/external/webkit/WebKit/win/WebCoreSupport/ |
WebFrameLoaderClient.h | 102 virtual void didRunInsecureContent(WebCore::SecurityOrigin*);
|
/external/webkit/WebKit/wx/WebKitSupport/ |
FrameLoaderClientWx.h | 162 virtual void didRunInsecureContent(SecurityOrigin*);
|
FrameLoaderClientWx.cpp | 581 void FrameLoaderClientWx::didRunInsecureContent(WebCore::SecurityOrigin*)
|
/external/webkit/WebCore/loader/ |
FrameLoader.cpp | 95 #include "SecurityOrigin.h" 171 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin()); 407 if (!SecurityOrigin::canLoad(url, referrer, 0)) { 412 bool hideReferrer = SecurityOrigin::shouldHideReferrer(url, referrer); 562 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url()); 713 begin(m_URL, true, m_frame->document()->securityOrigin()); 821 void FrameLoader::begin(const KURL& url, bool dispatch, SecurityOrigin* origin) 825 RefPtr<SecurityOrigin> forcedSecurityOrigin = origin; 837 bool resetScripting = !(m_isDisplayingInitialEmptyDocument && m_frame->document()->securityOrigin()->isSecureTransitionTo(url)) [all...] |
Cache.cpp | 38 #include "SecurityOrigin.h" 109 if (SecurityOrigin::restrictAccessToLocal() && !SecurityOrigin::canLoad(url, String(), docLoader->doc())) {
|
EmptyClients.h | 302 virtual void didRunInsecureContent(SecurityOrigin*) { }
|
/external/webkit/WebKit/mac/Plugins/ |
WebBaseNetscapePluginStream.mm | 45 #import <WebCore/SecurityOrigin.h> 164 ASSERT(SecurityOrigin::canLoad([request URL], String(), core([view webFrame])->document())); 173 if (SecurityOrigin::shouldHideReferrer([request URL], core([view webFrame])->loader()->outgoingReferrer()))
|
/external/webkit/WebCore/page/ |
DOMWindow.cpp | 67 #include "SecurityOrigin.h" 85 PostMessageTimer(DOMWindow* window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels, SecurityOrigin* targetOrigin) 100 SecurityOrigin* targetOrigin() const { return m_targetOrigin.get(); } 113 RefPtr<SecurityOrigin> m_targetOrigin; 577 if (!document->securityOrigin()->canAccessStorage()) 584 RefPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin()); 602 if (!document->securityOrigin()->canAccessStorage()) 612 RefPtr<StorageArea> storageArea = page->group().localStorage()->storageArea(document->securityOrigin()); 666 RefPtr<SecurityOrigin> target; 668 target = SecurityOrigin::createFromString(targetOrigin) [all...] |
/external/webkit/WebCore/dom/ |
ScriptExecutionContext.cpp | 35 #include "SecurityOrigin.h" 243 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) 245 m_securityOrigin = securityOrigin;
|
Document.h | 101 class SecurityOrigin; [all...] |
Document.cpp | 115 #include "SecurityOrigin.h" [all...] |
/external/webkit/WebCore/workers/ |
WorkerContext.cpp | 44 #include "SecurityOrigin.h" 68 setSecurityOrigin(SecurityOrigin::create(url)); 261 if (!securityOrigin()->canAccessDatabase()) {
|
/external/webkit/WebKit/android/WebCoreSupport/ |
FrameLoaderClientAndroid.h | 138 virtual void didRunInsecureContent(SecurityOrigin*);
|
/external/webkit/WebKit/chromium/src/ |
FrameLoaderClientImpl.h | 141 virtual void didRunInsecureContent(WebCore::SecurityOrigin*);
|
WebDevToolsFrontendImpl.cpp | 51 #include "SecurityOrigin.h" 245 SecurityOrigin* origin = page->mainFrame()->domWindow()->securityOrigin();
|
WebViewImpl.cpp | 82 #include "SecurityOrigin.h" 216 SecurityOrigin::setLocalLoadPolicy(SecurityOrigin::AllowLocalLoadsForLocalOnly); [all...] |
/external/webkit/WebKit/gtk/WebCoreSupport/ |
FrameLoaderClientGtk.h | 146 virtual void didRunInsecureContent(WebCore::SecurityOrigin*);
|
/external/webkit/WebKit/mac/WebCoreSupport/ |
WebFrameLoaderClient.h | 155 virtual void didRunInsecureContent(WebCore::SecurityOrigin*);
|
/external/webkit/WebKit/qt/WebCoreSupport/ |
FrameLoaderClientQt.h | 158 virtual void didRunInsecureContent(SecurityOrigin*);
|
/external/webkit/WebCore/plugins/ |
PluginView.cpp | 56 #include "SecurityOrigin.h" 272 if (!SecurityOrigin::shouldHideReferrer( 583 } else if (!SecurityOrigin::canLoad(url, String(), m_parentFrame->document())) 611 if (!SecurityOrigin::shouldHideReferrer( 627 if (!SecurityOrigin::shouldHideReferrer( [all...] |
/external/webkit/WebCore/bindings/v8/ |
V8DOMWindowShell.cpp | 474 // Ask the document's SecurityOrigin to generate a security token. 478 SecurityOrigin* origin = document->securityOrigin(); 481 token = document->securityOrigin()->toString();
|
/external/webkit/WebCore/platform/graphics/gtk/ |
MediaPlayerPrivateGStreamer.cpp | 43 #include "SecurityOrigin.h" 850 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(currentUrl); 851 if (securityOrigin->canRequest(newUrl)) { [all...] |
/external/webkit/WebKit/mac/WebView/ |
WebView.mm | 138 #import <WebCore/SecurityOrigin.h> 673 SecurityOrigin::setLocalLoadPolicy(SecurityOrigin::AllowLocalLoadsForAll); 677 SecurityOrigin::setLocalLoadPolicy(SecurityOrigin::AllowLocalLoadsForLocalAndSubstituteData); [all...] |
/external/webkit/WebCore/storage/ |
Database.cpp | 139 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data()); 152 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize); 159 page->inspectorController()->didOpenDatabase(database.get(), context->securityOrigin()->host(), name, expectedVersion); 180 m_mainThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin(); 187 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 202 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name); 731 SecurityOrigin* Database::securityOrigin() const
|
/external/webkit/WebKit/qt/Api/ |
qwebpage.cpp | 52 #include "SecurityOrigin.h" 409 WebCore::SecurityOrigin::setLocalLoadPolicy(WebCore::SecurityOrigin::AllowLocalLoadsForLocalAndSubstituteData); [all...] |