/macosx-10.9.5/WebCore-7537.78.1/loader/ |
H A D | MixedContentChecker.cpp | 57 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument 62 // We're in a secure context, so |url| is mixed content if it's insecure. 63 return !SecurityOrigin::isSecure(url); 66 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 68 if (!isMixedContent(securityOrigin, url)) 72 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 73 logWarning(allowed, "displayed", url); 81 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 83 if (!isMixedContent(securityOrigin, url)) 87 bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); [all...] |
/macosx-10.9.5/curl-78.94.1/curl/src/ |
H A D | tool_operhlp.h | 32 bool output_expected(const char *url, const char *uploadfile); 36 char *add_file_name_to_url(CURL *curl, char *url, const char *filename); 38 CURLcode get_url_file_name(char **filename, const char *url);
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/ |
H A D | CredentialStorage.cpp | 64 static String originStringFromURL(const KURL& url) argument 66 if (url.port()) 67 return url.protocol() + "://" + url.host() + ':' + String::number(url.port()) + '/'; 69 return url.protocol() + "://" + url.host() + '/'; 72 static String protectionSpaceMapKeyFromURL(const KURL& url) argument 74 ASSERT(url.isValid()); 78 String directoryURL = url 90 set(const Credential& credential, const ProtectionSpace& protectionSpace, const KURL& url) argument 117 findDefaultProtectionSpaceForURL(const KURL& url) argument 146 set(const Credential& credential, const KURL& url) argument 158 get(const KURL& url) argument [all...] |
/macosx-10.9.5/WebCore-7537.78.1/svg/ |
H A D | SVGURIReference.cpp | 48 String SVGURIReference::fragmentIdentifierFromIRIString(const String& url, Document* document) argument 51 size_t start = url.find('#'); 55 KURL base = start ? KURL(document->baseURI(), url.substring(0, start)) : document->baseURI(); 56 String fragmentIdentifier = url.substring(start); 58 if (equalIgnoringFragmentIdentifier(kurl, document->url())) 61 // The url doesn't have any fragment identifier. 65 static inline KURL urlFromIRIStringWithFragmentIdentifier(const String& url, Document* document, String& fragmentIdentifier) argument 68 size_t startOfFragmentIdentifier = url.find('#'); 73 fragmentIdentifier = url.substring(startOfFragmentIdentifier + 1); 75 KURL base(document->baseURI(), url 86 KURL url = urlFromIRIStringWithFragmentIdentifier(iri, document, id); local [all...] |
/macosx-10.9.5/WebCore-7537.78.1/page/ |
H A D | DOMSecurityPolicy.cpp | 61 bool isAllowedWithURL(ScriptExecutionContext* context, const String& url) argument 66 KURL parsedURL = context->completeURL(url); 127 bool DOMSecurityPolicy::allowsConnectionTo(const String& url) const 129 return isAllowedWithURL<&ContentSecurityPolicy::allowConnectToSource>(scriptExecutionContext(), url); 132 bool DOMSecurityPolicy::allowsFontFrom(const String& url) const 134 return isAllowedWithURL<&ContentSecurityPolicy::allowFontFromSource>(scriptExecutionContext(), url); 137 bool DOMSecurityPolicy::allowsFormAction(const String& url) const 139 return isAllowedWithURL<&ContentSecurityPolicy::allowFormAction>(scriptExecutionContext(), url); 142 bool DOMSecurityPolicy::allowsFrameFrom(const String& url) const 144 return isAllowedWithURL<&ContentSecurityPolicy::allowChildFrameFromSource>(scriptExecutionContext(), url); [all...] |
/macosx-10.9.5/WebKit2-7537.78.2/Shared/API/c/ |
H A D | WKURL.h | 40 WK_EXPORT WKStringRef WKURLCopyString(WKURLRef url); 41 WK_EXPORT WKStringRef WKURLCopyHostName(WKURLRef url); 42 WK_EXPORT WKStringRef WKURLCopyScheme(WKURLRef url); 43 WK_EXPORT WKStringRef WKURLCopyPath(WKURLRef url); 44 WK_EXPORT WKStringRef WKURLCopyLastPathComponent(WKURLRef url);
|
H A D | WKURL.cpp | 48 WKStringRef WKURLCopyString(WKURLRef url) argument 50 return toCopiedAPI(toImpl(url)->string()); 58 WKStringRef WKURLCopyHostName(WKURLRef url) argument 60 return toCopiedAPI(toImpl(url)->host()); 63 WKStringRef WKURLCopyScheme(WKURLRef url) argument 65 return toCopiedAPI(toImpl(url)->protocol()); 68 WK_EXPORT WKStringRef WKURLCopyPath(WKURLRef url) argument 70 return toCopiedAPI(toImpl(url)->path()); 73 WKStringRef WKURLCopyLastPathComponent(WKURLRef url) argument 75 return toCopiedAPI(toImpl(url) [all...] |
/macosx-10.9.5/ruby-104/ruby/ext/win32ole/sample/ |
H A D | ienavi.rb | 5 def navigate(url) 6 $urls << url 28 ev.on_event("NavigateComplete") {|url| navigate(url)} 37 $urls.each_with_index do |url, i| 38 puts "(#{i+1}) #{url}"
|
/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/uri/ |
H A D | urn-scheme.tcl | 21 # Called by uri::split with a url to split into its parts. 51 set url "urn:$parts(nid):[urn::quote $parts(nss)]" 52 return $url 59 proc ::uri::urn::quote {url} { 64 while {[regexp -indices -- "\[^$trans\]" $url r]} { 66 scan [string index $url $ndx] %c chr 73 append result [string range $url 0 $ndx] $rep 75 set url [string range $url $ndx end] 77 append result $url [all...] |
H A D | uri.tcl | 12 # Handle www-url-encoding details 31 variable url "" 100 # the pattern for an url of the registered scheme after the 113 variable url 148 append url "(${s}:[set ${scheme}::schemepart])|" 150 set url [string trimright $url |] 156 # Splits the given <a url> into its constituents. 159 # url the URL to split 164 proc ::uri::split {url {defaultschem [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/libraries/libldap/ |
H A D | fetch.c | 44 FILE *url; local 69 url = fopen( p, "rb" ); 74 url = fetchGetURL( (char*) urlstr, "" ); 76 url = NULL; 79 return url; 88 FILE *url; local 97 url = ldif_open_url( urlstr ); 99 if( url == NULL ) { 105 while( (bytes = fread( buffer, 1, sizeof(buffer), url )) != 0 ) { 109 fclose( url ); [all...] |
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/libraries/liblutil/ |
H A D | fetch.c | 45 FILE *url; local 70 url = fopen( p, "rb" ); 75 url = fetchGetURL( (char*) urlstr, "" ); 77 url = NULL; 80 return url; 89 FILE *url; local 98 url = ldif_open_url( urlstr ); 100 if( url == NULL ) { 106 while( (bytes = fread( buffer, 1, sizeof(buffer), url )) != 0 ) { 110 fclose( url ); [all...] |
/macosx-10.9.5/WebCore-7537.78.1/inspector/front-end/ |
H A D | ResourceUtils.js | 32 * @param {string} url 35 WebInspector.resourceForURL = function(url) 37 return WebInspector.resourceTreeModel.resourceForURL(url); 49 * @param {string} url 52 WebInspector.displayNameForURL = function(url) 54 if (!url) 57 var resource = WebInspector.resourceForURL(url); 61 var uiSourceCode = WebInspector.workspace.uiSourceCodeForURL(url); 66 return url.trimURL(""); 73 if (url [all...] |
/macosx-10.9.5/WebCore-7537.78.1/dom/ |
H A D | BeforeLoadEvent.h | 40 String url; member in struct:WebCore::BeforeLoadEventInit 50 static PassRefPtr<BeforeLoadEvent> create(const String& url) argument 52 return adoptRef(new BeforeLoadEvent(url)); 60 const String& url() const { return m_url; } function in class:WebCore::BeforeLoadEvent 69 explicit BeforeLoadEvent(const String& url) argument 71 , m_url(url) 77 , m_url(initializer.url)
|
/macosx-10.9.5/tcl-102/tcl_ext/sdx/sdx/lib/uri/ |
H A D | uri.tcl | 12 # Handle www-url-encoding details 31 variable url "" 100 # the pattern for an url of the registered scheme after the 113 variable url 148 append url "(${s}:[set ${scheme}::schemepart])|" 150 set url [string trimright $url |] 156 # Splits the given <a url> into its constituents. 159 # url the URL to split 164 proc ::uri::split {url {defaultschem [all...] |
/macosx-10.9.5/WebCore-7537.78.1/platform/network/blackberry/ |
H A D | CookieJarBlackBerry.cpp | 27 void setCookiesFromDOM(const NetworkStorageSession&, const KURL& /*firstParty*/, const KURL& url, const String& value) argument 29 cookieManager().setCookies(url, value, NoHttpOnlyCookie); 32 String cookiesForDOM(const NetworkStorageSession&, const KURL& /*firstParty*/, const KURL& url) argument 35 return cookieManager().getCookie(url, NoHttpOnlyCookie); 38 String cookieRequestHeaderFieldValue(const NetworkStorageSession&, const KURL& /*firstParty*/, const KURL& url) argument 40 return cookieManager().getCookie(url, WithHttpOnlyCookies); 43 bool cookiesEnabled(const NetworkStorageSession&, const KURL& /*firstParty*/, const KURL& /*url*/) 48 bool getRawCookies(const NetworkStorageSession&, const KURL& /*firstParty*/, const KURL& url, Vector<Cookie>& rawCookies) argument 51 cookieManager().getRawCookies(result, url, WithHttpOnlyCookies); 57 void deleteCookie(const NetworkStorageSession&, const KURL& url, cons argument [all...] |
/macosx-10.9.5/emacs-92/emacs/lisp/url/ |
H A D | url-imap.el | 0 ;;; url-imap.el --- IMAP retrieval routines 31 ;; (url-imap (url-generic-parse-url "imap://cyrus.andrew.cmu.edu/archive.c-client;UID=1021")) 36 (require 'url-util) 37 (require 'url-parse) 41 (defconst url-imap-default-port 143 "Default IMAP port") 43 (defun url-imap-open-host (host port user pass) 55 (defun url-imap (url) [all...] |
H A D | url-misc.el | 0 ;;; url-misc.el --- Misc Uniform Resource Locator retrieval code 28 (require 'url-vars) 29 (require 'url-parse) 34 (defun url-man (url) 36 (man (url-filename url)) 40 (defun url-info (url) 43 (let* ((fname (url [all...] |
H A D | url-cache.el | 0 ;;; url-cache.el --- Uniform Resource Locator retrieval tool 27 (require 'url-parse) 28 (require 'url-util) 29 (require 'url) ;E.g. for url-configuration-directory. 31 (defcustom url-cache-directory 32 (expand-file-name "cache" url-configuration-directory) 35 :group 'url-file) 38 (defun url-cache-file-writable-p (file) 45 (defun url [all...] |
/macosx-10.9.5/ruby-104/ruby/test/uri/ |
H A D | test_ftp.rb | 12 url = URI.parse('ftp://user:pass@host.com/abc/def') 13 assert_kind_of(URI::FTP, url) 21 url.scheme, url.userinfo, url.host, url.port, 22 url.path, url.opaque 26 assert_equal('user', url.user) 27 assert_equal('pass', url [all...] |
/macosx-10.9.5/tcl-102/tcl_ext/tls/tls/tests/oldTests/ |
H A D | tlsHttp.tcl | 30 set url http://localhost:3466/ 31 set url https://intranet.novadigm.com/ 32 set url https://localhost/ 33 set url https://developer.netscape.com/ 35 set tok [http::geturl $url -headers $hdrs]
|
/macosx-10.9.5/autofs-234/automountd/ |
H A D | nfs_subr.c | 75 char *url; local 86 url = malloc(len); 88 if (url == NULL) 91 strlcpy(url, "nfs:", len); 92 strlcat(url, oldpath, len); 100 free(url); 111 p = strstr(newspec, url); 114 free(url); 132 free(url); 159 free(url); [all...] |
/macosx-10.9.5/WebCore-7537.78.1/Modules/mediasource/ |
H A D | MediaSourceRegistry.cpp | 49 void MediaSourceRegistry::registerMediaSourceURL(const KURL& url, PassRefPtr<MediaSource> source) argument 55 m_mediaSources.set(url.string(), source); 58 void MediaSourceRegistry::unregisterMediaSourceURL(const KURL& url) argument 61 HashMap<String, RefPtr<MediaSource> >::iterator iter = m_mediaSources.find(url.string()); 72 MediaSource* MediaSourceRegistry::lookupMediaSource(const String& url) argument 75 return m_mediaSources.get(url).get();
|
/macosx-10.9.5/WebCore-7537.78.1/Modules/navigatorcontentutils/ |
H A D | NavigatorContentUtils.idl | 23 [Conditional=NAVIGATOR_CONTENT_UTILS, RaisesException] void registerProtocolHandler(DOMString scheme, DOMString url, DOMString title); 24 [Conditional=NAVIGATOR_CONTENT_UTILS&CUSTOM_SCHEME_HANDLER, RaisesException] DOMString isProtocolHandlerRegistered(DOMString scheme, DOMString url); 25 [Conditional=NAVIGATOR_CONTENT_UTILS&CUSTOM_SCHEME_HANDLER, RaisesException] void unregisterProtocolHandler(DOMString scheme, DOMString url);
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/curl/ |
H A D | ResourceRequest.h | 38 ResourceRequest(const String& url) argument 39 : ResourceRequestBase(KURL(ParsedURLString, url), UseProtocolCachePolicy) 43 ResourceRequest(const KURL& url) argument 44 : ResourceRequestBase(url, UseProtocolCachePolicy) 48 ResourceRequest(const KURL& url, const String& referrer, ResourceRequestCachePolicy policy = UseProtocolCachePolicy) argument 49 : ResourceRequestBase(url, policy)
|