HomeSort by relevance Sort by last modified time
    Searched refs:SecurityOrigin (Results 76 - 100 of 198) sorted by null

1 2 34 5 6 7 8

  /external/webkit/Source/WebCore/storage/
IDBFactoryBackendImpl.h 58 virtual void open(const String& name, PassRefPtr<IDBCallbacks>, PassRefPtr<SecurityOrigin>, Frame*, const String& dataDir, int64_t maximumSize, BackingStoreType);
StorageNamespaceImpl.cpp 109 PassRefPtr<StorageArea> StorageNamespaceImpl::storageArea(PassRefPtr<SecurityOrigin> prpOrigin)
114 RefPtr<SecurityOrigin> origin = prpOrigin;
171 void StorageNamespaceImpl::clearOriginForDeletion(SecurityOrigin* origin)
IDBFactoryBackendImpl.cpp 38 #include "SecurityOrigin.h"
73 void IDBFactoryBackendImpl::open(const String& name, PassRefPtr<IDBCallbacks> callbacks, PassRefPtr<SecurityOrigin> securityOrigin, Frame*, const String& dataDir, int64_t maximumSize, BackingStoreType backingStoreType)
75 String fileIdentifier = securityOrigin->databaseIdentifier();
91 backingStore = IDBSQLiteBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this);
94 backingStore = IDBLevelDBBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentifier, this);
StorageEventDispatcher.cpp 36 #include "SecurityOrigin.h"
41 void StorageEventDispatcher::dispatch(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* sourceFrame)
57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
73 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
  /external/webkit/Source/WebCore/workers/
AbstractWorker.cpp 43 #include "SecurityOrigin.h"
82 if (!scriptExecutionContext()->securityOrigin()->canAccess(SecurityOrigin::create(scriptURL).get())) {
DefaultSharedWorkerRepository.cpp 46 #include "SecurityOrigin.h"
63 static PassRefPtr<SharedWorkerProxy> create(const String& name, const KURL& url, PassRefPtr<SecurityOrigin> origin) { return adoptRef(new SharedWorkerProxy(name, url, origin)); }
75 bool matches(const String& name, PassRefPtr<SecurityOrigin> origin, const KURL& urlToMatch) const;
96 SharedWorkerProxy(const String& name, const KURL&, PassRefPtr<SecurityOrigin>);
104 RefPtr<SecurityOrigin> m_origin;
110 SharedWorkerProxy::SharedWorkerProxy(const String& name, const KURL& url, PassRefPtr<SecurityOrigin> origin)
116 // We should be the sole owner of the SecurityOrigin, as we will free it on another thread.
120 bool SharedWorkerProxy::matches(const String& name, PassRefPtr<SecurityOrigin> origin, const KURL& urlToMatch) const
375 ASSERT(worker->scriptExecutionContext()->securityOrigin()->canAccess(SecurityOrigin::create(url).get()))
    [all...]
  /external/webkit/Source/WebKit/mac/Storage/
WebStorageManager.mm 33 #import <WebCore/SecurityOrigin.h>
53 Vector<RefPtr<SecurityOrigin> > coreOrigins;
WebDatabaseManager.mm 38 #import <WebCore/SecurityOrigin.h>
64 Vector<RefPtr<SecurityOrigin> > coreOrigins;
  /external/webkit/Source/WebKit/qt/Api/
qwebsecurityorigin.h 29 class SecurityOrigin;
  /external/webkit/Source/WebCore/fileapi/
DOMFileSystemBase.h 53 class SecurityOrigin;
75 SecurityOrigin* securityOrigin() const;
  /external/webkit/Source/WebCore/loader/appcache/
ApplicationCache.h 45 class SecurityOrigin;
53 static void deleteCacheForOrigin(SecurityOrigin*);
ApplicationCacheGroup.h 49 class SecurityOrigin;
71 const SecurityOrigin* origin() const { return m_origin.get(); }
139 RefPtr<SecurityOrigin> m_origin;
  /external/webkit/Source/WebCore/loader/
NavigationScheduler.cpp 97 ScheduledURLNavigation(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool duringLoad, bool isLocationChange)
99 , m_securityOrigin(securityOrigin)
127 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
132 RefPtr<SecurityOrigin> m_securityOrigin;
140 ScheduledRedirect(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, bool lockHistory, bool lockBackForwardList)
141 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockHistory, lockBackForwardList, false, false)
151 ScheduledLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForward (…)
    [all...]
FrameLoader.h 79 class SecurityOrigin;
221 void changeLocation(PassRefPtr<SecurityOrigin>, const KURL&, const String& referrer, bool lockHistory = true, bool lockBackForwardList = true, bool refresh = false);
258 static bool isMixedContent(SecurityOrigin* context, const KURL&);
259 void checkIfDisplayInsecureContent(SecurityOrigin* context, const KURL&);
260 void checkIfRunInsecureContent(SecurityOrigin* context, const KURL&);
  /external/webkit/Source/WebCore/storage/chromium/
DatabaseTrackerChromium.cpp 41 #include "SecurityOrigin.h"
64 void DatabaseTracker::setDatabaseDetails(SecurityOrigin*, const String&, const String&, unsigned long)
69 String DatabaseTracker::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool)
81 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin());
84 m_openDatabaseMap->set(database->securityOrigin(), nameMap);
129 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin());
140 m_openDatabaseMap->remove(database->securityOrigin());
149 void DatabaseTracker::getOpenDatabases(SecurityOrigin* origin, const String& name, HashSet<RefPtr<AbstractDatabase> >* databases)
172 database->securityOrigin()->databaseIdentifier(),
186 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin());
    [all...]
  /external/webkit/Source/WebCore/page/
PageGroup.h 42 class SecurityOrigin;
58 static void clearLocalStorageForOrigin(SecurityOrigin*);
SpeechInput.cpp 36 #include "SecurityOrigin.h"
96 bool SpeechInput::startRecognition(int listenerId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin)
ContentSecurityPolicy.cpp 31 #include "SecurityOrigin.h"
159 explicit CSPSourceList(SecurityOrigin*);
174 SecurityOrigin* m_origin;
178 CSPSourceList::CSPSourceList(SecurityOrigin* origin)
398 CSPDirective(const String& value, SecurityOrigin* origin)
462 ContentSecurityPolicy::ContentSecurityPolicy(SecurityOrigin* origin)
  /external/webkit/Source/WebKit/win/
WebSecurityOrigin.cpp 43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin)
45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin);
50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin)
52 , m_securityOrigin(securityOrigin)
  /external/webkit/Source/WebKit/chromium/src/
SpeechInputClientImpl.cpp 35 #include "SecurityOrigin.h"
67 bool SpeechInputClientImpl::startRecognition(int requestId, const WebCore::IntRect& elementRect, const AtomicString& language, const String& grammar, WebCore::SecurityOrigin* origin)
StorageEventDispatcherImpl.cpp 42 #include "SecurityOrigin.h"
54 const String& newValue, SecurityOrigin* securityOrigin,
69 if (frame->document()->securityOrigin()->equal(securityOrigin))
  /external/webkit/Source/WebKit/win/WebCoreSupport/
WebGeolocationClient.cpp 37 #include <WebCore/SecurityOrigin.h>
97 COMPtr<WebSecurityOrigin> origin(AdoptCOM, WebSecurityOrigin::createInstance(frame->document()->securityOrigin()));
WebDesktopNotificationsDelegate.cpp 168 void WebDesktopNotificationsDelegate::requestPermission(SecurityOrigin* origin, PassRefPtr<VoidCallback> callback)
178 BString org(SecurityOrigin::create(url)->toString());
  /external/webkit/Source/WebCore/bindings/js/
JSDOMWindowBase.h 40 class SecurityOrigin;
  /external/webkit/Source/WebCore/platform/mock/
SpeechInputClientMock.cpp 36 #include "SecurityOrigin.h"
54 bool SpeechInputClientMock::startRecognition(int requestId, const IntRect& elementRect, const AtomicString& language, const String& grammar, SecurityOrigin* origin)

Completed in 1068 milliseconds

1 2 34 5 6 7 8