/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | MixedContentChecker.h | 48 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 50 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); 53 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 55 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution); 57 bool canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const argument 59 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::WebSocket);
|
H A D | MixedContentChecker.cpp | 53 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument 55 if (securityOrigin->protocol() != "https") 62 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument 64 if (!isMixedContent(securityOrigin, url)) 68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 77 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument 79 if (!isMixedContent(securityOrigin, url)) 84 bool allowed = client()->allowRunningInsecureContent(allowedPerSettings, securityOrigin, url); 88 client()->didRunInsecureContent(securityOrigin, url); 93 bool MixedContentChecker::canSubmitToInsecureForm(SecurityOrigin* securityOrigin, cons argument [all...] |
H A D | MixedContentCheckerTest.cpp | 40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl)); 42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
|
H A D | TextTrackLoader.cpp | 85 void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url) argument 87 String consoleMessage("Text track from origin '" + SecurityOrigin::create(url)->toString() + "' has been blocked from loading: Not at same origin as the document, and parent of track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."); 114 cueRequest.setCrossOriginAccessControl(m_document.securityOrigin(), crossOriginMode); 115 } else if (!m_document.securityOrigin()->canRequest(url)) { 117 corsPolicyPreventedLoad(m_document.securityOrigin(), url);
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 46 m_securityOrigin = securityOrigin; 64 return securityOrigin()->canAccess(other.get());
|
/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | MediaKeysClientImpl.cpp | 26 WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); 27 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
|
H A D | WebGeolocationPermissionRequest.cpp | 49 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:blink::WebGeolocationPermissionRequest 51 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
H A D | WebMIDIPermissionRequest.cpp | 50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const function in class:blink::WebMIDIPermissionRequest 52 return WebSecurityOrigin(m_initializer->securityOrigin());
|
H A D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); local 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
H A D | NotificationPresenterImpl.cpp | 48 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback) argument 50 , m_securityOrigin(securityOrigin) 100 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); 106 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | IndexedDBModel.js | 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 161 this._removeOrigin(securityOrigin); 169 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 170 this._loadDatabaseNames(securityOrigin); 188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback); 196 var securityOrigin = /** @type {string} */ (event.data); 197 this._addOrigin(securityOrigin); 205 var securityOrigin = /** @type {string} */ (event.data); 206 this._removeOrigin(securityOrigin); 210 * @param {string} securityOrigin [all...] |
H A D | DOMStorage.js | 34 * @param {string} securityOrigin 37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage) 40 this._securityOrigin = securityOrigin; 45 * @param {string} securityOrigin 49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) 51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 70 get securityOrigin() 139 var securityOrigin = /** @type {string} */ (event.data); 140 var localStorageKey = this._storageKey(securityOrigin, tru [all...] |
H A D | FileSystemModel.js | 53 for (var securityOrigin in this._fileSystemsForOrigin) 54 this._removeOrigin(securityOrigin); 65 var securityOrigin = /** @type {string} */ (event.data); 66 this._addOrigin(securityOrigin); 74 var securityOrigin = /** @type {string} */ (event.data); 75 this._removeOrigin(securityOrigin); 79 * @param {string} securityOrigin 81 _addOrigin: function(securityOrigin) 83 this._fileSystemsForOrigin[securityOrigin] = {}; 87 this._requestFileSystemRoot(securityOrigin, type [all...] |
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
H A D | BlobURL.cpp | 43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument 45 ASSERT(securityOrigin); 46 return createBlobURL(securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
H A D | CrossOriginAccessControl.cpp | 103 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument 108 if (securityOrigin) 109 request.setHTTPOrigin(securityOrigin->toAtomicString()); 112 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument 115 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 145 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument 151 errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 162 errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 165 } else if (accessControlOriginString != securityOrigin->toAtomicString()) { 167 errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin 228 handleRedirect(Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage) argument [all...] |
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | DatabaseIdentifier.cpp | 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) argument 97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) 102 return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
H A D | CSSFontFaceSrcValue.cpp | 91 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) argument 95 return !securityOrigin->canRequest(resource); 102 SecurityOrigin* securityOrigin = document->securityOrigin(); local 103 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { 104 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
|
/external/chromium_org/third_party/WebKit/Source/core/workers/ |
H A D | AbstractWorker.cpp | 61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) { 62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
|
/external/chromium_org/chrome/renderer/ |
H A D | worker_permission_client_proxy.cc | 20 if (frame->document().securityOrigin().isUnique() || 21 frame->top()->document().securityOrigin().isUnique()) 24 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); 26 frame->top()->document().securityOrigin().toString());
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
H A D | DeprecatedStorageQuota.cpp | 66 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); local 67 if (securityOrigin->isUnique()) { 72 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
H A D | StorageQuota.cpp | 92 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); local 93 if (securityOrigin->isUnique()) { 98 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
H A D | DOMWindowFileSystem.cpp | 60 if (!document->securityOrigin()->canAccessFileSystem()) { 83 SecurityOrigin* securityOrigin = document->securityOrigin(); 85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
|
/external/chromium_org/android_webview/renderer/ |
H A D | aw_render_frame_ext.cc | 25 blink::WebSecurityOrigin origin = frame->document().securityOrigin();
|
/external/chromium_org/third_party/WebKit/public/web/ |
H A D | WebGeolocationPermissionRequest.h | 47 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
H A D | InspectorIndexedDBAgent.h | 56 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) OVERRIDE; 57 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) OVERRIDE; 58 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>) OVERRIDE;
|