/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | WebGeolocationPermissionRequest.cpp | 39 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:blink::WebGeolocationPermissionRequest 41 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
H A D | WebMIDIPermissionRequest.cpp | 68 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const function in class:blink::WebMIDIPermissionRequest 70 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
H A D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
H A D | WebDatabase.cpp | 64 WebSecurityOrigin WebDatabase::securityOrigin() const function in class:blink::WebDatabase 67 return WebSecurityOrigin(m_database->securityOrigin());
|
H A D | NotificationPresenterImpl.cpp | 69 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback) argument 71 , m_securityOrigin(securityOrigin) 118 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); 125 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClient(callback)); 131 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
|
H A D | WebUserMediaRequest.cpp | 93 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const function in class:blink::WebUserMediaRequest 96 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
H A D | StorageAreaProxy.cpp | 157 SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) 164 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance)) 167 InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); 185 SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, 194 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance)) 197 InspectorInstrumentation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); 156 dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument 184 dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) argument
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 46 m_securityOrigin = securityOrigin; 64 return securityOrigin()->canAccess(other.get());
|
H A D | SecurityContext.h | 42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } function in class:WebCore::SecurityContext
|
H A D | ExecutionContext.cpp | 123 return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); 229 SecurityOrigin* ExecutionContext::securityOrigin() const function in class:WebCore::ExecutionContext 232 return m_client->securityContext().securityOrigin(); 331 if (isSandboxed(SandboxOrigin) && m_client->securityContext().securityOrigin() && !m_client->securityContext().securityOrigin()->isUnique()) {
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | DatabaseIdentifier.cpp | 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) argument 97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) 102 return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | MixedContentChecker.cpp | 52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument 54 if (securityOrigin->protocol() != "https") 61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 63 if (!isMixedContent(securityOrigin, url)) 67 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 76 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 78 if (!isMixedContent(securityOrigin, url)) 82 bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); 86 client()->didRunInsecureContent(securityOrigin, url);
|
H A D | DocumentThreadableLoader.cpp | 74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) 104 updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials); 112 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) 135 ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin()); 203 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)); 217 m_options.securityOrigin = SecurityOrigin::createUnique(); 275 if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) { 293 CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest->url(), preflightResult.release()); 296 if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) { 374 actualRequest->setHTTPOrigin(securityOrigin() 475 SecurityOrigin* DocumentThreadableLoader::securityOrigin() const function in class:WebCore::DocumentThreadableLoader [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
H A D | StorageQuota.cpp | 64 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); local 65 if (securityOrigin->isUnique()) { 70 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
H A D | BlobURL.cpp | 43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument 45 ASSERT(securityOrigin); 46 return createBlobURL(securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
H A D | DatabaseContext.cpp | 201 SecurityOrigin* DatabaseContext::securityOrigin() const function in class:WebCore::DatabaseContext 203 return executionContext()->securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/ |
H A D | V8XMLHttpRequestCustom.cpp | 59 RefPtr<SecurityOrigin> securityOrigin; local 62 securityOrigin = world->isolatedWorldSecurityOrigin(); 65 RefPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
H A D | CrossOriginAccessControl.cpp | 99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument 104 if (securityOrigin) 105 request.setHTTPOrigin(securityOrigin->toString()); 108 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument 111 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 141 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument 152 if (accessControlOriginString != securityOrigin->toString()) { 154 errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 156 errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 158 errorDescription = "The 'Access-Control-Allow-Origin' header contains multiple values '" + accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin [all...] |
H A D | ResourceLoaderOptions.h | 152 RefPtr<SecurityOrigin> securityOrigin; member in struct:WebCore::ResourceLoaderOptions
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | HTMLImportsController.cpp | 87 request.setCrossOriginAccessControl(securityOrigin(), DoNotAllowStoredCredentials); 116 SecurityOrigin* HTMLImportsController::securityOrigin() const function in class:WebCore::HTMLImportsController 118 return m_master->securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
H A D | PageRuntimeAgent.cpp | 180 void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState, SecurityOrigin* securityOrigin, bool isPageContext) argument 182 ASSERT(securityOrigin || isPageContext); 184 String name = securityOrigin ? securityOrigin->toRawString() : "";
|
H A D | InspectorDOMStorageAgent.cpp | 177 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); local 179 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); 182 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) argument 185 .setSecurityOrigin(securityOrigin->toRawString()) 189 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) argument 194 RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage); 208 String securityOrigin; local 210 bool success = storageId->getString("securityOrigin", &securityOrigin); [all...] |
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
H A D | DOMWrapperWorld.cpp | 188 void DOMWrapperWorld::setIsolatedWorldSecurityOrigin(int worldID, PassRefPtr<SecurityOrigin> securityOrigin) argument 191 if (securityOrigin) 192 isolatedWorldSecurityOrigins().set(worldID, securityOrigin);
|
/external/chromium_org/third_party/WebKit/Source/core/timing/ |
H A D | Performance.cpp | 167 if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin())) 177 const String& securityOrigin = requestingDocument->securityOrigin()->toString(); local 181 if (timingAllowOrigins[i] == securityOrigin)
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
H A D | DOMFileSystemBase.cpp | 79 SecurityOrigin* DOMFileSystemBase::securityOrigin() const function in class:WebCore::DOMFileSystemBase 81 return m_context->securityOrigin(); 140 result.append(securityOrigin()->toString());
|