Searched refs:securityOrigin (Results 1 - 25 of 163) sorted by relevance

1234567

/external/chromium_org/third_party/WebKit/Source/web/
H A DMediaKeysClientImpl.cpp24 WebSecurityOrigin securityOrigin(executionContext->securityOrigin());
25 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
H A DWebGeolocationPermissionRequest.cpp47 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:blink::WebGeolocationPermissionRequest
49 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
H A DWebMIDIPermissionRequest.cpp50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const function in class:blink::WebMIDIPermissionRequest
52 return WebSecurityOrigin(m_initializer->securityOrigin());
H A DWebStorageEventDispatcherImpl.cpp49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); local
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); local
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
H A DWebMediaDevicesRequest.cpp52 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const function in class:blink::WebMediaDevicesRequest
55 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
/external/chromium_org/third_party/WebKit/Source/core/dom/
H A DSecurityContext.cpp44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument
46 m_securityOrigin = securityOrigin;
64 return securityOrigin()->canAccess(other.get());
/external/chromium_org/third_party/WebKit/Source/platform/blob/
H A DBlobURL.cpp43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument
45 ASSERT(securityOrigin);
46 return createBlobURL(securityOrigin->toString());
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
H A DIndexedDBModel.js160 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
161 this._removeOrigin(securityOrigin);
169 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
170 this._loadDatabaseNames(securityOrigin);
188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback);
196 var securityOrigin = /** @type {string} */ (event.data);
197 this._addOrigin(securityOrigin);
205 var securityOrigin = /** @type {string} */ (event.data);
206 this._removeOrigin(securityOrigin);
210 * @param {string} securityOrigin
[all...]
H A DDOMStorage.js34 * @param {string} securityOrigin
37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage)
40 this._securityOrigin = securityOrigin;
45 * @param {string} securityOrigin
49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage)
51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
70 get securityOrigin()
139 var securityOrigin = /** @type {string} */ (event.data);
140 var localStorageKey = this._storageKey(securityOrigin, tru
[all...]
H A DFileSystemModel.js53 for (var securityOrigin in this._fileSystemsForOrigin)
54 this._removeOrigin(securityOrigin);
65 var securityOrigin = /** @type {string} */ (event.data);
66 this._addOrigin(securityOrigin);
74 var securityOrigin = /** @type {string} */ (event.data);
75 this._removeOrigin(securityOrigin);
79 * @param {string} securityOrigin
81 _addOrigin: function(securityOrigin)
83 this._fileSystemsForOrigin[securityOrigin] = {};
87 this._requestFileSystemRoot(securityOrigin, type
[all...]
/external/chromium_org/third_party/WebKit/Source/core/fetch/
H A DCrossOriginAccessControl.cpp64 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument
69 if (securityOrigin)
70 request.setHTTPOrigin(securityOrigin->toAtomicString());
73 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument
76 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
115 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument
121 errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
132 errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
135 } else if (accessControlOriginString != securityOrigin->toAtomicString()) {
137 errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin
201 handleRedirect(Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage) argument
[all...]
H A DResourceLoaderOptions.h132 // securityOrigin has more complicated checks which callers are responsible for.
146 RefPtr<SecurityOrigin> securityOrigin; member in struct:blink::ResourceLoaderOptions
161 , securityOrigin(options.securityOrigin) { }
175 options.securityOrigin = securityOrigin;
188 RefPtr<SecurityOrigin> securityOrigin; member in struct:blink::CrossThreadResourceLoaderOptionsData
/external/chromium_org/third_party/WebKit/Source/core/loader/
H A DMixedContentChecker.cpp62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument
64 if (securityOrigin->protocol() != "https")
240 if (!isMixedContent(frame->document()->securityOrigin(), url))
245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin(); local
254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url);
262 client->didRunInsecureContent(securityOrigin, url);
278 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument
288 if (top != m_frame && !toLocalFrame(top)->loader().mixedContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->securityOrigin(), ur
309 canRunInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument
341 canFrameInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument
353 canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const argument
360 canSubmitToInsecureForm(SecurityOrigin* securityOrigin, const KURL& url) const argument
[all...]
H A DMixedContentChecker.h53 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument
55 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display);
58 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument
60 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution);
H A DMixedContentCheckerTest.cpp40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl));
42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/
H A DDatabaseIdentifier.cpp90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) argument
97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles())
102 return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
/external/chromium_org/third_party/WebKit/Source/core/css/
H A DCSSFontFaceSrcValue.cpp101 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) argument
105 return !securityOrigin->canRequest(resource);
112 SecurityOrigin* securityOrigin = document->securityOrigin(); local
113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) {
114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
/external/chromium_org/third_party/WebKit/Source/core/workers/
H A DAbstractWorker.cpp61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) {
62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
/external/chromium_org/chrome/renderer/
H A Dworker_permission_client_proxy.cc20 if (frame->document().securityOrigin().isUnique() ||
21 frame->top()->document().securityOrigin().isUnique())
24 document_origin_url_ = GURL(frame->document().securityOrigin().toString());
26 frame->top()->document().securityOrigin().toString());
/external/chromium_org/third_party/WebKit/Source/modules/quota/
H A DDeprecatedStorageQuota.cpp65 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); local
66 if (securityOrigin->isUnique()) {
71 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
H A DStorageQuota.cpp90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); local
91 if (securityOrigin->isUnique()) {
96 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
/external/chromium_org/third_party/WebKit/public/web/
H A DWebGeolocationPermissionRequest.h45 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
H A DDOMWindowFileSystem.cpp60 if (!document->securityOrigin()->canAccessFileSystem()) {
83 SecurityOrigin* securityOrigin = document->securityOrigin();
85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
/external/chromium_org/android_webview/renderer/
H A Daw_render_frame_ext.cc26 blink::WebSecurityOrigin origin = frame->document().securityOrigin();
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
H A DInspectorIndexedDBAgent.h57 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtrWillBeRawPtr<RequestDatabaseNamesCallback>) OVERRIDE;
58 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtrWillBeRawPtr<RequestDatabaseCallback>) OVERRIDE;
59 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtrWillBeRawPtr<RequestDataCallback>) OVERRIDE;

Completed in 377 milliseconds

1234567