/external/chromium_org/third_party/WebKit/Source/core/workers/ |
H A D | AbstractWorker.cpp | 62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'."); 67 exceptionState.throwSecurityError("Access to the script at '" + scriptURL.elidedString() + "' is denied by the document's Content Security Policy.");
|
H A D | SharedWorker.cpp | 76 exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->securityOrigin()->toString() + "'.");
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/ |
H A D | ExceptionStatePlaceholder.cpp | 53 void NoExceptionStateAssertionChecker::throwSecurityError(const String&, const String&) function in class:blink::NoExceptionStateAssertionChecker
|
H A D | ExceptionStatePlaceholder.h | 51 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE { } 64 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE;
|
H A D | ExceptionState.cpp | 59 // SecurityError is thrown via ::throwSecurityError, and _careful_ consideration must be given to the data exposed to JavaScript via the 'sanitizedMessage'. 68 void ExceptionState::throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage) function in class:blink::ExceptionState 127 void NonThrowableExceptionState::throwSecurityError(const String& sanitizedMessage, const String&) function in class:blink::NonThrowableExceptionState 153 void TrackExceptionState::throwSecurityError(const String& sanitizedMessage, const String&) function in class:blink::TrackExceptionState
|
H A D | ExceptionState.h | 81 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()); 134 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE; 144 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE;
|
H A D | BindingSecurity.cpp | 65 exceptionState.throwSecurityError(targetDocument->domWindow()->sanitizedCrossDomainAccessErrorMessage(callingWindow), targetDocument->domWindow()->crossDomainAccessErrorMessage(callingWindow));
|
H A D | V8Initializer.cpp | 168 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAccessErrorMessage(callingDOMWindow(isolate)), targetWindow->crossDomainAccessErrorMessage(callingDOMWindow(isolate)));
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
H A D | StorageArea.cpp | 73 exceptionState.throwSecurityError("access is denied for this document."); 82 exceptionState.throwSecurityError("access is denied for this document."); 91 exceptionState.throwSecurityError("access is denied for this document."); 100 exceptionState.throwSecurityError("access is denied for this document."); 112 exceptionState.throwSecurityError("access is denied for this document."); 121 exceptionState.throwSecurityError("access is denied for this document."); 130 exceptionState.throwSecurityError("access is denied for this document.");
|
/external/chromium_org/third_party/WebKit/Source/modules/navigatorcontentutils/ |
H A D | NavigatorContentUtils.cpp | 97 exceptionState.throwSecurityError("Can only register custom handler in the document's origin."); 120 exceptionState.throwSecurityError("The scheme '" + scheme + "' is not valid protocol"); 129 exceptionState.throwSecurityError("The scheme '" + scheme + "' is less than five characters long."); 136 exceptionState.throwSecurityError("The scheme '" + scheme + "' doesn't belong to the scheme whitelist. Please prefix non-whitelisted schemes with the string 'web+'.");
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
H A D | DOMWindowWebDatabase.cpp | 58 exceptionState.throwSecurityError("Access to the WebDatabase API is denied in this context.");
|
H A D | DatabaseManager.cpp | 145 exceptionState.throwSecurityError(errorMessage);
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
H A D | IDBFactory.cpp | 79 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context."); 115 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context."); 149 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context.");
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
H A D | WorkerGlobalScopeFileSystem.cpp | 69 exceptionState.throwSecurityError(FileError::securityErrorMessage); 109 exceptionState.throwSecurityError(FileError::securityErrorMessage);
|
/external/chromium_org/third_party/WebKit/Source/core/fileapi/ |
H A D | FileError.cpp | 131 // SecurityError is special-cased, as we want to route those exceptions through ExceptionState::throwSecurityError. 133 exceptionState.throwSecurityError(FileError::securityErrorMessage);
|
/external/chromium_org/third_party/WebKit/Source/core/frame/ |
H A D | History.cpp | 138 exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'.");
|
H A D | LocalDOMWindow.cpp | 733 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); 735 exceptionState.throwSecurityError("Storage is disabled inside 'data:' URLs."); 737 exceptionState.throwSecurityError(accessDeniedMessage); 743 exceptionState.throwSecurityError(accessDeniedMessage); 755 exceptionState.throwSecurityError(accessDeniedMessage); 775 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); 777 exceptionState.throwSecurityError("Storage is disabled inside 'data:' URLs."); 779 exceptionState.throwSecurityError(accessDeniedMessage); 785 exceptionState.throwSecurityError(accessDeniedMessage); 798 exceptionState.throwSecurityError(accessDeniedMessag [all...] |
/external/chromium_org/third_party/WebKit/Source/core/imagebitmap/ |
H A D | ImageBitmapFactories.cpp | 104 exceptionState.throwSecurityError("The source image contains image data from multiple origins."); 108 exceptionState.throwSecurityError("Cross-origin access to the source image is denied."); 139 exceptionState.throwSecurityError("The source video contains image data from multiple origins."); 144 exceptionState.throwSecurityError("Cross-origin access to the source video is denied."); 172 exceptionState.throwSecurityError("The canvas element provided is tainted with cross-origin data.");
|
/external/chromium_org/third_party/WebKit/Source/modules/beacon/ |
H A D | NavigatorBeacon.cpp | 57 exceptionState.throwSecurityError("Refused to send beacon to '" + url.elidedString() + "' because it violates the document's Content Security Policy.");
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
H A D | DOMWebSocket.cpp | 303 exceptionState.throwSecurityError("The port " + String::number(m_url.port()) + " is not allowed."); 316 exceptionState.throwSecurityError("Refused to connect to '" + m_url.elidedString() + "' because it violates the document's Content Security Policy."); 346 exceptionState.throwSecurityError("An insecure WebSocket connection may not be initiated from a page loaded over HTTPS.");
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
H A D | EventSource.cpp | 96 exceptionState.throwSecurityError("Refused to connect to '" + fullURL.elidedString() + "' because it violates the document's Content Security Policy.");
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
H A D | Document.cpp | 3996 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); 3998 exceptionState.throwSecurityError("Cookies are disabled inside 'data:' URLs."); 4000 exceptionState.throwSecurityError("Access is denied for this document."); 4022 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag."); 4024 exceptionState.throwSecurityError("Cookies are disabled inside 'data:' URLs."); 4026 exceptionState.throwSecurityError("Access is denied for this document."); 4052 exceptionState.throwSecurityError("Assignment is forbidden for sandboxed iframes."); 4057 exceptionState.throwSecurityError("Assignment is forbidden for the '" + securityOrigin()->protocol() + "' scheme."); 4062 exceptionState.throwSecurityError("'" + newDomain + "' is an empty domain."); 4070 exceptionState.throwSecurityError("'" [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
H A D | HTMLCanvasElement.cpp | 434 exceptionState.throwSecurityError("Tainted canvases may not be exported.");
|
/external/chromium_org/third_party/WebKit/Source/core/xml/ |
H A D | XMLHttpRequest.cpp | 565 exceptionState.throwSecurityError("'" + method + "' HTTP method is unsupported."); 571 exceptionState.throwSecurityError("Refused to connect to '" + url.elidedString() + "' because it violates the document's Content Security Policy.");
|
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/ |
H A D | WebGLRenderingContextBase.cpp | 5290 exceptionState.throwSecurityError("The cross-origin image at " + url.elidedString() + " may not be loaded."); 5303 exceptionState.throwSecurityError("Tainted canvases may not be loaded."); 5317 exceptionState.throwSecurityError("The video element contains cross-origin data, and may not be loaded.");
|