Home | History | Annotate | Download | only in page

Lines Matching refs:SecurityOrigin

41 class SecurityOrigin : public ThreadSafeRefCounted<SecurityOrigin> {
43 static PassRefPtr<SecurityOrigin> createFromDatabaseIdentifier(const String&);
44 static PassRefPtr<SecurityOrigin> createFromString(const String&);
45 static PassRefPtr<SecurityOrigin> create(const String& protocol, const String& host, int port);
46 static PassRefPtr<SecurityOrigin> create(const KURL&, SandboxFlags = SandboxNone);
47 static PassRefPtr<SecurityOrigin> createEmpty();
49 // Create a deep copy of this SecurityOrigin. This method is useful
50 // when marshalling a SecurityOrigin to another thread.
51 PassRefPtr<SecurityOrigin> threadsafeCopy();
67 // Returns true if this SecurityOrigin can script objects in the given
68 // SecurityOrigin. For example, call this function before allowing
70 // another SecurityOrigin.
71 bool canAccess(const SecurityOrigin*) const;
73 // Returns true if this SecurityOrigin can read content retrieved from
83 // Returns true if this SecurityOrigin can receive drag content from the
86 bool canReceiveDragData(const SecurityOrigin* dragInitiator) const;
93 // Returns true if this SecurityOrigin can load local resources, such
98 // Note: A SecurityOrigin might be allowed to load local resources
100 // To determine whether the SecurityOrigin can issue an
105 // SecurityOrigin.
111 // Explicitly grant the ability to access very other SecurityOrigin.
131 // The local SecurityOrigin is the most privileged SecurityOrigin.
132 // The local SecurityOrigin can script any document, navigate to local
144 // The empty SecurityOrigin is a unique security orign (in the sense of
154 // Convert this SecurityOrigin into a string. The string
155 // representation of a SecurityOrigin is similar to a URL, except it
157 // the value of the SecurityOrigin's domain property.
160 // "null". This happens when this SecurityOrigin is unique. For example,
161 // this SecurityOrigin might have come from a sandboxed iframe, the
162 // SecurityOrigin might be empty, or we might have explicitly decided that
175 bool equal(const SecurityOrigin*) const;
179 bool isSameSchemeHostPort(const SecurityOrigin*) const;
192 static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains);
193 static void removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomains, bool allowDestinationSubdomains);
197 SecurityOrigin(const KURL&, SandboxFlags);
198 explicit SecurityOrigin(const SecurityOrigin*);
201 bool passesFileCheck(const SecurityOrigin*) const;
203 bool isAccessWhiteListed(const SecurityOrigin*) const;