl.cpp | 54 const String& newValue, SecurityOrigin* securityOrigin, 69 if (frame->document()->securityOrigin()->equal(securityOrigin)) 53 dispatchStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& url, StorageType storageType) argument
|
H A D | WebDatabase.cpp | 50 SecurityOrigin* securityOrigin() const { return 0; } function in class:WebCore::AbstractDatabase 79 WebSecurityOrigin WebDatabase::securityOrigin() const function in class:WebKit::WebDatabase 82 return WebSecurityOrigin(m_database->securityOrigin());
|
/external/webkit/Source/WebKit/gtk/webkit/ |
H A D | webkitsecurityorigin.cpp | 64 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 65 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 75 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 76 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 89 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 93 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value)); 103 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 107 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin)); 110 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin)); 113 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin)); 213 webkit_security_origin_init(WebKitSecurityOrigin* securityOrigin) argument 230 webkit_security_origin_get_protocol(WebKitSecurityOrigin* securityOrigin) argument 253 webkit_security_origin_get_host(WebKitSecurityOrigin* securityOrigin) argument 276 webkit_security_origin_get_port(WebKitSecurityOrigin* securityOrigin) argument 295 webkit_security_origin_get_web_database_usage(WebKitSecurityOrigin* securityOrigin) argument 318 webkit_security_origin_get_web_database_quota(WebKitSecurityOrigin* securityOrigin) argument 339 webkit_security_origin_set_web_database_quota(WebKitSecurityOrigin* securityOrigin, guint64 quota) argument 360 webkit_security_origin_get_all_web_databases(WebKitSecurityOrigin* securityOrigin) argument 381 webkit_security_origin_get_web_database(WebKitSecurityOrigin* securityOrigin, const gchar* databaseName) argument 402 core(WebKitSecurityOrigin* securityOrigin) argument [all...] |
H A D | webkitsecurityorigin.h | 57 webkit_security_origin_get_protocol (WebKitSecurityOrigin* securityOrigin); 60 webkit_security_origin_get_host (WebKitSecurityOrigin* securityOrigin); 63 webkit_security_origin_get_port (WebKitSecurityOrigin* securityOrigin); 66 webkit_security_origin_get_web_database_usage (WebKitSecurityOrigin* securityOrigin); 69 webkit_security_origin_get_web_database_quota (WebKitSecurityOrigin* securityOrigin); 72 webkit_security_origin_set_web_database_quota (WebKitSecurityOrigin* securityOrigin, guint64 quota); 75 webkit_security_origin_get_all_web_databases (WebKitSecurityOrigin* securityOrigin);
|
/external/webkit/Source/WebKit2/Shared/ |
H A D | WebSecurityOrigin.h | 41 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromDatabaseIdentifier(identifier); local 42 if (!securityOrigin) 44 return adoptRef(new WebSecurityOrigin(securityOrigin.release())); 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(protocol, host, port); local 50 if (!securityOrigin) 52 return adoptRef(new WebSecurityOrigin(securityOrigin.release())); 62 WebSecurityOrigin(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) argument 63 : m_securityOrigin(securityOrigin)
|
/external/webkit/Source/WebCore/fileapi/ |
H A D | BlobURL.cpp | 44 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument 46 ASSERT(securityOrigin); 47 return createBlobURL(securityOrigin->toString());
|
/external/webkit/Source/WebCore/storage/ |
H A D | SQLTransactionClient.cpp | 46 database->securityOrigin(), database->stringIdentifier()); 57 unsigned long long currentQuota = DatabaseTracker::tracker().quotaForOrigin(database->securityOrigin()); 59 unsigned long long newQuota = DatabaseTracker::tracker().quotaForOrigin(database->securityOrigin());
|
H A D | StorageEventDispatcher.cpp | 41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 73 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
H A D | IDBFactoryBackendImpl.cpp | 73 void IDBFactoryBackendImpl::open(const String& name, PassRefPtr<IDBCallbacks> callbacks, PassRefPtr<SecurityOrigin> securityOrigin, Frame*, const String& dataDir, int64_t maximumSize, BackingStoreType backingStoreType) argument 75 String fileIdentifier = securityOrigin->databaseIdentifier(); 91 backingStore = IDBSQLiteBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this); 94 backingStore = IDBLevelDBBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this);
|
/external/webkit/Source/WebKit2/UIProcess/ |
H A D | WebResourceCacheManagerProxy.cpp | 83 SecurityOriginData securityOrigin; local 84 securityOrigin.protocol = origin->protocol(); 85 securityOrigin.host = origin->host(); 86 securityOrigin.port = origin->port(); 88 m_webContext->sendToAllProcessesRelaunchingThemIfNecessary(Messages::WebResourceCacheManager::ClearCacheForOrigin(securityOrigin, cachesToClear));
|
/external/webkit/Source/WebCore/bindings/generic/ |
H A D | BindingSecurityBase.cpp | 89 const SecurityOrigin* activeSecurityOrigin = activeWindow->securityOrigin(); 90 const SecurityOrigin* targetSecurityOrigin = targetWindow->securityOrigin();
|
/external/webkit/Source/WebCore/loader/ |
H A D | CrossOriginAccessControl.cpp | 96 bool passesAccessControlCheck(const ResourceResponse& response, bool includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument 104 if (securityOrigin->isUnique()) { 105 errorDescription = "Cannot make any requests from " + securityOrigin->toString() + "."; 111 if (!accessControlOrigin->isSameSchemeHostPort(securityOrigin)) { 113 : "Origin " + securityOrigin->toString() + " is not allowed by Access-Control-Allow-Origin.";
|
H A D | NavigationScheduler.cpp | 97 ScheduledURLNavigation(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool duringLoad, bool isLocationChange) argument 99 , m_securityOrigin(securityOrigin) 127 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::ScheduledURLNavigation 140 ScheduledRedirect(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, bool lockHistory, bool lockBackForwardList) argument 141 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockHistory, lockBackForwardList, false, false) 151 ScheduledLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool duringLoad) argument 152 : ScheduledURLNavigation(0.0, securityOrigin, url, referrer, lockHistory, lockBackForwardList, duringLoad, true) { } 157 ScheduledRefresh(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer) argument 158 : ScheduledURLNavigation(0.0, securityOrigin, url, referrer, true, true, false, true) 165 frame->loader()->changeLocation(securityOrigin(), KUR 310 scheduleLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList) argument [all...] |
/external/webkit/Source/WebKit/chromium/public/ |
H A D | WebGeolocationPermissionRequest.h | 46 WEBKIT_API WebSecurityOrigin securityOrigin() const;
|
H A D | WebDatabase.h | 49 WEBKIT_API WebSecurityOrigin securityOrigin() const;
|
/external/webkit/Source/WebKit/android/jni/ |
H A D | WebStorage.cpp | 78 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 79 unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get()); 86 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 87 unsigned long long usage = WebCore::DatabaseTracker::tracker().usageForOrigin(securityOrigin.get()); 96 if (manifestOrigin->isSameSchemeHostPort(securityOrigin.get())) { 108 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 109 WebCore::DatabaseTracker::tracker().setQuota(securityOrigin.get(), quota); 115 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 116 WebCore::DatabaseTracker::tracker().deleteOrigin(securityOrigin.get()); 126 if (manifestOrigin->isSameSchemeHostPort(securityOrigin [all...] |
/external/webkit/Source/WebCore/storage/chromium/ |
H A D | DatabaseTrackerChromium.cpp | 81 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 84 m_openDatabaseMap->set(database->securityOrigin(), nameMap); 129 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 140 m_openDatabaseMap->remove(database->securityOrigin()); 172 database->securityOrigin()->databaseIdentifier(), 186 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin());
|
/external/webkit/Source/WebCore/inspector/ |
H A D | InspectorDOMStorageResource.cpp | 64 return equalIgnoringCase(m_frame->document()->securityOrigin()->host(), frame->document()->securityOrigin()->host()) && m_isLocalStorage == isLocalStorage; 73 jsonObject->setString("host", m_frame->document()->securityOrigin()->host());
|
/external/webkit/Source/WebKit/win/ |
H A D | WebSecurityOrigin.cpp | 43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) argument 45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); 50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) argument 52 , m_securityOrigin(securityOrigin)
|
/external/webkit/Source/WebCore/bindings/js/ |
H A D | JSDOMWindowCustom.h | 75 const SecurityOrigin* originSecurityOrigin = originWindow->impl()->securityOrigin(); 76 const SecurityOrigin* targetSecurityOrigin = targetWindow->impl()->securityOrigin();
|