Home | History | Annotate | Download | only in page

Lines Matching defs:SecurityOrigin

48 class SecurityOrigin : public ThreadSafeShared<SecurityOrigin> {
50 static PassRefPtr<SecurityOrigin> createFromDatabaseIdentifier(const String&);
51 static PassRefPtr<SecurityOrigin> createFromString(const String&);
52 static PassRefPtr<SecurityOrigin> create(const KURL&, SandboxFlags = SandboxNone);
53 static PassRefPtr<SecurityOrigin> createEmpty();
55 // Create a deep copy of this SecurityOrigin. This method is useful
56 // when marshalling a SecurityOrigin to another thread.
57 PassRefPtr<SecurityOrigin> threadsafeCopy();
73 // Returns true if this SecurityOrigin can script objects in the given
74 // SecurityOrigin. For example, call this function before allowing
76 // another SecurityOrigin.
77 bool canAccess(const SecurityOrigin*) const;
79 // Returns true if this SecurityOrigin can read content retrieved from
94 // Returns true if this SecurityOrigin can load local resources, such
99 // Note: A SecurityOrigin might be allowed to load local resources
101 // To determine whether the SecurityOrigin can issue an
106 // SecurityOrigin.
112 // Explicitly grant the ability to access very other SecurityOrigin.
125 // The local SecurityOrigin is the most privileged SecurityOrigin.
126 // The local SecurityOrigin can script any document, navigate to local
130 // The empty SecurityOrigin is the least privileged SecurityOrigin.
141 // Convert this SecurityOrigin into a string. The string
142 // representation of a SecurityOrigin is similar to a URL, except it
144 // the value of the SecurityOrigin's domain property.
147 // "null". This happens when this SecurityOrigin is unique. For example,
148 // this SecurityOrigin might have come from a sandboxed iframe, the
149 // SecurityOrigin might be empty, or we might have explicitly decided that
162 bool equal(const SecurityOrigin*) const;
166 bool isSameSchemeHostPort(const SecurityOrigin*) const;
188 static void whiteListAccessFromOrigin(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains);
192 SecurityOrigin(const KURL&, SandboxFlags);
193 explicit SecurityOrigin(const SecurityOrigin*);