/external/webkit/Source/WebKit/chromium/src/ |
WebGeolocationPermissionRequest.cpp | 39 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const 41 return WebSecurityOrigin(m_private->frame()->document()->securityOrigin());
|
WebStorageEventDispatcherImpl.cpp | 37 #include "SecurityOrigin.h" 66 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(origin); 67 m_eventDispatcher->dispatchStorageEvent(key, oldValue, newValue, securityOrigin.get(), url, storageType);
|
WebDatabase.cpp | 37 #include "SecurityOrigin.h" 50 SecurityOrigin* securityOrigin() const { return 0; } 79 WebSecurityOrigin WebDatabase::securityOrigin() const 82 return WebSecurityOrigin(m_database->securityOrigin()); 109 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromDatabaseIdentifier(originIdentifier);
|
WebFrameImpl.cpp | 733 WebSecurityOrigin WebFrameImpl::securityOrigin() const 738 return WebSecurityOrigin(m_frame->document()->securityOrigin()); 745 m_frame->document()->securityOrigin()->grantUniversalAccess(); [all...] |
/external/webkit/Source/WebKit/win/ |
WebSecurityOrigin.h | 33 #include <WebCore/SecurityOrigin.h> 38 static WebSecurityOrigin* createInstance(WebCore::SecurityOrigin* origin); 39 static WebSecurityOrigin* createInstance(RefPtr<WebCore::SecurityOrigin> origin) { return createInstance(origin.get()); } 40 WebCore::SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 71 WebSecurityOrigin(WebCore::SecurityOrigin*); 75 RefPtr<WebCore::SecurityOrigin> m_securityOrigin;
|
/external/webkit/Source/WebKit2/Shared/API/c/ |
WKSecurityOrigin.cpp | 41 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(identifier)->string()); 42 return toAPI(securityOrigin.release().leakRef()); 47 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(protocol)->string(), toImpl(host)->string(), port); 48 return toAPI(securityOrigin.release().leakRef()); 51 WKStringRef WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin) 53 return toCopiedAPI(toImpl(securityOrigin)->protocol()); 56 WKStringRef WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin) 58 return toCopiedAPI(toImpl(securityOrigin)->host()); 61 unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin) 63 return toImpl(securityOrigin)->port() [all...] |
/external/webkit/Source/WebKit2/Shared/ |
WebSecurityOrigin.h | 30 #include <WebCore/SecurityOrigin.h> 41 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromDatabaseIdentifier(identifier); 42 if (!securityOrigin) 44 return adoptRef(new WebSecurityOrigin(securityOrigin.release())); 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(protocol, host, port); 50 if (!securityOrigin) [all...] |
/external/webkit/Source/WebKit2/UIProcess/ |
WebResourceCacheManagerProxy.cpp | 83 SecurityOriginData securityOrigin; 84 securityOrigin.protocol = origin->protocol(); 85 securityOrigin.host = origin->host(); 86 securityOrigin.port = origin->port(); 88 m_webContext->sendToAllProcessesRelaunchingThemIfNecessary(Messages::WebResourceCacheManager::ClearCacheForOrigin(securityOrigin, cachesToClear));
|
/external/webkit/Source/WebCore/dom/ |
CanvasSurface.cpp | 176 const SecurityOrigin& CanvasSurface::securityOrigin() const 178 return *(static_cast<const HTMLCanvasElement*>(this)->document()->securityOrigin());
|
ScriptExecutionContext.h | 64 class SecurityOrigin; 92 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 166 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 178 RefPtr<SecurityOrigin> m_securityOrigin;
|
/external/webkit/Source/WebKit/android/jni/ |
WebStorage.cpp | 36 #include "SecurityOrigin.h" 45 Vector<RefPtr<WebCore::SecurityOrigin> > coreOrigins; 51 RefPtr<WebCore::SecurityOrigin> manifestOrigin = WebCore::SecurityOrigin::create(manifestUrls[i]); 65 WebCore::SecurityOrigin* origin = coreOrigins[i].get(); 78 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr); 79 unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get()); 86 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originStr) [all...] |
/external/webkit/Source/WebCore/fileapi/ |
DOMFileSystemBase.cpp | 101 SecurityOrigin* DOMFileSystemBase::securityOrigin() const 103 return m_context->securityOrigin();
|
/external/webkit/Source/WebKit/gtk/webkit/ |
webkitsecurityorigin.cpp | 64 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 65 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 75 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 76 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; 89 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 93 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value)); 103 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); 107 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin)); 110 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin)); 113 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin)); [all...] |
/external/webkit/Source/WebCore/html/ |
HTMLCanvasElement.cpp | 426 const SecurityOrigin& HTMLCanvasElement::securityOrigin() const 428 return *document()->securityOrigin();
|
/external/webkit/Source/WebCore/loader/ |
MainResourceLoader.cpp | 183 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(newRequest.url()); 184 if (!securityOrigin->canRequest(redirectResponse.url())) 213 frameLoader()->checkIfDisplayInsecureContent(top->document()->securityOrigin(), newRequest.url());
|
NavigationScheduler.cpp | 97 ScheduledURLNavigation(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool duringLoad, bool isLocationChange) 99 , m_securityOrigin(securityOrigin) 127 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 132 RefPtr<SecurityOrigin> m_securityOrigin; 140 ScheduledRedirect(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, bool lockHistory, bool lockBackForwardList) 141 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockHistory, lockBackForwardList, false, false) 151 ScheduledLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& referrer, bool lockHistory, bool lockBackForward (…) [all...] |
FrameLoader.cpp | 91 #include "SecurityOrigin.h" 175 return frame->document() && frame->document()->securityOrigin()->isSandboxed(mask); 227 // This needs to be done early, so that an initial document gets correct sandbox flags in its SecurityOrigin. 266 void FrameLoader::changeLocation(PassRefPtr<SecurityOrigin> securityOrigin, const KURL& url, const String& referrer, bool lockHistory, bool lockBackForwardList, bool refresh) 269 urlSelected(FrameLoadRequest(securityOrigin, ResourceRequest(url, referrer, refresh ? ReloadIgnoringCacheData : UseProtocolCachePolicy), "_self"), 275 urlSelected(FrameLoadRequest(m_frame->document()->securityOrigin(), ResourceRequest(url), passedTarget), 411 && m_frame->document()->securityOrigin()->isSecureTransitionTo(m_provisionalDocumentLoader->url()); [all...] |
/external/webkit/Source/WebCore/storage/ |
AbstractDatabase.cpp | 38 #include "SecurityOrigin.h" 186 m_contextThreadSecurityOrigin = m_scriptExecutionContext->securityOrigin(); 193 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 206 m_filename = DatabaseTracker::tracker().fullPathForDatabase(securityOrigin(), m_name); 332 SecurityOrigin* AbstractDatabase::securityOrigin() const
|
Database.cpp | 50 #include "SecurityOrigin.h" 94 LOG(StorageAPI, "Database %s for origin %s not allowed to be established", name.ascii().data(), context->securityOrigin()->toString().ascii().data()); 106 DatabaseTracker::tracker().setDatabaseDetails(context->securityOrigin(), name, displayName, estimatedSize); 110 InspectorInstrumentation::didOpenDatabase(context, database, context->securityOrigin()->host(), name, expectedVersion); 409 SecurityOrigin* Database::securityOrigin() const
|
/external/webkit/Source/WebCore/page/ |
DOMWindow.h | 32 #include "SecurityOrigin.h" 96 void setSecurityOrigin(SecurityOrigin* securityOrigin) { m_securityOrigin = securityOrigin; } 97 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 452 RefPtr<SecurityOrigin> m_securityOrigin;
|
/external/webkit/Source/WebKit/qt/WebCoreSupport/ |
ChromeClientQt.cpp | 61 #include "SecurityOrigin.h" 534 if (!DatabaseTracker::tracker().hasEntryForOrigin(frame->document()->securityOrigin())) 535 DatabaseTracker::tracker().setQuota(frame->document()->securityOrigin(), quota); 548 void ChromeClientQt::reachedApplicationCacheOriginQuota(SecurityOrigin* origin) 554 QWebSecurityOrigin* securityOrigin = new QWebSecurityOrigin(priv); 559 emit m_webPage->applicationCacheQuotaExceeded(securityOrigin, defaultOriginQuota);
|
/external/webkit/Source/WebKit/qt/Api/ |
qwebframe.cpp | [all...] |
/external/webkit/Source/WebCore/platform/graphics/gstreamer/ |
MediaPlayerPrivateGStreamer.cpp | 43 #include "SecurityOrigin.h" [all...] |