Home | History | Annotate | Download | only in page

Lines Matching refs:SecurityOrigin

30 #include "SecurityOrigin.h"
42 static SecurityOrigin::LocalLoadPolicy localLoadPolicy = SecurityOrigin::AllowLocalLoadsForLocalOnly;
68 SecurityOrigin::SecurityOrigin(const KURL& url, SandboxFlags sandboxFlags)
132 SecurityOrigin::SecurityOrigin(const SecurityOrigin* other)
148 bool SecurityOrigin::isEmpty() const
153 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const KURL& url, SandboxFlags sandboxFlags)
156 return adoptRef(new SecurityOrigin(KURL(), sandboxFlags));
157 return adoptRef(new SecurityOrigin(url, sandboxFlags));
160 PassRefPtr<SecurityOrigin> SecurityOrigin::createEmpty()
165 PassRefPtr<SecurityOrigin> SecurityOrigin::threadsafeCopy()
167 return adoptRef(new SecurityOrigin(this));
170 void SecurityOrigin::setDomainFromDOM(const String& newDomain)
182 void SecurityOrigin::setDomainRelaxationForbiddenForURLScheme(bool forbidden, const String& scheme)
193 bool SecurityOrigin::isDomainRelaxationForbiddenForURLScheme(const String& scheme)
201 bool SecurityOrigin::canAccess(const SecurityOrigin* other) const
249 bool SecurityOrigin::passesFileCheck(const SecurityOrigin* other) const
259 bool SecurityOrigin::canRequest(const KURL& url) const
267 RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);
283 bool SecurityOrigin::taintsCanvas(const KURL& url) const
300 bool SecurityOrigin::canReceiveDragData(const SecurityOrigin* dragInitiator) const
315 bool SecurityOrigin::isAccessWhiteListed(const SecurityOrigin* targetOrigin) const
326 bool SecurityOrigin::isAccessToURLWhiteListed(const KURL& url) const
328 RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);
332 bool SecurityOrigin::canDisplay(const KURL& url) const
348 void SecurityOrigin::grantLoadLocalResources()
352 // in a SecurityOrigin is a security hazard because the documents without
359 void SecurityOrigin::grantUniversalAccess()
364 void SecurityOrigin::enforceFilePathSeparation()
370 bool SecurityOrigin::isLocal() const
375 bool SecurityOrigin::isSecureTransitionTo(const KURL& url) const
381 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url);
385 String SecurityOrigin::toString() const
413 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromString(const String& originString)
415 return SecurityOrigin::create(KURL(KURL(), originString));
420 PassRefPtr<SecurityOrigin> SecurityOrigin::createFromDatabaseIdentifier(const String& databaseIdentifier)
455 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const String& protocol, const String& host, int port)
463 String SecurityOrigin::databaseIdentifier() const
473 bool SecurityOrigin::equal(const SecurityOrigin* other) const
490 bool SecurityOrigin::isSameSchemeHostPort(const SecurityOrigin* other) const
507 bool SecurityOrigin::shouldHideReferrer(const KURL& url, const String& referrer)
523 void SecurityOrigin::setLocalLoadPolicy(LocalLoadPolicy policy)
528 bool SecurityOrigin::restrictAccessToLocal()
530 return localLoadPolicy != SecurityOrigin::AllowLocalLoadsForAll;
533 bool SecurityOrigin::allowSubstituteDataAccessToLocal()
535 return localLoadPolicy != SecurityOrigin::AllowLocalLoadsForLocalOnly;
538 void SecurityOrigin::addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains)
554 void SecurityOrigin::removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains)
581 void SecurityOrigin::resetOriginAccessWhitelists()