Searched defs:securityOrigin (Results 1 - 25 of 36) sorted by relevance

12

/external/chromium_org/third_party/WebKit/Source/web/
H A DWebGeolocationPermissionRequest.cpp39 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:blink::WebGeolocationPermissionRequest
41 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
H A DWebMIDIPermissionRequest.cpp68 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const function in class:blink::WebMIDIPermissionRequest
70 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
H A DWebStorageEventDispatcherImpl.cpp49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
H A DWebDatabase.cpp64 WebSecurityOrigin WebDatabase::securityOrigin() const function in class:blink::WebDatabase
67 return WebSecurityOrigin(m_database->securityOrigin());
H A DNotificationPresenterImpl.cpp69 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback) argument
71 , m_securityOrigin(securityOrigin)
118 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin()));
125 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClient(callback));
131 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
H A DWebUserMediaRequest.cpp93 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const function in class:blink::WebUserMediaRequest
96 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
H A DStorageAreaProxy.cpp157 SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
164 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
167 InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin);
185 SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace,
194 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
197 InspectorInstrumentation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin);
156 dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument
184 dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument
/external/chromium_org/third_party/WebKit/Source/core/dom/
H A DSecurityContext.cpp44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument
46 m_securityOrigin = securityOrigin;
64 return securityOrigin()->canAccess(other.get());
H A DSecurityContext.h42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::SecurityContext
H A DExecutionContext.cpp123 return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
229 SecurityOrigin* ExecutionContext::securityOrigin() const function in class:WebCore::ExecutionContext
232 return m_client->securityContext().securityOrigin();
331 if (isSandboxed(SandboxOrigin) && m_client->securityContext().securityOrigin() && !m_client->securityContext().securityOrigin()->isUnique()) {
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/
H A DDatabaseIdentifier.cpp90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) argument
97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles())
102 return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DMixedContentChecker.cpp52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument
54 if (securityOrigin->protocol() != "https")
61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument
63 if (!isMixedContent(securityOrigin, url))
67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
76 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument
78 if (!isMixedContent(securityOrigin, url))
82 bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url);
86 client()->didRunInsecureContent(securityOrigin, url);
H A DDocumentThreadableLoader.cpp74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
104 updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials);
112 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields()))
135 ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin());
203 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription));
217 m_options.securityOrigin = SecurityOrigin::createUnique();
275 if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) {
293 CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest->url(), preflightResult.release());
296 if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) {
374 actualRequest->setHTTPOrigin(securityOrigin()
475 SecurityOrigin* DocumentThreadableLoader::securityOrigin() const function in class:WebCore::DocumentThreadableLoader
[all...]
/external/chromium_org/third_party/WebKit/Source/modules/quota/
H A DStorageQuota.cpp64 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); local
65 if (securityOrigin->isUnique()) {
70 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
/external/chromium_org/third_party/WebKit/Source/platform/blob/
H A DBlobURL.cpp43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument
45 ASSERT(securityOrigin);
46 return createBlobURL(securityOrigin->toString());
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
H A DDatabaseContext.cpp201 SecurityOrigin* DatabaseContext::securityOrigin() const function in class:WebCore::DatabaseContext
203 return executionContext()->securityOrigin();
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/
H A DV8XMLHttpRequestCustom.cpp59 RefPtr<SecurityOrigin> securityOrigin; local
62 securityOrigin = world->isolatedWorldSecurityOrigin();
65 RefPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
/external/chromium_org/third_party/WebKit/Source/core/fetch/
H A DCrossOriginAccessControl.cpp99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument
104 if (securityOrigin)
105 request.setHTTPOrigin(securityOrigin->toString());
108 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument
111 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
141 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument
152 if (accessControlOriginString != securityOrigin->toString()) {
154 errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
156 errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
158 errorDescription = "The 'Access-Control-Allow-Origin' header contains multiple values '" + accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin
[all...]
H A DResourceLoaderOptions.h152 RefPtr<SecurityOrigin> securityOrigin; member in struct:WebCore::ResourceLoaderOptions
/external/chromium_org/third_party/WebKit/Source/core/html/
H A DHTMLImportsController.cpp87 request.setCrossOriginAccessControl(securityOrigin(), DoNotAllowStoredCredentials);
116 SecurityOrigin* HTMLImportsController::securityOrigin() const function in class:WebCore::HTMLImportsController
118 return m_master->securityOrigin();
/external/chromium_org/third_party/WebKit/Source/core/inspector/
H A DPageRuntimeAgent.cpp180 void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState, SecurityOrigin* securityOrigin, bool isPageContext) argument
182 ASSERT(securityOrigin || isPageContext);
184 String name = securityOrigin ? securityOrigin->toRawString() : "";
H A DInspectorDOMStorageAgent.cpp177 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); local
179 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString();
182 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) argument
185 .setSecurityOrigin(securityOrigin->toRawString())
189 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) argument
194 RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage);
208 String securityOrigin; local
210 bool success = storageId->getString("securityOrigin", &securityOrigin);
[all...]
/external/chromium_org/third_party/WebKit/Source/bindings/v8/
H A DDOMWrapperWorld.cpp188 void DOMWrapperWorld::setIsolatedWorldSecurityOrigin(int worldID, PassRefPtr<SecurityOrigin> securityOrigin) argument
191 if (securityOrigin)
192 isolatedWorldSecurityOrigins().set(worldID, securityOrigin);
/external/chromium_org/third_party/WebKit/Source/core/timing/
H A DPerformance.cpp167 if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin()))
177 const String& securityOrigin = requestingDocument->securityOrigin()->toString(); local
181 if (timingAllowOrigins[i] == securityOrigin)
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
H A DDOMFileSystemBase.cpp79 SecurityOrigin* DOMFileSystemBase::securityOrigin() const function in class:WebCore::DOMFileSystemBase
81 return m_context->securityOrigin();
140 result.append(securityOrigin()->toString());

Completed in 645 milliseconds

12