/external/webkit/Source/WebKit/gtk/webkit/ |
H A D | webkitwebdatabase.cpp | 255 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin) argument 258 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin)); 265 g_object_ref(securityOrigin); 266 priv->origin = securityOrigin;
|
/external/webkit/Source/WebCore/storage/ |
H A D | DatabaseTracker.cpp | 141 SecurityOrigin* origin = context->securityOrigin(); 229 SecurityOrigin* origin = database->securityOrigin(); 248 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin()); 523 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 526 m_openDatabaseMap->set(database->securityOrigin()->threadsafeCopy(), nameMap); 540 if (!originQuotaManager().tracksOrigin(database->securityOrigin())) { 541 originQuotaManager().trackOrigin(database->securityOrigin()); 542 originQuotaManager().addDatabase(database->securityOrigin(), database->stringIdentifier(), database->fileName()); 547 doneCreatingDatabase(database->securityOrigin(), database->stringIdentifier()); 564 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); [all...] |
H A D | Database.cpp | 94 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data()); 106 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize); 110 InspectorInstrumentation::didOpenDatabase(context, database, context->securityOrigin()->host(), name, expectedVersion); 409 SecurityOrigin* Database::securityOrigin() const function in class:WebCore::Database
|
/external/webkit/Source/WebCore/page/ |
H A D | DOMWindow.cpp | 638 if (!document->securityOrigin()->canAccessLocalStorage()) { 647 RefPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin()); 663 if (!document->securityOrigin()->canAccessLocalStorage()) { 675 RefPtr<StorageArea> storageArea = page->group().localStorage()->storageArea(document->securityOrigin()); 753 if (!AsyncFileSystem::isAvailable() || !document->securityOrigin()->canAccessFileSystem()) { 773 SecurityOrigin* securityOrigin = document->securityOrigin(); 775 if (!AsyncFileSystem::isAvailable() || !securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { 830 String sourceOrigin = sourceDocument->securityOrigin() [all...] |
H A D | EventSource.cpp | 69 , m_origin(context->securityOrigin()->toString()) 87 if (!context->securityOrigin()->canRequest(fullURL)) {
|
H A D | Location.cpp | 257 if (!activeWindow->securityOrigin()->canAccess(targetWindow->securityOrigin())) {
|
/external/webkit/Source/WebKit/android/WebCoreSupport/ |
H A D | GeolocationPermissions.cpp | 76 String originString = frame->document()->securityOrigin()->toString(); 133 String originString = frame->document()->securityOrigin()->toString(); 269 if (origin == frame->document()->securityOrigin()->toString()) {
|
/external/webkit/Source/WebCore/bindings/js/ |
H A D | JSDocumentCustom.cpp | 93 frame->navigationScheduler()->scheduleLocationChange(lexicalFrame->document()->securityOrigin(),
|
/external/webkit/Source/WebCore/dom/ |
H A D | ScriptExecutionContext.cpp | 305 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 307 m_securityOrigin = securityOrigin; 313 if (securityOrigin()->canRequest(targetURL)) 384 KURL publicURL = BlobURL::createPublicURL(securityOrigin());
|
H A D | ScriptExecutionContext.h | 92 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::ScriptExecutionContext
|
H A D | DOMImplementation.cpp | 253 doc->setSecurityOrigin(m_ownerDocument->securityOrigin()); 318 d->setSecurityOrigin(m_ownerDocument->securityOrigin());
|
H A D | Document.cpp | 1924 ScriptExecutionContext::setSecurityOrigin(ownerDocument->securityOrigin()); 2671 frame->navigationScheduler()->scheduleLocationChange(securityOrigin(), blankURL(), String()); 3690 if (!securityOrigin()->canAccessCookies()) { 3711 if (!securityOrigin()->canAccessCookies()) { 3732 return securityOrigin()->domain(); 3737 if (SecurityOrigin::isDomainRelaxationForbiddenForURLScheme(securityOrigin()->protocol())) { 3748 // securityOrigin()->setDomainForDOM. This will change the 3754 securityOrigin()->setDomainFromDOM(newDomain); 3783 securityOrigin()->setDomainFromDOM(newDomain); 4483 if (securityOrigin() [all...] |
/external/webkit/Source/WebCore/fileapi/ |
H A D | DOMFileSystemBase.h | 75 SecurityOrigin* securityOrigin() const;
|
H A D | FileReaderLoader.cpp | 77 m_urlForReading = BlobURL::createPublicURL(scriptExecutionContext->securityOrigin());
|
H A D | DOMFileSystemBase.cpp | 101 SecurityOrigin* DOMFileSystemBase::securityOrigin() const function in class:WebCore::DOMFileSystemBase 103 return m_context->securityOrigin();
|
/external/webkit/Source/WebCore/html/ |
H A D | HTMLCanvasElement.h | 117 const SecurityOrigin& securityOrigin() const;
|
H A D | HTMLAppletElement.cpp | 168 if (document()->securityOrigin()->isSandboxed(SandboxPlugins))
|
/external/webkit/Source/WebCore/inspector/ |
H A D | InspectorPageAgent.cpp | 105 FrameLoadRequest request(mainFrame->document()->securityOrigin(), ResourceRequest(), "_blank"); 116 newFrame->loader()->changeLocation(mainFrame->document()->securityOrigin(), newFrame->loader()->completeURL(url), "", false, false);
|
/external/webkit/Source/WebCore/loader/ |
H A D | MainResourceLoader.cpp | 183 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(newRequest.url()); local 184 if (!securityOrigin->canRequest(redirectResponse.url())) 213 frameLoader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), newRequest.url());
|
/external/webkit/Source/WebCore/css/ |
H A D | CSSImportRule.cpp | 81 if (!parent || !parent->document() || !parent->document()->securityOrigin()->canRequest(baseURL))
|
/external/webkit/Source/WebCore/loader/cache/ |
H A D | CachedResourceLoader.cpp | 231 if (!m_document->securityOrigin()->canRequest(url)) { 253 f->loader()->checkIfRunInsecureContent(m_document->securityOrigin(), url); 261 top->loader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), url); 321 if (!document()->securityOrigin()->canDisplay(url)) {
|
/external/webkit/Source/WebCore/xml/ |
H A D | XSLTProcessorQt.cpp | 109 if (!m_document->frame() || !m_document->securityOrigin()->canRequest(url))
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
H A D | ChromeClientQt.cpp | 534 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin())) 535 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota); 554 QWebSecurityOrigin* securityOrigin = new QWebSecurityOrigin(priv); local 559 emit m_webPage->applicationCacheQuotaExceeded(securityOrigin, defaultOriginQuota);
|
/external/webkit/Source/WebKit/mac/Plugins/ |
H A D | WebPluginContainerCheck.mm | 102 if (!coreFrame->document()->securityOrigin()->canDisplay([_request URL])) {
|
/external/webkit/Source/WebKit/wx/WebKitSupport/ |
H A D | ChromeClientWx.cpp | 430 if (!DatabaseTracker::tracker().hasEntryForOrigin(document->securityOrigin())) 431 DatabaseTracker::tracker().setQuota(document->securityOrigin(), quota);
|