Searched defs:securityOrigin (Results 1 - 18 of 18) sorted by relevance

/external/webkit/WebKit/win/
H A DWebSecurityOrigin.h40 WebCore::SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function
H A DWebSecurityOrigin.cpp43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) argument
45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin);
50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) argument
52 , m_securityOrigin(securityOrigin)
/external/webkit/WebCore/storage/
H A DStorageEventDispatcher.cpp41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument
57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
69 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
H A DDatabase.cpp139 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data());
152 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize);
159 page->inspectorController()->didOpenDatabase(database.get(), context->securityOrigin()->host(), name, expectedVersion);
180 m_mainThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin();
187 m_guid = guidForOriginAndName(securityOrigin()->toString(), name);
202 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name);
731 SecurityOrigin* Database::securityOrigin() const function in class:WebCore::Database
/external/webkit/WebKit/chromium/src/
H A DStorageEventDispatcherImpl.cpp54 const String& newValue, SecurityOrigin* securityOrigin,
69 if (frame->document()->securityOrigin()->equal(securityOrigin))
53 dispatchStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& url, StorageType storageType) argument
H A DWebStorageEventDispatcherImpl.cpp66 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(origin); local
67 m_eventDispatcher->dispatchStorageEvent(key, oldValue, newValue, securityOrigin.get(), url, storageType);
H A DStorageAreaProxy.cpp82 storageEvent(key, oldValue, value, m_storageType, frame->document()->securityOrigin(), frame);
91 storageEvent(key, oldValue, String(), m_storageType, frame->document()->securityOrigin(), frame);
100 storageEvent(String(), String(), String(), m_storageType, frame->document()->securityOrigin(), frame);
110 void StorageAreaProxy::storageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument
122 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
134 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
H A DWebDatabase.cpp87 WebSecurityOrigin WebDatabase::securityOrigin() const function in class:WebKit::WebDatabase
90 return WebSecurityOrigin(m_private->securityOrigin());
H A DWebFrameImpl.cpp573 WebSecurityOrigin WebFrameImpl::securityOrigin() const function in class:WebKit::WebFrameImpl
578 return WebSecurityOrigin(m_frame->document()->securityOrigin());
585 m_frame->document()->securityOrigin()->grantUniversalAccess();
1994 SecurityOrigin* securityOrigin = m_frame->document()->securityOrigin();
1998 m_frame->loader()->begin(m_frame->loader()->url(), true, securityOrigin);
/external/webkit/WebCore/loader/
H A DCrossOriginAccessControl.cpp95 bool passesAccessControlCheck(const ResourceResponse& response, bool includeCredentials, SecurityOrigin* securityOrigin) argument
103 if (securityOrigin->isUnique())
107 if (!accessControlOrigin->isSameSchemeHostPort(securityOrigin))
H A DFrameLoader.cpp171 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin());
562 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url());
713 begin(m_URL, true, m_frame->document()->securityOrigin());
837 bool resetScripting = !(m_isDisplayingInitialEmptyDocument && m_frame->document()->securityOrigin()->isSecureTransitionTo(url));
869 m_frame->domWindow()->setSecurityOrigin(document->securityOrigin());
1400 checkIfRunInsecureContent(m_frame->document()->securityOrigin(), url);
1421 return m_frame->document()->securityOrigin()->toString();
1474 m_frame->domWindow()->setSecurityOrigin(m_frame->document()->securityOrigin());
2272 const SecurityOrigin* ancestorSecurityOrigin = ancestorDocument->securityOrigin();
3838 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString(item->referrer()); local
[all...]
/external/webkit/WebCore/dom/
H A DScriptExecutionContext.h86 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::ScriptExecutionContext
H A DScriptExecutionContext.cpp243 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument
245 m_securityOrigin = securityOrigin;
/external/webkit/WebKit/android/jni/
H A DWebStorage.cpp77 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local
78 unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get());
85 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local
86 unsigned long long usage = WebCore::DatabaseTracker::tracker().usageForOrigin(securityOrigin.get());
95 if (manifestOrigin->isSameSchemeHostPort(securityOrigin.get())) {
107 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local
108 WebCore::DatabaseTracker::tracker().setQuota(securityOrigin.get(), quota);
114 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); local
115 WebCore::DatabaseTracker::tracker().deleteOrigin(securityOrigin.get());
125 if (manifestOrigin->isSameSchemeHostPort(securityOrigin
[all...]
/external/webkit/WebCore/page/
H A DDOMWindow.h98 void setSecurityOrigin(SecurityOrigin* securityOrigin) { m_securityOrigin = securityOrigin; } argument
99 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::DOMWindow
/external/webkit/WebKit/gtk/webkit/
H A Dwebkitsecurityorigin.cpp65 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local
66 WebKitSecurityOriginPrivate* priv = securityOrigin->priv;
76 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local
77 WebKitSecurityOriginPrivate* priv = securityOrigin->priv;
90 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local
94 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value));
104 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); local
108 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin));
111 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin));
114 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin));
214 webkit_security_origin_init(WebKitSecurityOrigin* securityOrigin) argument
231 webkit_security_origin_get_protocol(WebKitSecurityOrigin* securityOrigin) argument
254 webkit_security_origin_get_host(WebKitSecurityOrigin* securityOrigin) argument
277 webkit_security_origin_get_port(WebKitSecurityOrigin* securityOrigin) argument
296 webkit_security_origin_get_web_database_usage(WebKitSecurityOrigin* securityOrigin) argument
319 webkit_security_origin_get_web_database_quota(WebKitSecurityOrigin* securityOrigin) argument
340 webkit_security_origin_set_web_database_quota(WebKitSecurityOrigin* securityOrigin, guint64 quota) argument
360 webkit_security_origin_get_all_web_databases(WebKitSecurityOrigin* securityOrigin) argument
398 core(WebKitSecurityOrigin* securityOrigin) argument
405 webkit_security_origin_get_web_database(WebKitSecurityOrigin* securityOrigin, const gchar* databaseName) argument
[all...]
H A Dwebkitwebdatabase.cpp258 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin) argument
261 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin));
268 g_object_ref(securityOrigin);
269 priv->origin = securityOrigin;
/external/webkit/WebCore/platform/graphics/gtk/
H A DMediaPlayerPrivateGStreamer.cpp850 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(currentUrl); local
851 if (securityOrigin->canRequest(newUrl)) {

Completed in 116 milliseconds