Home | History | Annotate | Download | only in page

Lines Matching defs:SecurityOrigin

30 #include "SecurityOrigin.h"
40 static SecurityOrigin::LocalLoadPolicy localLoadPolicy = SecurityOrigin::AllowLocalLoadsForLocalOnly;
80 SecurityOrigin::SecurityOrigin(const KURL& url, SandboxFlags sandboxFlags)
108 SecurityOrigin::SecurityOrigin(const SecurityOrigin* other)
121 bool SecurityOrigin::isEmpty() const
126 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const KURL& url, SandboxFlags sandboxFlags)
129 return adoptRef(new SecurityOrigin(KURL(), sandboxFlags));
130 return adoptRef(new SecurityOrigin(url, sandboxFlags));
133 PassRefPtr<SecurityOrigin> SecurityOrigin::createEmpty()
138 PassRefPtr<SecurityOrigin> SecurityOrigin::threadsafeCopy()
140 return adoptRef(new SecurityOrigin(this));
143 void SecurityOrigin::setDomainFromDOM(const String& newDomain)
155 void SecurityOrigin::setDomainRelaxationForbiddenForURLScheme(bool forbidden, const String& scheme)
166 bool SecurityOrigin::isDomainRelaxationForbiddenForURLScheme(const String& scheme)
174 bool SecurityOrigin::canAccess(const SecurityOrigin* other) const
215 bool SecurityOrigin::canRequest(const KURL& url) const
223 RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);
242 bool SecurityOrigin::taintsCanvas(const KURL& url) const
259 bool SecurityOrigin::canLoad(const KURL& url, const String& referrer, Document* document)
267 return document->securityOrigin()->canLoadLocalResources();
273 void SecurityOrigin::grantLoadLocalResources()
277 // in a SecurityOrigin is a security hazard because the documents without
284 void SecurityOrigin::grantUniversalAccess()
289 bool SecurityOrigin::isLocal() const
294 bool SecurityOrigin::isSecureTransitionTo(const KURL& url) const
300 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url);
304 String SecurityOrigin::toString() const
329 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromString(const String& originString)
331 return SecurityOrigin::create(KURL(KURL(), originString));
336 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromDatabaseIdentifier(const String& databaseIdentifier)
369 String SecurityOrigin::databaseIdentifier() const
375 bool SecurityOrigin::equal(const SecurityOrigin* other) const
392 bool SecurityOrigin::isSameSchemeHostPort(const SecurityOrigin* other) const
406 void SecurityOrigin::registerURLSchemeAsLocal(const String& scheme)
411 void SecurityOrigin::removeURLSchemeRegisteredAsLocal(const String& scheme)
422 const URLSchemesMap& SecurityOrigin::localURLSchemes()
427 bool SecurityOrigin::shouldTreatURLAsLocal(const String& url)
447 bool SecurityOrigin::shouldTreatURLSchemeAsLocal(const String& scheme)
465 void SecurityOrigin::registerURLSchemeAsNoAccess(const String& scheme)
470 bool SecurityOrigin::shouldTreatURLSchemeAsNoAccess(const String& scheme)
475 bool SecurityOrigin::shouldHideReferrer(const KURL& url, const String& referrer)
491 void SecurityOrigin::setLocalLoadPolicy(LocalLoadPolicy policy)
496 bool SecurityOrigin::restrictAccessToLocal()
498 return localLoadPolicy != SecurityOrigin::AllowLocalLoadsForAll;
501 bool SecurityOrigin::allowSubstituteDataAccessToLocal()
503 return localLoadPolicy != SecurityOrigin::AllowLocalLoadsForLocalOnly;
506 void SecurityOrigin::whiteListAccessFromOrigin(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains)
522 void SecurityOrigin::resetOriginAccessWhiteLists()