HomeSort by relevance Sort by last modified time
    Searched full:securityorigin (Results 76 - 100 of 186) sorted by null

1 2 34 5 6 7 8

  /external/webkit/WebKit/chromium/src/
NotificationPresenterImpl.h 58 virtual void requestPermission(WebCore::SecurityOrigin* origin, WTF::PassRefPtr<WebCore::VoidCallback> callback);
WebWorkerBase.cpp 90 RefPtr<SecurityOrigin> origin =
91 SecurityOrigin::create(KURL(ParsedURLString, "http://localhost"));
  /external/webkit/WebKit/gtk/webkit/
webkitwebdatabase.cpp 258 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin)
261 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin));
268 g_object_ref(securityOrigin);
269 priv->origin = securityOrigin;
  /external/webkit/WebKit/win/WebCoreSupport/
WebDesktopNotificationsDelegate.h 52 virtual void requestPermission(WebCore::SecurityOrigin* origin, PassRefPtr<WebCore::VoidCallback> callback);
WebDesktopNotificationsDelegate.cpp 168 void WebDesktopNotificationsDelegate::requestPermission(SecurityOrigin* origin, PassRefPtr<VoidCallback> callback)
178 BString org(SecurityOrigin::create(url)->toString());
  /external/webkit/WebCore/bindings/generic/
BindingDOMWindow.h 38 #include "SecurityOrigin.h"
74 if (callingDocument->securityOrigin()->isSandboxed(SandboxNavigation))
  /external/webkit/WebCore/css/
CSSImportRule.cpp 28 #include "SecurityOrigin.h"
81 if (!parent || !parent->doc() || !parent->doc()->securityOrigin()->canRequest(baseURL))
CSSStyleSheet.cpp 31 #include "SecurityOrigin.h"
125 if (doc() && !doc()->securityOrigin()->canRequest(baseURL()))
  /external/webkit/WebCore/html/
HTMLAppletElement.cpp 31 #include "SecurityOrigin.h"
156 if (document()->securityOrigin()->isSandboxed(SandboxPlugins))
  /external/webkit/WebCore/storage/
Database.cpp 139 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data());
152 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize);
159 page->inspectorController()->didOpenDatabase(database.get(), context->securityOrigin()->host(), name, expectedVersion);
180 m_mainThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin();
187 m_guid = guidForOriginAndName(securityOrigin()->toString(), name);
202 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name);
731 SecurityOrigin* Database::securityOrigin() const
StorageAreaImpl.cpp 47 PassRefPtr<StorageAreaImpl> StorageAreaImpl::create(StorageType storageType, PassRefPtr<SecurityOrigin> origin, PassRefPtr<StorageSyncManager> syncManager, unsigned quota)
52 StorageAreaImpl::StorageAreaImpl(StorageType storageType, PassRefPtr<SecurityOrigin> origin, PassRefPtr<StorageSyncManager> syncManager, unsigned quota)
  /external/webkit/WebKit/mac/Plugins/
WebPluginContainerCheck.mm 43 #import <WebCore/SecurityOrigin.h>
102 if (!SecurityOrigin::canLoad([_request URL], String(), coreFrame->document())) {
  /external/webkit/WebCore/loader/
FrameLoader.cpp 95 #include "SecurityOrigin.h"
171 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin());
407 if (!SecurityOrigin::canLoad(url, referrer, 0)) {
412 bool hideReferrer = SecurityOrigin::shouldHideReferrer(url, referrer);
562 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url());
713 begin(m_URL, true, m_frame->document()->securityOrigin());
821 void FrameLoader::begin(const KURL& url, bool dispatch, SecurityOrigin* origin)
825 RefPtr<SecurityOrigin> forcedSecurityOrigin = origin;
837 bool resetScripting = !(m_isDisplayingInitialEmptyDocument && m_frame->document()->securityOrigin()->isSecureTransitionTo(url))
    [all...]
FrameLoader.h 77 class SecurityOrigin;
238 void begin(const KURL&, bool dispatchWindowObjectAvailable = true, SecurityOrigin* forcedSecurityOrigin = 0);
265 static bool isMixedContent(SecurityOrigin* context, const KURL&);
266 void checkIfDisplayInsecureContent(SecurityOrigin* context, const KURL&);
267 void checkIfRunInsecureContent(SecurityOrigin* context, const KURL&);
DocLoader.cpp 45 #include "SecurityOrigin.h"
199 if (!m_doc->securityOrigin()->canRequest(url)) {
227 f->loader()->checkIfRunInsecureContent(m_doc->securityOrigin(), url);
235 top->loader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), url);
  /external/webkit/WebKit/qt/WebCoreSupport/
ChromeClientQt.cpp 44 #include "SecurityOrigin.h"
419 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin()))
420 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota);
  /external/webkit/WebCore/bindings/js/
JSDOMWindowBase.h 40 class SecurityOrigin;
  /external/webkit/WebCore/workers/
WorkerScriptLoader.cpp 37 #include "SecurityOrigin.h"
  /external/webkit/WebCore/page/
EventSource.cpp 70 if (!scriptExecutionContext()->securityOrigin()->canRequest(m_url)) {
75 m_origin = scriptExecutionContext()->securityOrigin()->toString();
  /external/webkit/WebKit/mac/Plugins/Hosted/
HostedNetscapePluginStream.mm 42 #import <WebCore/SecurityOrigin.h>
62 if (SecurityOrigin::shouldHideReferrer([request URL], core([instance->pluginView() webFrame])->loader()->outgoingReferrer()))
  /external/webkit/WebKit/wx/WebKitSupport/
ChromeClientWx.cpp 411 if (!DatabaseTracker::tracker().hasEntryForOrigin(document->securityOrigin()))
412 DatabaseTracker::tracker().setQuota(document->securityOrigin(), quota);
  /frameworks/base/core/java/android/webkit/
GeolocationPermissions.java 38 * WebCore::SecurityOrigin::toString.
201 * WebCore::SecurityOrigin::toString(). As long as all 'HTML 5 modules'
  /external/webkit/WebCore/platform/graphics/gtk/
MediaPlayerPrivateGStreamer.cpp 43 #include "SecurityOrigin.h"
850 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(currentUrl);
851 if (securityOrigin->canRequest(newUrl)) {
    [all...]
  /external/webkit/WebCore/xml/
XMLHttpRequest.cpp 39 #include "SecurityOrigin.h"
467 m_sameOriginRequest = scriptExecutionContext()->securityOrigin()->canRequest(m_url);
675 if (!scriptExecutionContext()->securityOrigin()->canLoadLocalResources() && !isSafeRequestHeader(name)) {
718 if (isSetCookieHeader(it->first) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources())
743 if (isSetCookieHeader(name) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources()) {
  /external/webkit/WebCore/dom/
Document.cpp 115 #include "SecurityOrigin.h"
    [all...]

Completed in 1684 milliseconds

1 2 34 5 6 7 8