/external/webkit/WebKit/win/ |
H A D | WebSecurityOrigin.h | 40 WebCore::SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function
|
H A D | WebSecurityOrigin.cpp | 43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) argument 45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); 50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) argument 52 , m_securityOrigin(securityOrigin)
|
/external/webkit/WebCore/storage/ |
H A D | StorageEventDispatcher.cpp | 41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 69 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
H A D | Database.cpp | 139 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data()); 152 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize); 159 page->inspectorController()->didOpenDatabase(database.get(), context->securityOrigin()->host(), name, expectedVersion); 180 m_mainThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin(); 187 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 202 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name); 731 SecurityOrigin* Database::securityOrigin() const function in class:WebCore::Database
|
/external/webkit/WebKit/chromium/src/ |
H A D | StorageEventDispatcherImpl.cpp | 54 const String& newValue, SecurityOrigin* securityOrigin, 69 if (frame->document()->securityOrigin()->equal(securityOrigin)) 53 dispatchStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& url, StorageType storageType) argument
|
H A D | WebStorageEventDispatcherImpl.cpp | 66 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(origin); local 67 m_eventDispatcher->dispatchStorageEvent(key, oldValue, newValue, securityOrigin.get(), url, storageType);
|
H A D | StorageAreaProxy.cpp | 82 storageEvent(key, oldValue, value, m_storageType, frame->document()->securityOrigin(), frame); 91 storageEvent(key, oldValue, String(), m_storageType, frame->document()->securityOrigin(), frame); 100 storageEvent(String(), String(), String(), m_storageType, frame->document()->securityOrigin(), frame); 110 void StorageAreaProxy::storageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 122 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 134 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
H A D | WebDatabase.cpp | 87 WebSecurityOrigin WebDatabase::securityOrigin() const function in class:WebKit::WebDatabase 90 return WebSecurityOrigin(m_private->securityOrigin());
|
H A D | WebFrameImpl.cpp | 573 WebSecurityOrigin WebFrameImpl::securityOrigin() const function in class:WebKit::WebFrameImpl 578 return WebSecurityOrigin(m_frame->document()->securityOrigin()); 585 m_frame->document()->securityOrigin()->grantUniversalAccess(); 1994 SecurityOrigin* securityOrigin = m_frame->document()->securityOrigin(); 1998 m_frame->loader()->begin(m_frame->loader()->url(), true, securityOrigin);
|
/external/webkit/WebCore/loader/ |
H A D | CrossOriginAccessControl.cpp | 95 bool passesAccessControlCheck(const ResourceResponse& response, bool includeCredentials, SecurityOrigin* securityOrigin) argument 103 if (securityOrigin->isUnique()) 107 if (!accessControlOrigin->isSameSchemeHostPort(securityOrigin))
|
H A D | FrameLoader.cpp | 171 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin()); 562 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url()); 713 begin(m_URL, true, m_frame->document()->securityOrigin()); 837 bool resetScripting = !(m_isDisplayingInitialEmptyDocument && m_frame->document()->securityOrigin()->isSecureTransitionTo(url)); 869 m_frame->domWindow()->setSecurityOrigin(document->securityOrigin()); 1400 checkIfRunInsecureContent(m_frame->document()->securityOrigin(), url); 1421 return m_frame->document()->securityOrigin()->toString(); 1474 m_frame->domWindow()->setSecurityOrigin(m_frame->document()->securityOrigin()); 2272 const SecurityOrigin* ancestorSecurityOrigin = ancestorDocument->securityOrigin(); 3838 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString(item->referrer()); local [all...] |
/external/webkit/WebCore/dom/ |
H A D | ScriptExecutionContext.h | 86 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::ScriptExecutionContext
|
H A D | ScriptExecutionContext.cpp | 243 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 245 m_securityOrigin = securityOrigin;
|
/external/webkit/WebKit/android/jni/ |
H A D | WebStorage.cpp | 77 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 78 unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get()); 85 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 86 unsigned long long usage = WebCore::DatabaseTracker::tracker().usageForOrigin(securityOrigin.get()); 95 if (manifestOrigin->isSameSchemeHostPort(securityOrigin.get())) { 107 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 108 WebCore::DatabaseTracker::tracker().setQuota(securityOrigin.get(), quota); 114 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local 115 WebCore::DatabaseTracker::tracker().deleteOrigin(securityOrigin.get()); 125 if (manifestOrigin->isSameSchemeHostPort(securityOrigin [all...] |
/external/webkit/WebCore/page/ |
H A D | DOMWindow.h | 98 void setSecurityOrigin(SecurityOrigin* securityOrigin) { m_securityOrigin = securityOrigin; } argument 99 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::DOMWindow
|
/external/webkit/WebKit/gtk/webkit/ |
H A D | webkitsecurityorigin.cpp | 65 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 66 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 76 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 77 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 90 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 94 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value)); 104 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local 108 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin)); 111 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin)); 114 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin)); 214 webkit_security_origin_init(WebKitSecurityOrigin* securityOrigin) argument 231 webkit_security_origin_get_protocol(WebKitSecurityOrigin* securityOrigin) argument 254 webkit_security_origin_get_host(WebKitSecurityOrigin* securityOrigin) argument 277 webkit_security_origin_get_port(WebKitSecurityOrigin* securityOrigin) argument 296 webkit_security_origin_get_web_database_usage(WebKitSecurityOrigin* securityOrigin) argument 319 webkit_security_origin_get_web_database_quota(WebKitSecurityOrigin* securityOrigin) argument 340 webkit_security_origin_set_web_database_quota(WebKitSecurityOrigin* securityOrigin, guint64 quota) argument 360 webkit_security_origin_get_all_web_databases(WebKitSecurityOrigin* securityOrigin) argument 398 core(WebKitSecurityOrigin* securityOrigin) argument 405 webkit_security_origin_get_web_database(WebKitSecurityOrigin* securityOrigin, const gchar* databaseName) argument [all...] |
H A D | webkitwebdatabase.cpp | 258 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin) argument 261 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin)); 268 g_object_ref(securityOrigin); 269 priv->origin = securityOrigin;
|
/external/webkit/WebCore/platform/graphics/gtk/ |
H A D | MediaPlayerPrivateGStreamer.cpp | 850 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(currentUrl); local 851 if (securityOrigin->canRequest(newUrl)) {
|