/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
DatabaseBackendContext.cpp | 41 SecurityOrigin* DatabaseBackendContext::securityOrigin() const 43 return scriptExecutionContext()->securityOrigin();
|
DatabaseBackendContext.h | 34 class SecurityOrigin; 46 SecurityOrigin* securityOrigin() const;
|
/external/chromium_org/third_party/WebKit/Source/web/ |
WebGeolocationPermissionRequest.cpp | 34 #include "weborigin/SecurityOrigin.h" 40 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const 42 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
|
WebStorageEventDispatcherImpl.cpp | 38 #include "weborigin/SecurityOrigin.h" 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
NotificationPresenterImpl.cpp | 41 #include "weborigin/SecurityOrigin.h" 73 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassRefPtr<NotificationPermissionCallback> callback) 75 , m_securityOrigin(securityOrigin) 91 RefPtr<SecurityOrigin> m_securityOrigin; 127 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); 134 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClient(callback)); 141 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
|
WebMIDIPermissionRequest.cpp | 37 #include "weborigin/SecurityOrigin.h" 68 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const 70 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.cpp | 37 #include "weborigin/SecurityOrigin.h" 53 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) 55 if (securityOrigin->protocol() != "https") 59 return !SecurityOrigin::isSecure(url); 62 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 64 if (!isMixedContent(securityOrigin, url)) 68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 77 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) cons [all...] |
CrossOriginAccessControl.cpp | 33 #include "weborigin/SecurityOrigin.h" 100 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) 105 if (securityOrigin) 106 request.setHTTPOrigin(securityOrigin->toString()); 109 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) 112 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 138 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription [all...] |
NavigationScheduler.cpp | 101 ScheduledURLNavigation(double delay, SecurityOrigin* securityOrigin, const String& url, const String& referrer, bool lockBackForwardList, bool duringLoad, bool isLocationChange) 103 , m_securityOrigin(securityOrigin) 130 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 135 RefPtr<SecurityOrigin> m_securityOrigin; 143 ScheduledRedirect(double delay, SecurityOrigin* securityOrigin, const String& url, bool lockBackForwardList) 144 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockBackForwardList, false, false) 154 FrameLoadRequest request(securityOrigin(), ResourceRequest(KURL(ParsedURLString, url()), referrer()), "_self") [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
StorageQuota.cpp | 43 #include "weborigin/SecurityOrigin.h" 64 SecurityOrigin* securityOrigin = scriptExecutionContext->securityOrigin(); 65 if (securityOrigin->isUnique()) { 70 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
IndexedDBModel.js | 146 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 147 this._removeOrigin(securityOrigin); 155 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 156 this._loadDatabaseNames(securityOrigin); 174 IndexedDBAgent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback); 182 var securityOrigin = /** @type {string} */ (event.data); 183 this._addOrigin(securityOrigin); 191 var securityOrigin = /** @type {string} */ (event.data); 192 this._removeOrigin(securityOrigin); 196 * @param {string} securityOrigin [all...] |
DOMStorage.js | 32 * @param {string} securityOrigin 35 WebInspector.DOMStorage = function(securityOrigin, isLocalStorage) 37 this._securityOrigin = securityOrigin; 43 * @param {string} securityOrigin 47 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) 49 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 61 get securityOrigin() 342 var securityOrigin = /** @type {string} */ (event.data); 343 var localStorageKey = this._storageKey(securityOrigin, true) [all...] |
FileSystemModel.js | 52 for (var securityOrigin in this._fileSystemsForOrigin) 53 this._removeOrigin(securityOrigin); 64 var securityOrigin = /** @type {string} */ (event.data); 65 this._addOrigin(securityOrigin); 73 var securityOrigin = /** @type {string} */ (event.data); 74 this._removeOrigin(securityOrigin); 78 * @param {string} securityOrigin 80 _addOrigin: function(securityOrigin) 82 this._fileSystemsForOrigin[securityOrigin] = {}; 86 this._requestFileSystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[i], this._fileSystemsForO (…) [all...] |
/external/chromium_org/third_party/WebKit/Source/weborigin/ |
DatabaseIdentifier.cpp | 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier) 51 return SecurityOrigin::createUnique(); 56 return SecurityOrigin::createUnique(); 61 return SecurityOrigin::createUnique(); 66 return SecurityOrigin::createUnique(); 73 return SecurityOrigin::createUnique(); 76 return SecurityOrigin::createUnique(); 85 return SecurityOrigin::createUnique(); 87 return SecurityOrigin::create(url); 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin [all...] |
/external/chromium_org/third_party/WebKit/Source/core/fileapi/ |
BlobURL.cpp | 37 #include "weborigin/SecurityOrigin.h" 44 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) 46 ASSERT(securityOrigin); 47 return createBlobURL(securityOrigin->toString());
|
/external/chromium_org/chrome/renderer/ |
content_settings_observer.cc | 37 WebString top_origin = frame->top()->document().securityOrigin().toString(); 151 DCHECK(frame->document().securityOrigin().toString() == "null" || 159 if (frame->document().securityOrigin().isUnique() || 160 frame->top()->document().securityOrigin().isUnique()) 165 routing_id(), GURL(frame->document().securityOrigin().toString()), 166 GURL(frame->top()->document().securityOrigin().toString()), 172 if (frame->document().securityOrigin().isUnique() || 173 frame->top()->document().securityOrigin().isUnique()) 178 routing_id(), GURL(frame->document().securityOrigin().toString()), 179 GURL(frame->top()->document().securityOrigin().toString()), &result)) [all...] |
/external/chromium_org/third_party/WebKit/public/web/ |
WebGeolocationPermissionRequest.h | 46 WEBKIT_EXPORT WebSecurityOrigin securityOrigin() const;
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.cpp | 32 #include "weborigin/SecurityOrigin.h" 48 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) 50 m_securityOrigin = securityOrigin; 67 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); 68 return securityOrigin()->canAccess(other.get()); 76 if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique()) { 77 setSecurityOrigin(SecurityOrigin::createUnique()) [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
DOMWindowFileSystem.cpp | 40 #include "weborigin/SecurityOrigin.h" 61 if (!document->securityOrigin()->canAccessFileSystem()) { 84 SecurityOrigin* securityOrigin = document->securityOrigin(); 86 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
|
WorkerGlobalScopeFileSystem.cpp | 46 #include "weborigin/SecurityOrigin.h" 53 if (!secureContext->securityOrigin()->canAccessFileSystem()) { 70 if (!secureContext->securityOrigin()->canAccessFileSystem()) { 93 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) { 112 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
BindingSecurity.cpp | 41 #include "weborigin/SecurityOrigin.h" 54 if (active->document()->securityOrigin()->canAccess(targetDocument->securityOrigin()))
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
DOMURL.cpp | 50 KURL publicURL = BlobURL::createPublicURL(scriptExecutionContext->securityOrigin()); 54 scriptExecutionContext->publicURLManager().registerURL(scriptExecutionContext->securityOrigin(), publicURL, registrable);
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorDOMStorageAgent.cpp | 49 #include "weborigin/SecurityOrigin.h" 194 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); 196 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); 199 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) 202 .setSecurityOrigin(securityOrigin->toRawString()) 206 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) [all...] |
InspectorIndexedDBAgent.h | 59 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>); 60 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>); 61 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>);
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
IDBFactory.cpp | 52 #include "weborigin/SecurityOrigin.h" 83 if (!context->securityOrigin()->canAccessDatabase()) { 89 m_backend->getDatabaseNames(request, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context); 113 if (!context->securityOrigin()->canAccessDatabase()) { 121 m_backend->open(name, version, transactionId, request, databaseCallbacks, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context); 141 if (!context->securityOrigin()->canAccessDatabase()) { 147 m_backend->deleteDatabase(name, request, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context);
|