/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
DatabaseBackendContext.cpp | 41 SecurityOrigin* DatabaseBackendContext::securityOrigin() const 43 return scriptExecutionContext()->securityOrigin();
|
Database.cpp | 52 #include "weborigin/SecurityOrigin.h" 275 SecurityOrigin* Database::securityOrigin() const
|
DatabaseBackendBase.cpp | 44 #include "weborigin/SecurityOrigin.h" 215 m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy(); 224 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 234 m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name); 427 SecurityOrigin* DatabaseBackendBase::securityOrigin() const
|
/external/chromium_org/third_party/WebKit/Source/web/ |
WebGeolocationPermissionRequest.cpp | 34 #include "weborigin/SecurityOrigin.h" 40 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const 42 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
|
WebStorageEventDispatcherImpl.cpp | 38 #include "weborigin/SecurityOrigin.h" 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
WebMIDIPermissionRequest.cpp | 37 #include "weborigin/SecurityOrigin.h" 68 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const 70 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
|
WebDatabase.cpp | 41 #include "weborigin/SecurityOrigin.h" 67 WebSecurityOrigin WebDatabase::securityOrigin() const 70 return WebSecurityOrigin(m_database->securityOrigin());
|
WebUserMediaRequest.cpp | 48 #include "weborigin/SecurityOrigin.h" 93 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const 96 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
|
WebDocument.cpp | 65 #include "weborigin/SecurityOrigin.h" 77 WebSecurityOrigin WebDocument::securityOrigin() const 81 return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin());
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
StorageQuota.cpp | 43 #include "weborigin/SecurityOrigin.h" 64 SecurityOrigin* securityOrigin = scriptExecutionContext->securityOrigin(); 65 if (securityOrigin->isUnique()) { 70 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/ |
V8XMLHttpRequestCustom.cpp | 56 RefPtr<SecurityOrigin> securityOrigin; 59 securityOrigin = world->isolatedWorldSecurityOrigin(); 62 RefPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.h | 36 class SecurityOrigin; 60 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 72 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 94 RefPtr<SecurityOrigin> m_securityOrigin;
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLImportsController.cpp | 76 request.setPotentiallyCrossOriginEnabled(securityOrigin(), DoNotAllowStoredCredentials); 102 SecurityOrigin* HTMLImportsController::securityOrigin() const 104 return m_master->securityOrigin();
|
HTMLCanvasElement.cpp | 449 SecurityOrigin* HTMLCanvasElement::securityOrigin() const 451 return document()->securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
ThreadableLoader.h | 35 #include "weborigin/SecurityOrigin.h" 74 RefPtr<SecurityOrigin> securityOrigin;
|
DocumentThreadableLoader.cpp | 50 #include "weborigin/SecurityOrigin.h" 74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) 104 updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials); 112 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) 135 ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin()); 215 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)); 222 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url()); 223 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url()) [all...] |
NavigationScheduler.cpp | 101 ScheduledURLNavigation(double delay, SecurityOrigin* securityOrigin, const String& url, const String& referrer, bool lockBackForwardList, bool duringLoad, bool isLocationChange) 103 , m_securityOrigin(securityOrigin) 130 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 135 RefPtr<SecurityOrigin> m_securityOrigin; 143 ScheduledRedirect(double delay, SecurityOrigin* securityOrigin, const String& url, bool lockBackForwardList) 144 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockBackForwardList, false, false) 154 FrameLoadRequest request(securityOrigin(), ResourceRequest(KURL(ParsedURLString, url()), referrer()), "_self") [all...] |
FrameLoader.cpp | 88 #include "weborigin/SecurityOrigin.h" 654 return m_frame->document()->securityOrigin()->toString(); 834 RefPtr<SecurityOrigin> referrerOrigin = SecurityOrigin::createFromString(referrer); 855 // If no SecurityOrigin was specified, skip security checks and assume the caller has fully initialized the FrameLoadRequest. [all...] |
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorDOMStorageAgent.cpp | 49 #include "weborigin/SecurityOrigin.h" 194 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); 196 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); 199 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) 202 .setSecurityOrigin(securityOrigin->toRawString()) 206 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
DOMFileSystemBase.cpp | 47 #include "weborigin/SecurityOrigin.h" 73 SecurityOrigin* DOMFileSystemBase::securityOrigin() const 75 return m_context->securityOrigin(); 124 result.append(securityOrigin()->toString());
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
Performance.cpp | 44 #include "weborigin/SecurityOrigin.h" 170 RefPtr<SecurityOrigin> resourceOrigin = SecurityOrigin::create(response.url()); 171 if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin())) 181 const String& securityOrigin = requestingDocument->securityOrigin()->toString(); 185 if (timingAllowOrigins[i] == securityOrigin)
|
ContentSecurityPolicy.cpp | 49 #include "weborigin/SecurityOrigin.h" 242 String protectedResourceScheme(m_policy->securityOrigin()->protocol()); 351 KURL effectiveURL = SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : url; 661 m_list.append(CSPSource(m_policy, m_policy->securityOrigin()->protocol(), m_policy->securityOrigin()->host(), m_policy->securityOrigin()->port(), String(), false, false)); [all...] |
/external/chromium_org/third_party/WebKit/Source/core/xml/ |
XMLHttpRequest.cpp | 54 #include "weborigin/SecurityOrigin.h" 157 PassRefPtr<XMLHttpRequest> XMLHttpRequest::create(ScriptExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin) 159 RefPtr<XMLHttpRequest> xmlHttpRequest(adoptRef(new XMLHttpRequest(context, securityOrigin))); 165 XMLHttpRequest::XMLHttpRequest(ScriptExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin) 183 , m_securityOrigin(securityOrigin) 205 SecurityOrigin* XMLHttpRequest::securityOrigin() const 207 return m_securityOrigin ? m_securityOrigin.get() : scriptExecutionContext()->securityOrigin(); [all...] |