Searched refs:securityOrigin (Results 51 - 75 of 132) sorted by relevance

123456

/external/webkit/Source/WebKit/gtk/webkit/
H A Dwebkitwebdatabase.cpp255 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin) argument
258 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin));
265 g_object_ref(securityOrigin);
266 priv->origin = securityOrigin;
/external/webkit/Source/WebCore/storage/
H A DDatabaseTracker.cpp141 SecurityOrigin* origin = context->securityOrigin();
229 SecurityOrigin* origin = database->securityOrigin();
248 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin());
523 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin());
526 m_openDatabaseMap->set(database->securityOrigin()->threadsafeCopy(), nameMap);
540 if (!originQuotaManager().tracksOrigin(database->securityOrigin())) {
541 originQuotaManager().trackOrigin(database->securityOrigin());
542 originQuotaManager().addDatabase(database->securityOrigin(), database->stringIdentifier(), database->fileName());
547 doneCreatingDatabase(database->securityOrigin(), database->stringIdentifier());
564 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin());
[all...]
H A DDatabase.cpp94 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data());
106 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize);
110 InspectorInstrumentation::didOpenDatabase(context, database, context->securityOrigin()->host(), name, expectedVersion);
409 SecurityOrigin* Database::securityOrigin() const function in class:WebCore::Database
/external/webkit/Source/WebCore/page/
H A DDOMWindow.cpp638 if (!document->securityOrigin()->canAccessLocalStorage()) {
647 RefPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin());
663 if (!document->securityOrigin()->canAccessLocalStorage()) {
675 RefPtr<StorageArea> storageArea = page->group().localStorage()->storageArea(document->securityOrigin());
753 if (!AsyncFileSystem::isAvailable() || !document->securityOrigin()->canAccessFileSystem()) {
773 SecurityOrigin* securityOrigin = document->securityOrigin();
775 if (!AsyncFileSystem::isAvailable() || !securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
830 String sourceOrigin = sourceDocument->securityOrigin()
[all...]
H A DEventSource.cpp69 , m_origin(context->securityOrigin()->toString())
87 if (!context->securityOrigin()->canRequest(fullURL)) {
H A DLocation.cpp257 if (!activeWindow->securityOrigin()->canAccess(targetWindow->securityOrigin())) {
/external/webkit/Source/WebKit/android/WebCoreSupport/
H A DGeolocationPermissions.cpp76 String originString = frame->document()->securityOrigin()->toString();
133 String originString = frame->document()->securityOrigin()->toString();
269 if (origin == frame->document()->securityOrigin()->toString()) {
/external/webkit/Source/WebCore/bindings/js/
H A DJSDocumentCustom.cpp93 frame->navigationScheduler()->scheduleLocationChange(lexicalFrame->document()->securityOrigin(),
/external/webkit/Source/WebCore/dom/
H A DScriptExecutionContext.cpp305 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument
307 m_securityOrigin = securityOrigin;
313 if (securityOrigin()->canRequest(targetURL))
384 KURL publicURL = BlobURL::createPublicURL(securityOrigin());
H A DScriptExecutionContext.h92 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::ScriptExecutionContext
H A DDOMImplementation.cpp253 doc->setSecurityOrigin(m_ownerDocument->securityOrigin());
318 d->setSecurityOrigin(m_ownerDocument->securityOrigin());
H A DDocument.cpp1924 ScriptExecutionContext::setSecurityOrigin(ownerDocument->securityOrigin());
2671 frame->navigationScheduler()->scheduleLocationChange(securityOrigin(), blankURL(), String());
3690 if (!securityOrigin()->canAccessCookies()) {
3711 if (!securityOrigin()->canAccessCookies()) {
3732 return securityOrigin()->domain();
3737 if (SecurityOrigin::isDomainRelaxationForbiddenForURLScheme(securityOrigin()->protocol())) {
3748 // securityOrigin()->setDomainForDOM. This will change the
3754 securityOrigin()->setDomainFromDOM(newDomain);
3783 securityOrigin()->setDomainFromDOM(newDomain);
4483 if (securityOrigin()
[all...]
/external/webkit/Source/WebCore/fileapi/
H A DDOMFileSystemBase.h75 SecurityOrigin* securityOrigin() const;
H A DFileReaderLoader.cpp77 m_urlForReading = BlobURL::createPublicURL(scriptExecutionContext->securityOrigin());
H A DDOMFileSystemBase.cpp101 SecurityOrigin* DOMFileSystemBase::securityOrigin() const function in class:WebCore::DOMFileSystemBase
103 return m_context->securityOrigin();
/external/webkit/Source/WebCore/html/
H A DHTMLCanvasElement.h117 const SecurityOrigin& securityOrigin() const;
H A DHTMLAppletElement.cpp168 if (document()->securityOrigin()->isSandboxed(SandboxPlugins))
/external/webkit/Source/WebCore/inspector/
H A DInspectorPageAgent.cpp105 FrameLoadRequest request(mainFrame->document()->securityOrigin(), ResourceRequest(), "_blank");
116 newFrame->loader()->changeLocation(mainFrame->document()->securityOrigin(), newFrame->loader()->completeURL(url), "", false, false);
/external/webkit/Source/WebCore/loader/
H A DMainResourceLoader.cpp183 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(newRequest.url()); local
184 if (!securityOrigin->canRequest(redirectResponse.url()))
213 frameLoader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), newRequest.url());
/external/webkit/Source/WebCore/css/
H A DCSSImportRule.cpp81 if (!parent || !parent->document() || !parent->document()->securityOrigin()->canRequest(baseURL))
/external/webkit/Source/WebCore/loader/cache/
H A DCachedResourceLoader.cpp231 if (!m_document->securityOrigin()->canRequest(url)) {
253 f->loader()->checkIfRunInsecureContent(m_document->securityOrigin(), url);
261 top->loader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), url);
321 if (!document()->securityOrigin()->canDisplay(url)) {
/external/webkit/Source/WebCore/xml/
H A DXSLTProcessorQt.cpp109 if (!m_document->frame() || !m_document->securityOrigin()->canRequest(url))
/external/webkit/Source/WebKit/qt/WebCoreSupport/
H A DChromeClientQt.cpp534 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin()))
535 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota);
554 QWebSecurityOrigin* securityOrigin = new QWebSecurityOrigin(priv); local
559 emit m_webPage->applicationCacheQuotaExceeded(securityOrigin, defaultOriginQuota);
/external/webkit/Source/WebKit/mac/Plugins/
H A DWebPluginContainerCheck.mm102 if (!coreFrame->document()->securityOrigin()->canDisplay([_request URL])) {
/external/webkit/Source/WebKit/wx/WebKitSupport/
H A DChromeClientWx.cpp430 if (!DatabaseTracker::tracker().hasEntryForOrigin(document->securityOrigin()))
431 DatabaseTracker::tracker().setQuota(document->securityOrigin(), quota);

Completed in 395 milliseconds

123456