/external/webkit/WebKit/chromium/src/ |
NotificationPresenterImpl.h | 58 virtual void requestPermission(WebCore::SecurityOrigin* origin, WTF::PassRefPtr<WebCore::VoidCallback> callback);
|
WebWorkerBase.cpp | 90 RefPtr<SecurityOrigin> origin = 91 SecurityOrigin::create(KURL(ParsedURLString, "http://localhost"));
|
/external/webkit/WebKit/gtk/webkit/ |
webkitwebdatabase.cpp | 258 static void webkit_web_database_set_security_origin(WebKitWebDatabase *webDatabase, WebKitSecurityOrigin *securityOrigin) 261 g_return_if_fail(WEBKIT_IS_SECURITY_ORIGIN(securityOrigin)); 268 g_object_ref(securityOrigin); 269 priv->origin = securityOrigin;
|
/external/webkit/WebKit/win/WebCoreSupport/ |
WebDesktopNotificationsDelegate.h | 52 virtual void requestPermission(WebCore::SecurityOrigin* origin, PassRefPtr<WebCore::VoidCallback> callback);
|
WebDesktopNotificationsDelegate.cpp | 168 void WebDesktopNotificationsDelegate::requestPermission(SecurityOrigin* origin, PassRefPtr<VoidCallback> callback) 178 BString org(SecurityOrigin::create(url)->toString());
|
/external/webkit/WebCore/bindings/generic/ |
BindingDOMWindow.h | 38 #include "SecurityOrigin.h" 74 if (callingDocument->securityOrigin()->isSandboxed(SandboxNavigation))
|
/external/webkit/WebCore/css/ |
CSSImportRule.cpp | 28 #include "SecurityOrigin.h" 81 if (!parent || !parent->doc() || !parent->doc()->securityOrigin()->canRequest(baseURL))
|
CSSStyleSheet.cpp | 31 #include "SecurityOrigin.h" 125 if (doc() && !doc()->securityOrigin()->canRequest(baseURL()))
|
/external/webkit/WebCore/html/ |
HTMLAppletElement.cpp | 31 #include "SecurityOrigin.h" 156 if (document()->securityOrigin()->isSandboxed(SandboxPlugins))
|
/external/webkit/WebCore/storage/ |
Database.cpp | 139 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data()); 152 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize); 159 page->inspectorController()->didOpenDatabase(database.get(), context->securityOrigin()->host(), name, expectedVersion); 180 m_mainThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin(); 187 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 202 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name); 731 SecurityOrigin* Database::securityOrigin() const
|
StorageAreaImpl.cpp | 47 PassRefPtr<StorageAreaImpl> StorageAreaImpl::create(StorageType storageType, PassRefPtr<SecurityOrigin> origin, PassRefPtr<StorageSyncManager> syncManager, unsigned quota) 52 StorageAreaImpl::StorageAreaImpl(StorageType storageType, PassRefPtr<SecurityOrigin> origin, PassRefPtr<StorageSyncManager> syncManager, unsigned quota)
|
/external/webkit/WebKit/mac/Plugins/ |
WebPluginContainerCheck.mm | 43 #import <WebCore/SecurityOrigin.h> 102 if (!SecurityOrigin::canLoad([_request URL], String(), coreFrame->document())) {
|
/external/webkit/WebCore/loader/ |
FrameLoader.cpp | 95 #include "SecurityOrigin.h" 171 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin()); 407 if (!SecurityOrigin::canLoad(url, referrer, 0)) { 412 bool hideReferrer = SecurityOrigin::shouldHideReferrer(url, referrer); 562 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url()); 713 begin(m_URL, true, m_frame->document()->securityOrigin()); 821 void FrameLoader::begin(const KURL& url, bool dispatch, SecurityOrigin* origin) 825 RefPtr<SecurityOrigin> forcedSecurityOrigin = origin; 837 bool resetScripting = !(m_isDisplayingInitialEmptyDocument && m_frame->document()->securityOrigin()->isSecureTransitionTo(url)) [all...] |
FrameLoader.h | 77 class SecurityOrigin; 238 void begin(const KURL&, bool dispatchWindowObjectAvailable = true, SecurityOrigin* forcedSecurityOrigin = 0); 265 static bool isMixedContent(SecurityOrigin* context, const KURL&); 266 void checkIfDisplayInsecureContent(SecurityOrigin* context, const KURL&); 267 void checkIfRunInsecureContent(SecurityOrigin* context, const KURL&);
|
DocLoader.cpp | 45 #include "SecurityOrigin.h" 199 if (!m_doc->securityOrigin()->canRequest(url)) { 227 f->loader()->checkIfRunInsecureContent(m_doc->securityOrigin(), url); 235 top->loader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), url);
|
/external/webkit/WebKit/qt/WebCoreSupport/ |
ChromeClientQt.cpp | 44 #include "SecurityOrigin.h" 419 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin())) 420 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota);
|
/external/webkit/WebCore/bindings/js/ |
JSDOMWindowBase.h | 40 class SecurityOrigin;
|
/external/webkit/WebCore/workers/ |
WorkerScriptLoader.cpp | 37 #include "SecurityOrigin.h"
|
/external/webkit/WebCore/page/ |
EventSource.cpp | 70 if (!scriptExecutionContext()->securityOrigin()->canRequest(m_url)) { 75 m_origin = scriptExecutionContext()->securityOrigin()->toString();
|
/external/webkit/WebKit/mac/Plugins/Hosted/ |
HostedNetscapePluginStream.mm | 42 #import <WebCore/SecurityOrigin.h> 62 if (SecurityOrigin::shouldHideReferrer([request URL], core([instance->pluginView() webFrame])->loader()->outgoingReferrer()))
|
/external/webkit/WebKit/wx/WebKitSupport/ |
ChromeClientWx.cpp | 411 if (!DatabaseTracker::tracker().hasEntryForOrigin(document->securityOrigin())) 412 DatabaseTracker::tracker().setQuota(document->securityOrigin(), quota);
|
/frameworks/base/core/java/android/webkit/ |
GeolocationPermissions.java | 38 * WebCore::SecurityOrigin::toString. 201 * WebCore::SecurityOrigin::toString(). As long as all 'HTML 5 modules'
|
/external/webkit/WebCore/platform/graphics/gtk/ |
MediaPlayerPrivateGStreamer.cpp | 43 #include "SecurityOrigin.h" 850 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(currentUrl); 851 if (securityOrigin->canRequest(newUrl)) { [all...] |
/external/webkit/WebCore/xml/ |
XMLHttpRequest.cpp | 39 #include "SecurityOrigin.h" 467 m_sameOriginRequest = scriptExecutionContext()->securityOrigin()->canRequest(m_url); 675 if (!scriptExecutionContext()->securityOrigin()->canLoadLocalResources() && !isSafeRequestHeader(name)) { 718 if (isSetCookieHeader(it->first) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources()) 743 if (isSetCookieHeader(name) && !scriptExecutionContext()->securityOrigin()->canLoadLocalResources()) {
|
/external/webkit/WebCore/dom/ |
Document.cpp | 115 #include "SecurityOrigin.h" [all...] |