/external/webkit/Source/WebCore/storage/ |
IDBFactoryBackendImpl.h | 58 virtual void open(const String& name, PassRefPtr<IDBCallbacks>, PassRefPtr<SecurityOrigin>, Frame*, const String& dataDir, int64_t maximumSize, BackingStoreType);
|
StorageNamespaceImpl.cpp | 109 PassRefPtr<StorageArea> StorageNamespaceImpl::storageArea(PassRefPtr<SecurityOrigin> prpOrigin) 114 RefPtr<SecurityOrigin> origin = prpOrigin; 171 void StorageNamespaceImpl::clearOriginForDeletion(SecurityOrigin* origin)
|
IDBFactoryBackendImpl.cpp | 38 #include "SecurityOrigin.h" 73 void IDBFactoryBackendImpl::open(const String& name, PassRefPtr<IDBCallbacks> callbacks, PassRefPtr<SecurityOrigin> securityOrigin, Frame*, const String& dataDir, int64_t maximumSize, BackingStoreType backingStoreType) 75 String fileIdentifier = securityOrigin->databaseIdentifier(); 91 backingStore = IDBSQLiteBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this); 94 backingStore = IDBLevelDBBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this);
|
StorageEventDispatcher.cpp | 36 #include "SecurityOrigin.h" 41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame) 57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 73 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
|
/external/webkit/Source/WebCore/workers/ |
AbstractWorker.cpp | 43 #include "SecurityOrigin.h" 82 if (!scriptExecutionContext()->securityOrigin()->canAccess(SecurityOrigin::create(scriptURL).get())) {
|
DefaultSharedWorkerRepository.cpp | 46 #include "SecurityOrigin.h" 63 static PassRefPtr<SharedWorkerProxy> create(const String& name, const KURL& url, PassRefPtr<SecurityOrigin> origin) { return adoptRef(new SharedWorkerProxy(name, url, origin)); } 75 bool matches(const String& name, PassRefPtr<SecurityOrigin> origin, const KURL& urlToMatch) const; 96 SharedWorkerProxy(const String& name, const KURL&, PassRefPtr<SecurityOrigin>); 104 RefPtr<SecurityOrigin> m_origin; 110 SharedWorkerProxy::SharedWorkerProxy(const String& name, const KURL& url, PassRefPtr<SecurityOrigin> origin) 116 // We should be the sole owner of the SecurityOrigin, as we will free it on another thread. 120 bool SharedWorkerProxy::matches(const String& name, PassRefPtr<SecurityOrigin> origin, const KURL& urlToMatch) const 375 ASSERT(worker->scriptExecutionContext()->securityOrigin()->canAccess(SecurityOrigin::create(url).get())) [all...] |
/external/webkit/Source/WebKit/mac/Storage/ |
WebStorageManager.mm | 33 #import <WebCore/SecurityOrigin.h> 53 Vector<RefPtr<SecurityOrigin> > coreOrigins;
|
WebDatabaseManager.mm | 38 #import <WebCore/SecurityOrigin.h> 64 Vector<RefPtr<SecurityOrigin> > coreOrigins;
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebsecurityorigin.h | 29 class SecurityOrigin;
|
/external/webkit/Source/WebCore/fileapi/ |
DOMFileSystemBase.h | 53 class SecurityOrigin; 75 SecurityOrigin* securityOrigin() const;
|
/external/webkit/Source/WebCore/loader/appcache/ |
ApplicationCache.h | 45 class SecurityOrigin; 53 static void deleteCacheForOrigin(SecurityOrigin*);
|
ApplicationCacheGroup.h | 49 class SecurityOrigin; 71 const SecurityOrigin* origin() const { return m_origin.get(); } 139 RefPtr<SecurityOrigin> m_origin;
|
/external/webkit/Source/WebCore/loader/ |
NavigationScheduler.cpp | 97 ScheduledURLNavigation(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool duringLoad, bool isLocationChange) 99 , m_securityOrigin(securityOrigin) 127 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 132 RefPtr<SecurityOrigin> m_securityOrigin; 140 ScheduledRedirect(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, bool lockHistory, bool lockBackForwardList) 141 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockHistory, lockBackForwardList, false, false) 151 ScheduledLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForward (…) [all...] |
FrameLoader.h | 79 class SecurityOrigin; 221 void changeLocation(PassRefPtr<SecurityOrigin>, const KURL&, const String& referrer, bool lockHistory = true, bool lockBackForwardList = true, bool refresh = false); 258 static bool isMixedContent(SecurityOrigin* context, const KURL&); 259 void checkIfDisplayInsecureContent(SecurityOrigin* context, const KURL&); 260 void checkIfRunInsecureContent(SecurityOrigin* context, const KURL&);
|
/external/webkit/Source/WebCore/storage/chromium/ |
DatabaseTrackerChromium.cpp | 41 #include "SecurityOrigin.h" 64 void DatabaseTracker::setDatabaseDetails(SecurityOrigin*, const String&, const String&, unsigned long) 69 String DatabaseTracker::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool) 81 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 84 m_openDatabaseMap->set(database->securityOrigin(), nameMap); 129 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); 140 m_openDatabaseMap->remove(database->securityOrigin()); 149 void DatabaseTracker::getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases) 172 database->securityOrigin()->databaseIdentifier(), 186 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin()); [all...] |
/external/webkit/Source/WebCore/page/ |
PageGroup.h | 42 class SecurityOrigin; 58 static void clearLocalStorageForOrigin(SecurityOrigin*);
|
SpeechInput.cpp | 36 #include "SecurityOrigin.h" 96 bool SpeechInput::startRecognition(int listenerId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin)
|
ContentSecurityPolicy.cpp | 31 #include "SecurityOrigin.h" 159 explicit CSPSourceList(SecurityOrigin*); 174 SecurityOrigin* m_origin; 178 CSPSourceList::CSPSourceList(SecurityOrigin* origin) 398 CSPDirective(const String& value, SecurityOrigin* origin) 462 ContentSecurityPolicy::ContentSecurityPolicy(SecurityOrigin* origin)
|
/external/webkit/Source/WebKit/win/ |
WebSecurityOrigin.cpp | 43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) 45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); 50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) 52 , m_securityOrigin(securityOrigin)
|
/external/webkit/Source/WebKit/chromium/src/ |
SpeechInputClientImpl.cpp | 35 #include "SecurityOrigin.h" 67 bool SpeechInputClientImpl::startRecognition(int requestId, const WebCore::IntRect& elementRect, const AtomicString& language, const String& grammar, WebCore::SecurityOrigin* origin)
|
StorageEventDispatcherImpl.cpp | 42 #include "SecurityOrigin.h" 54 const String& newValue, SecurityOrigin* securityOrigin, 69 if (frame->document()->securityOrigin()->equal(securityOrigin))
|
/external/webkit/Source/WebKit/win/WebCoreSupport/ |
WebGeolocationClient.cpp | 37 #include <WebCore/SecurityOrigin.h> 97 COMPtr<WebSecurityOrigin> origin(AdoptCOM, WebSecurityOrigin::createInstance(frame->document()->securityOrigin()));
|
WebDesktopNotificationsDelegate.cpp | 168 void WebDesktopNotificationsDelegate::requestPermission(SecurityOrigin* origin, PassRefPtr<VoidCallback> callback) 178 BString org(SecurityOrigin::create(url)->toString());
|
/external/webkit/Source/WebCore/bindings/js/ |
JSDOMWindowBase.h | 40 class SecurityOrigin;
|
/external/webkit/Source/WebCore/platform/mock/ |
SpeechInputClientMock.cpp | 36 #include "SecurityOrigin.h" 54 bool SpeechInputClientMock::startRecognition(int requestId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin)
|