/external/chromium_org/third_party/WebKit/Source/web/ |
H A D | MediaKeysClientImpl.cpp | 24 WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); 25 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
|
H A D | WebGeolocationPermissionRequest.cpp | 47 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const function in class:blink::WebGeolocationPermissionRequest 49 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
H A D | WebMIDIPermissionRequest.cpp | 50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const function in class:blink::WebMIDIPermissionRequest 52 return WebSecurityOrigin(m_initializer->securityOrigin());
|
H A D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); local 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); local 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
H A D | WebMediaDevicesRequest.cpp | 52 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const function in class:blink::WebMediaDevicesRequest 55 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 46 m_securityOrigin = securityOrigin; 64 return securityOrigin()->canAccess(other.get());
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
H A D | BlobURL.cpp | 43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument 45 ASSERT(securityOrigin); 46 return createBlobURL(securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
H A D | IndexedDBModel.js | 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 161 this._removeOrigin(securityOrigin); 169 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 170 this._loadDatabaseNames(securityOrigin); 188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback); 196 var securityOrigin = /** @type {string} */ (event.data); 197 this._addOrigin(securityOrigin); 205 var securityOrigin = /** @type {string} */ (event.data); 206 this._removeOrigin(securityOrigin); 210 * @param {string} securityOrigin [all...] |
H A D | DOMStorage.js | 34 * @param {string} securityOrigin 37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage) 40 this._securityOrigin = securityOrigin; 45 * @param {string} securityOrigin 49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) 51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 70 get securityOrigin() 139 var securityOrigin = /** @type {string} */ (event.data); 140 var localStorageKey = this._storageKey(securityOrigin, tru [all...] |
H A D | FileSystemModel.js | 53 for (var securityOrigin in this._fileSystemsForOrigin) 54 this._removeOrigin(securityOrigin); 65 var securityOrigin = /** @type {string} */ (event.data); 66 this._addOrigin(securityOrigin); 74 var securityOrigin = /** @type {string} */ (event.data); 75 this._removeOrigin(securityOrigin); 79 * @param {string} securityOrigin 81 _addOrigin: function(securityOrigin) 83 this._fileSystemsForOrigin[securityOrigin] = {}; 87 this._requestFileSystemRoot(securityOrigin, type [all...] |
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
H A D | CrossOriginAccessControl.cpp | 64 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument 69 if (securityOrigin) 70 request.setHTTPOrigin(securityOrigin->toAtomicString()); 73 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument 76 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 115 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument 121 errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 132 errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; 135 } else if (accessControlOriginString != securityOrigin->toAtomicString()) { 137 errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin 201 handleRedirect(Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage) argument [all...] |
H A D | ResourceLoaderOptions.h | 132 // securityOrigin has more complicated checks which callers are responsible for. 146 RefPtr<SecurityOrigin> securityOrigin; member in struct:blink::ResourceLoaderOptions 161 , securityOrigin(options.securityOrigin) { } 175 options.securityOrigin = securityOrigin; 188 RefPtr<SecurityOrigin> securityOrigin; member in struct:blink::CrossThreadResourceLoaderOptionsData
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
H A D | MixedContentChecker.cpp | 62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) argument 64 if (securityOrigin->protocol() != "https") 240 if (!isMixedContent(frame->document()->securityOrigin(), url)) 245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin(); local 254 allowed = client->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 260 allowed = client->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); 262 client->didRunInsecureContent(securityOrigin, url); 278 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument 288 if (top != m_frame && !toLocalFrame(top)->loader().mixedContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->securityOrigin(), ur 309 canRunInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const argument 341 canFrameInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 353 canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const argument 360 canSubmitToInsecureForm(SecurityOrigin* securityOrigin, const KURL& url) const argument [all...] |
H A D | MixedContentChecker.h | 53 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 55 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); 58 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const argument 60 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution);
|
H A D | MixedContentCheckerTest.cpp | 40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl)); 42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
H A D | DatabaseIdentifier.cpp | 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) argument 97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) 102 return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
H A D | CSSFontFaceSrcValue.cpp | 101 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) argument 105 return !securityOrigin->canRequest(resource); 112 SecurityOrigin* securityOrigin = document->securityOrigin(); local 113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { 114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
|
/external/chromium_org/third_party/WebKit/Source/core/workers/ |
H A D | AbstractWorker.cpp | 61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) { 62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
|
/external/chromium_org/chrome/renderer/ |
H A D | worker_permission_client_proxy.cc | 20 if (frame->document().securityOrigin().isUnique() || 21 frame->top()->document().securityOrigin().isUnique()) 24 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); 26 frame->top()->document().securityOrigin().toString());
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
H A D | DeprecatedStorageQuota.cpp | 65 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); local 66 if (securityOrigin->isUnique()) { 71 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
H A D | StorageQuota.cpp | 90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); local 91 if (securityOrigin->isUnique()) { 96 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/public/web/ |
H A D | WebGeolocationPermissionRequest.h | 45 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
H A D | DOMWindowFileSystem.cpp | 60 if (!document->securityOrigin()->canAccessFileSystem()) { 83 SecurityOrigin* securityOrigin = document->securityOrigin(); 85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
|
/external/chromium_org/android_webview/renderer/ |
H A D | aw_render_frame_ext.cc | 26 blink::WebSecurityOrigin origin = frame->document().securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
H A D | InspectorIndexedDBAgent.h | 57 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtrWillBeRawPtr<RequestDatabaseNamesCallback>) OVERRIDE; 58 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtrWillBeRawPtr<RequestDatabaseCallback>) OVERRIDE; 59 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtrWillBeRawPtr<RequestDataCallback>) OVERRIDE;
|