HomeSort by relevance Sort by last modified time
    Searched refs:SecurityOrigin (Results 151 - 175 of 198) sorted by null

1 2 3 4 5 67 8

  /external/webkit/Source/WebKit/wx/WebKitSupport/
FrameLoaderClientWx.h 172 virtual void didRunInsecureContent(SecurityOrigin*, const KURL&);
ChromeClientWx.cpp 43 #include "SecurityOrigin.h"
430 if (!DatabaseTracker::tracker().hasEntryForOrigin(document->securityOrigin()))
431 DatabaseTracker::tracker().setQuota(document->securityOrigin(), quota);
441 void ChromeClientWx::reachedApplicationCacheOriginQuota(SecurityOrigin*)
  /external/webkit/Source/WebKit2/WebProcess/WebCoreSupport/
WebChromeClient.h 143 virtual void reachedApplicationCacheOriginQuota(WebCore::SecurityOrigin*);
WebFrameLoaderClient.h 141 virtual void didRunInsecureContent(WebCore::SecurityOrigin*, const WebCore::KURL&);
  /external/webkit/Source/WebCore/page/
DOMWindow.cpp 84 #include "SecurityOrigin.h"
123 PostMessageTimer(DOMWindow* window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtr<DOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels, SecurityOrigin* targetOrigin)
138 SecurityOrigin* targetOrigin() const { return m_targetOrigin.get(); }
151 RefPtr<SecurityOrigin> m_targetOrigin;
638 if (!document->securityOrigin()->canAccessLocalStorage()) {
647 RefPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin());
663 if (!document->securityOrigin()->canAccessLocalStorage()) {
675 RefPtr<StorageArea> storageArea = page->group().localStorage()->storageArea(document->securityOrigin());
753 if (!AsyncFileSystem::isAvailable() || !document->securityOrigin()->canAccessFileSystem()) {
773 SecurityOrigin* securityOrigin = document->securityOrigin()
    [all...]
PageGroup.cpp 37 #include "SecurityOrigin.h"
134 void PageGroup::clearLocalStorageForOrigin(SecurityOrigin* origin)
  /external/webkit/Source/WebKit2/WebProcess/
WebProcess.cpp 66 #include <WebCore/SecurityOrigin.h>
251 SecurityOrigin::setDomainRelaxationForbiddenForURLScheme(true, urlScheme);
  /external/webkit/Source/WebCore/fileapi/
DOMFileSystemBase.cpp 101 SecurityOrigin* DOMFileSystemBase::securityOrigin() const
103 return m_context->securityOrigin();
  /external/webkit/Source/WebCore/storage/
AbstractDatabase.cpp 38 #include "SecurityOrigin.h"
186 m_contextThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin();
193 m_guid = guidForOriginAndName(securityOrigin()->toString(), name);
206 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name);
332 SecurityOrigin* AbstractDatabase::securityOrigin() const
Database.cpp 50 #include "SecurityOrigin.h"
94 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data());
106 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize);
110 InspectorInstrumentation::didOpenDatabase(context, database, context->securityOrigin()->host(), name, expectedVersion);
409 SecurityOrigin* Database::securityOrigin() const
  /external/webkit/Source/WebKit/mac/WebCoreSupport/
WebFrameLoaderClient.h 161 virtual void didRunInsecureContent(WebCore::SecurityOrigin*, const WebCore::KURL&);
  /external/webkit/Source/WebCore/plugins/
PluginView.cpp 64 #include "SecurityOrigin.h"
275 FrameLoadRequest frameLoadRequest(m_parentFrame->document()->securityOrigin());
279 if (!SecurityOrigin::shouldHideReferrer(
569 } else if (!m_parentFrame->document()->securityOrigin()->canDisplay(url))
591 FrameLoadRequest frameLoadRequest(m_parentFrame->document()->securityOrigin());
597 if (!SecurityOrigin::shouldHideReferrer(
607 FrameLoadRequest frameLoadRequest(m_parentFrame->document()->securityOrigin());
613 if (!SecurityOrigin::shouldHideReferrer(
    [all...]
  /external/webkit/Source/WebCore/dom/
ScriptExecutionContext.cpp 44 #include "SecurityOrigin.h"
305 void ScriptExecutionContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin)
307 m_securityOrigin = securityOrigin;
313 if (securityOrigin()->canRequest(targetURL))
384 KURL publicURL = BlobURL::createPublicURL(securityOrigin());
Document.h 115 class SecurityOrigin;
    [all...]
  /external/webkit/Source/WebCore/html/
HTMLCanvasElement.cpp 426 const SecurityOrigin& HTMLCanvasElement::securityOrigin() const
428 return *document()->securityOrigin();
  /external/webkit/Source/WebCore/loader/
SubframeLoader.cpp 114 if (m_frame->document()->securityOrigin()->isSandboxed(SandboxPlugins))
159 if (!m_frame->document()->securityOrigin()->canDisplay(completedURL)) {
173 m_frame->loader()->checkIfRunInsecureContent(m_frame->document()->securityOrigin(), completedURL);
206 if (!element->document()->securityOrigin()->canDisplay(codeBaseURL)) {
230 frame->navigationScheduler()->scheduleLocationChange(m_frame->document()->securityOrigin(), url.string(), m_frame->loader()->outgoingReferrer(), lockHistory, lockBackForwardList);
248 if (!ownerElement->document()->securityOrigin()->canDisplay(url)) {
253 bool hideReferrer = SecurityOrigin::shouldHideReferrer(url, referrer);
337 if (!document()->securityOrigin()->canDisplay(url)) {
343 frameLoader->checkIfRunInsecureContent(document()->securityOrigin(), url);
  /external/webkit/Source/WebCore/workers/
WorkerContext.cpp 53 #include "SecurityOrigin.h"
115 setSecurityOrigin(SecurityOrigin::create(url));
295 if (!securityOrigin()->canAccessDatabase() || !AbstractDatabase::isAvailable()) {
308 DatabaseTracker::tracker().setQuota(securityOrigin(), defaultQuota);
314 if (!securityOrigin()->canAccessDatabase() || !AbstractDatabase::isAvailable()) {
355 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem()) {
372 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem()) {
391 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem() || !securityOrigin()->canRequest(completedURL)) {
410 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem() || !securityOrigin()->canRequest(completedURL))
    [all...]
  /external/webkit/Source/WebKit/wince/WebCoreSupport/
FrameLoaderClientWinCE.cpp 284 void FrameLoaderClientWinCE::didRunInsecureContent(SecurityOrigin*, const KURL&)
  /external/webkit/Source/WebKit/win/WebCoreSupport/
WebChromeClient.cpp 55 #include <WebCore/SecurityOrigin.h>
586 COMPtr<WebSecurityOrigin> origin(AdoptCOM, WebSecurityOrigin::createInstance(frame->document()->securityOrigin()));
628 void WebChromeClient::reachedApplicationCacheOriginQuota(SecurityOrigin*)
  /external/webkit/Source/WebKit/chromium/src/
WebViewImpl.cpp 90 #include "SecurityOrigin.h"
271 SecurityOrigin::setLocalLoadPolicy(SecurityOrigin::AllowLocalLoadsForLocalOnly);
    [all...]
ChromeClientImpl.cpp 62 #include "SecurityOrigin.h"
649 void ChromeClientImpl::reachedApplicationCacheOriginQuota(SecurityOrigin*)
  /external/webkit/Source/WebCore/bindings/v8/
V8DOMWindowShell.cpp 501 // Ask the document's SecurityOrigin to generate a security token.
505 SecurityOrigin* origin = document->securityOrigin();
508 token = document->securityOrigin()->toString();
  /external/webkit/Source/WebKit/efl/WebCoreSupport/
FrameLoaderClientEfl.cpp 492 void FrameLoaderClientEfl::didRunInsecureContent(SecurityOrigin*, const KURL&)
  /external/webkit/Source/WebKit/gtk/WebCoreSupport/
ChromeClientGtk.cpp 48 #include "SecurityOrigin.h"
590 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), defaultQuota);
606 void ChromeClient::reachedApplicationCacheOriginQuota(SecurityOrigin*)
  /external/webkit/Source/WebKit/qt/WebCoreSupport/
ChromeClientQt.cpp 61 #include "SecurityOrigin.h"
534 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin()))
535 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota);
548 void ChromeClientQt::reachedApplicationCacheOriginQuota(SecurityOrigin* origin)
554 QWebSecurityOrigin* securityOrigin = new QWebSecurityOrigin(priv);
559 emit m_webPage->applicationCacheQuotaExceeded(securityOrigin, defaultOriginQuota);

Completed in 801 milliseconds

1 2 3 4 5 67 8