Searched refs:throwSecurityError (Results 1 - 25 of 26) sorted by relevance

12

/external/chromium_org/third_party/WebKit/Source/core/workers/
H A DAbstractWorker.cpp62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
67 exceptionState.throwSecurityError("Access to the script at '" + scriptURL.elidedString() + "' is denied by the document's Content Security Policy.");
H A DSharedWorker.cpp76 exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->securityOrigin()->toString() + "'.");
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/
H A DExceptionStatePlaceholder.cpp53 void NoExceptionStateAssertionChecker::throwSecurityError(const String&, const String&) function in class:blink::NoExceptionStateAssertionChecker
H A DExceptionStatePlaceholder.h51 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE { }
64 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE;
H A DExceptionState.cpp59 // SecurityError is thrown via ::throwSecurityError, and _careful_ consideration must be given to the data exposed to JavaScript via the 'sanitizedMessage'.
68 void ExceptionState::throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage) function in class:blink::ExceptionState
127 void NonThrowableExceptionState::throwSecurityError(const String& sanitizedMessage, const String&) function in class:blink::NonThrowableExceptionState
153 void TrackExceptionState::throwSecurityError(const String& sanitizedMessage, const String&) function in class:blink::TrackExceptionState
H A DExceptionState.h81 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String());
134 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE;
144 virtual void throwSecurityError(const String& sanitizedMessage, const String& unsanitizedMessage = String()) OVERRIDE;
H A DBindingSecurity.cpp65 exceptionState.throwSecurityError(targetDocument->domWindow()->sanitizedCrossDomainAccessErrorMessage(callingWindow), targetDocument->domWindow()->crossDomainAccessErrorMessage(callingWindow));
H A DV8Initializer.cpp168 exceptionState.throwSecurityError(targetWindow->sanitizedCrossDomainAccessErrorMessage(callingDOMWindow(isolate)), targetWindow->crossDomainAccessErrorMessage(callingDOMWindow(isolate)));
/external/chromium_org/third_party/WebKit/Source/core/storage/
H A DStorageArea.cpp73 exceptionState.throwSecurityError("access is denied for this document.");
82 exceptionState.throwSecurityError("access is denied for this document.");
91 exceptionState.throwSecurityError("access is denied for this document.");
100 exceptionState.throwSecurityError("access is denied for this document.");
112 exceptionState.throwSecurityError("access is denied for this document.");
121 exceptionState.throwSecurityError("access is denied for this document.");
130 exceptionState.throwSecurityError("access is denied for this document.");
/external/chromium_org/third_party/WebKit/Source/modules/navigatorcontentutils/
H A DNavigatorContentUtils.cpp97 exceptionState.throwSecurityError("Can only register custom handler in the document's origin.");
120 exceptionState.throwSecurityError("The scheme '" + scheme + "' is not valid protocol");
129 exceptionState.throwSecurityError("The scheme '" + scheme + "' is less than five characters long.");
136 exceptionState.throwSecurityError("The scheme '" + scheme + "' doesn't belong to the scheme whitelist. Please prefix non-whitelisted schemes with the string 'web+'.");
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
H A DDOMWindowWebDatabase.cpp58 exceptionState.throwSecurityError("Access to the WebDatabase API is denied in this context.");
H A DDatabaseManager.cpp145 exceptionState.throwSecurityError(errorMessage);
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
H A DIDBFactory.cpp79 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context.");
115 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context.");
149 exceptionState.throwSecurityError("access to the Indexed Database API is denied in this context.");
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
H A DWorkerGlobalScopeFileSystem.cpp69 exceptionState.throwSecurityError(FileError::securityErrorMessage);
109 exceptionState.throwSecurityError(FileError::securityErrorMessage);
/external/chromium_org/third_party/WebKit/Source/core/fileapi/
H A DFileError.cpp131 // SecurityError is special-cased, as we want to route those exceptions through ExceptionState::throwSecurityError.
133 exceptionState.throwSecurityError(FileError::securityErrorMessage);
/external/chromium_org/third_party/WebKit/Source/core/frame/
H A DHistory.cpp138 exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'.");
H A DLocalDOMWindow.cpp733 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag.");
735 exceptionState.throwSecurityError("Storage is disabled inside 'data:' URLs.");
737 exceptionState.throwSecurityError(accessDeniedMessage);
743 exceptionState.throwSecurityError(accessDeniedMessage);
755 exceptionState.throwSecurityError(accessDeniedMessage);
775 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag.");
777 exceptionState.throwSecurityError("Storage is disabled inside 'data:' URLs.");
779 exceptionState.throwSecurityError(accessDeniedMessage);
785 exceptionState.throwSecurityError(accessDeniedMessage);
798 exceptionState.throwSecurityError(accessDeniedMessag
[all...]
/external/chromium_org/third_party/WebKit/Source/core/imagebitmap/
H A DImageBitmapFactories.cpp104 exceptionState.throwSecurityError("The source image contains image data from multiple origins.");
108 exceptionState.throwSecurityError("Cross-origin access to the source image is denied.");
139 exceptionState.throwSecurityError("The source video contains image data from multiple origins.");
144 exceptionState.throwSecurityError("Cross-origin access to the source video is denied.");
172 exceptionState.throwSecurityError("The canvas element provided is tainted with cross-origin data.");
/external/chromium_org/third_party/WebKit/Source/modules/beacon/
H A DNavigatorBeacon.cpp57 exceptionState.throwSecurityError("Refused to send beacon to '" + url.elidedString() + "' because it violates the document's Content Security Policy.");
/external/chromium_org/third_party/WebKit/Source/modules/websockets/
H A DDOMWebSocket.cpp303 exceptionState.throwSecurityError("The port " + String::number(m_url.port()) + " is not allowed.");
316 exceptionState.throwSecurityError("Refused to connect to '" + m_url.elidedString() + "' because it violates the document's Content Security Policy.");
346 exceptionState.throwSecurityError("An insecure WebSocket connection may not be initiated from a page loaded over HTTPS.");
/external/chromium_org/third_party/WebKit/Source/core/page/
H A DEventSource.cpp96 exceptionState.throwSecurityError("Refused to connect to '" + fullURL.elidedString() + "' because it violates the document's Content Security Policy.");
/external/chromium_org/third_party/WebKit/Source/core/dom/
H A DDocument.cpp3996 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag.");
3998 exceptionState.throwSecurityError("Cookies are disabled inside 'data:' URLs.");
4000 exceptionState.throwSecurityError("Access is denied for this document.");
4022 exceptionState.throwSecurityError("The document is sandboxed and lacks the 'allow-same-origin' flag.");
4024 exceptionState.throwSecurityError("Cookies are disabled inside 'data:' URLs.");
4026 exceptionState.throwSecurityError("Access is denied for this document.");
4052 exceptionState.throwSecurityError("Assignment is forbidden for sandboxed iframes.");
4057 exceptionState.throwSecurityError("Assignment is forbidden for the '" + securityOrigin()->protocol() + "' scheme.");
4062 exceptionState.throwSecurityError("'" + newDomain + "' is an empty domain.");
4070 exceptionState.throwSecurityError("'"
[all...]
/external/chromium_org/third_party/WebKit/Source/core/html/
H A DHTMLCanvasElement.cpp434 exceptionState.throwSecurityError("Tainted canvases may not be exported.");
/external/chromium_org/third_party/WebKit/Source/core/xml/
H A DXMLHttpRequest.cpp565 exceptionState.throwSecurityError("'" + method + "' HTTP method is unsupported.");
571 exceptionState.throwSecurityError("Refused to connect to '" + url.elidedString() + "' because it violates the document's Content Security Policy.");
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/
H A DWebGLRenderingContextBase.cpp5290 exceptionState.throwSecurityError("The cross-origin image at " + url.elidedString() + " may not be loaded.");
5303 exceptionState.throwSecurityError("Tainted canvases may not be loaded.");
5317 exceptionState.throwSecurityError("The video element contains cross-origin data, and may not be loaded.");

Completed in 381 milliseconds

12