HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 1 - 25 of 145) sorted by null

1 2 3 4 5 6

  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DatabaseBackendContext.cpp 41 SecurityOrigin* DatabaseBackendContext::securityOrigin() const
43 return scriptExecutionContext()->securityOrigin();
DatabaseBackendContext.h 34 class SecurityOrigin;
46 SecurityOrigin* securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/web/
WebGeolocationPermissionRequest.cpp 34 #include "weborigin/SecurityOrigin.h"
40 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const
42 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
WebStorageEventDispatcherImpl.cpp 38 #include "weborigin/SecurityOrigin.h"
49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
NotificationPresenterImpl.cpp 41 #include "weborigin/SecurityOrigin.h"
73 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassRefPtr<NotificationPermissionCallback> callback)
75 , m_securityOrigin(securityOrigin)
91 RefPtr<SecurityOrigin> m_securityOrigin;
127 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin()));
134 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClient(callback));
141 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
WebMIDIPermissionRequest.cpp 37 #include "weborigin/SecurityOrigin.h"
68 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const
70 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/core/loader/
MixedContentChecker.cpp 37 #include "weborigin/SecurityOrigin.h"
53 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url)
55 if (securityOrigin->protocol() != "https")
59 return !SecurityOrigin::isSecure(url);
62 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
64 if (!isMixedContent(securityOrigin, url))
68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
77 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) cons
    [all...]
CrossOriginAccessControl.cpp 33 #include "weborigin/SecurityOrigin.h"
100 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials)
105 if (securityOrigin)
106 request.setHTTPOrigin(securityOrigin->toString());
109 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin)
112 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
138 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription
    [all...]
NavigationScheduler.cpp 101 ScheduledURLNavigation(double delay, SecurityOrigin* securityOrigin, const String& url, const String& referrer, bool lockBackForwardList, bool duringLoad, bool isLocationChange)
103 , m_securityOrigin(securityOrigin)
130 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
135 RefPtr<SecurityOrigin> m_securityOrigin;
143 ScheduledRedirect(double delay, SecurityOrigin* securityOrigin, const String& url, bool lockBackForwardList)
144 : ScheduledURLNavigation(delay, securityOrigin, url, String(), lockBackForwardList, false, false)
154 FrameLoadRequest request(securityOrigin(), ResourceRequest(KURL(ParsedURLString, url()), referrer()), "_self")
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/quota/
StorageQuota.cpp 43 #include "weborigin/SecurityOrigin.h"
64 SecurityOrigin* securityOrigin = scriptExecutionContext->securityOrigin();
65 if (securityOrigin->isUnique()) {
70 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/
IndexedDBModel.js 146 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
147 this._removeOrigin(securityOrigin);
155 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
156 this._loadDatabaseNames(securityOrigin);
174 IndexedDBAgent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback);
182 var securityOrigin = /** @type {string} */ (event.data);
183 this._addOrigin(securityOrigin);
191 var securityOrigin = /** @type {string} */ (event.data);
192 this._removeOrigin(securityOrigin);
196 * @param {string} securityOrigin
    [all...]
DOMStorage.js 32 * @param {string} securityOrigin
35 WebInspector.DOMStorage = function(securityOrigin, isLocalStorage)
37 this._securityOrigin = securityOrigin;
43 * @param {string} securityOrigin
47 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage)
49 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
61 get securityOrigin()
342 var securityOrigin = /** @type {string} */ (event.data);
343 var localStorageKey = this._storageKey(securityOrigin, true)
    [all...]
FileSystemModel.js 52 for (var securityOrigin in this._fileSystemsForOrigin)
53 this._removeOrigin(securityOrigin);
64 var securityOrigin = /** @type {string} */ (event.data);
65 this._addOrigin(securityOrigin);
73 var securityOrigin = /** @type {string} */ (event.data);
74 this._removeOrigin(securityOrigin);
78 * @param {string} securityOrigin
80 _addOrigin: function(securityOrigin)
82 this._fileSystemsForOrigin[securityOrigin] = {};
86 this._requestFileSystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[i], this._fileSystemsForO (…)
    [all...]
  /external/chromium_org/third_party/WebKit/Source/weborigin/
DatabaseIdentifier.cpp 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier)
51 return SecurityOrigin::createUnique();
56 return SecurityOrigin::createUnique();
61 return SecurityOrigin::createUnique();
66 return SecurityOrigin::createUnique();
73 return SecurityOrigin::createUnique();
76 return SecurityOrigin::createUnique();
85 return SecurityOrigin::createUnique();
87 return SecurityOrigin::create(url);
90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/fileapi/
BlobURL.cpp 37 #include "weborigin/SecurityOrigin.h"
44 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin)
46 ASSERT(securityOrigin);
47 return createBlobURL(securityOrigin->toString());
  /external/chromium_org/chrome/renderer/
content_settings_observer.cc 37 WebString top_origin = frame->top()->document().securityOrigin().toString();
151 DCHECK(frame->document().securityOrigin().toString() == "null" ||
159 if (frame->document().securityOrigin().isUnique() ||
160 frame->top()->document().securityOrigin().isUnique())
165 routing_id(), GURL(frame->document().securityOrigin().toString()),
166 GURL(frame->top()->document().securityOrigin().toString()),
172 if (frame->document().securityOrigin().isUnique() ||
173 frame->top()->document().securityOrigin().isUnique())
178 routing_id(), GURL(frame->document().securityOrigin().toString()),
179 GURL(frame->top()->document().securityOrigin().toString()), &result))
    [all...]
  /external/chromium_org/third_party/WebKit/public/web/
WebGeolocationPermissionRequest.h 46 WEBKIT_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.cpp 32 #include "weborigin/SecurityOrigin.h"
48 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin)
50 m_securityOrigin = securityOrigin;
67 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url);
68 return securityOrigin()->canAccess(other.get());
76 if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique()) {
77 setSecurityOrigin(SecurityOrigin::createUnique())
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMWindowFileSystem.cpp 40 #include "weborigin/SecurityOrigin.h"
61 if (!document->securityOrigin()->canAccessFileSystem()) {
84 SecurityOrigin* securityOrigin = document->securityOrigin();
86 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
WorkerGlobalScopeFileSystem.cpp 46 #include "weborigin/SecurityOrigin.h"
53 if (!secureContext->securityOrigin()->canAccessFileSystem()) {
70 if (!secureContext->securityOrigin()->canAccessFileSystem()) {
93 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
112 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
BindingSecurity.cpp 41 #include "weborigin/SecurityOrigin.h"
54 if (active->document()->securityOrigin()->canAccess(targetDocument->securityOrigin()))
  /external/chromium_org/third_party/WebKit/Source/core/html/
DOMURL.cpp 50 KURL publicURL = BlobURL::createPublicURL(scriptExecutionContext->securityOrigin());
54 scriptExecutionContext->publicURLManager().registerURL(scriptExecutionContext->securityOrigin(), publicURL, registrable);
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorDOMStorageAgent.cpp 49 #include "weborigin/SecurityOrigin.h"
194 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin();
196 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString();
199 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage)
202 .setSecurityOrigin(securityOrigin->toRawString())
206 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin)
    [all...]
InspectorIndexedDBAgent.h 59 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>);
60 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>);
61 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>);
  /external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
IDBFactory.cpp 52 #include "weborigin/SecurityOrigin.h"
83 if (!context->securityOrigin()->canAccessDatabase()) {
89 m_backend->getDatabaseNames(request, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context);
113 if (!context->securityOrigin()->canAccessDatabase()) {
121 m_backend->open(name, version, transactionId, request, databaseCallbacks, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context);
141 if (!context->securityOrigin()->canAccessDatabase()) {
147 m_backend->deleteDatabase(name, request, createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()), context);

Completed in 2211 milliseconds

1 2 3 4 5 6