HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 26 - 50 of 145) sorted by null

12 3 4 5 6

  /external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentThreadableLoader.cpp 50 #include "weborigin/SecurityOrigin.h"
74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
104 updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials);
112 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields()))
135 ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin());
215 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription));
222 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url());
223 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url())
    [all...]
TextResourceDecoderBuilder.cpp 37 #include "weborigin/SecurityOrigin.h"
43 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin());
TextTrackLoader.cpp 39 #include "weborigin/SecurityOrigin.h"
128 && !document->securityOrigin()->canRequest(resource->response().url())
129 && !resource->passesAccessControlCheck(document->securityOrigin())) {
160 updateRequestForAccessControl(cueRequest.mutableResourceRequest(), document->securityOrigin(), allowCredentials);
163 if (!document->securityOrigin()->canRequest(url)) {
ThreadableLoader.h 35 #include "weborigin/SecurityOrigin.h"
74 RefPtr<SecurityOrigin> securityOrigin;
PingLoader.cpp 47 #include "weborigin/SecurityOrigin.h"
56 if (!frame->document()->securityOrigin()->canDisplay(url)) {
86 SecurityOrigin* sourceOrigin = frame->document()->securityOrigin();
87 RefPtr<SecurityOrigin> pingOrigin = SecurityOrigin::create(pingURL);
117 OwnPtr<PingLoader> pingLoader = adoptPtr(new PingLoader(frame, request, SecurityOrigin::create(reportURL)->isSameSchemeHostPort(frame->document()->securityOrigin()) ? AllowStoredCredentials : DoNotAllowStoredCredentials));
  /external/chromium_org/third_party/WebKit/public/web/
WebMIDIPermissionRequest.h 55 WEBKIT_EXPORT WebSecurityOrigin securityOrigin() const;
WebDatabase.h 49 WEBKIT_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/core/html/canvas/
CanvasRenderingContext.cpp 34 #include "weborigin/SecurityOrigin.h"
67 return wouldTaintOrigin(cachedImage->response().url()) && !cachedImage->passesAccessControlCheck(canvas()->securityOrigin());
93 if (canvas()->securityOrigin()->taintsCanvas(url))
  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
WorkerGlobalScopeWebDatabase.cpp 40 #include "weborigin/SecurityOrigin.h"
49 if (RuntimeEnabledFeatures::databaseEnabled() && context->securityOrigin()->canAccessDatabase()) {
66 if (RuntimeEnabledFeatures::databaseEnabled() && context->securityOrigin()->canAccessDatabase()) {
DOMWindowWebDatabase.cpp 40 #include "weborigin/SecurityOrigin.h"
52 if (RuntimeEnabledFeatures::databaseEnabled() && window->document()->securityOrigin()->canAccessDatabase()) {
  /external/chromium_org/third_party/WebKit/Source/web/
StorageAreaProxy.cpp 42 #include "weborigin/SecurityOrigin.h"
151 SecurityOrigin* securityOrigin, const KURL& pageURL, WebKit::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
158 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
161 InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin);
179 SecurityOrigin* securityOrigin, const KURL& pageURL, const WebKit::WebStorageNamespace& sessionNamespace,
188 if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storage, sourceAreaInstance)
    [all...]
WebDatabase.cpp 41 #include "weborigin/SecurityOrigin.h"
67 WebSecurityOrigin WebDatabase::securityOrigin() const
70 return WebSecurityOrigin(m_database->securityOrigin());
WebUserMediaRequest.cpp 48 #include "weborigin/SecurityOrigin.h"
93 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const
96 return WebSecurityOrigin(m_private->scriptExecutionContext()->securityOrigin());
IDBFactoryBackendProxy.cpp 56 #include "weborigin/SecurityOrigin.h"
148 WebSecurityOrigin origin(context->securityOrigin());
159 WebSecurityOrigin origin(context->securityOrigin());
169 WebSecurityOrigin origin(context->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/
ResourceTreeModel.js 118 this._addSecurityOrigin(frame.securityOrigin);
124 * @param {string} securityOrigin
126 _addSecurityOrigin: function(securityOrigin)
128 if (!this._securityOriginFrameCount[securityOrigin]) {
129 this._securityOriginFrameCount[securityOrigin] = 1;
130 this.dispatchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin);
133 this._securityOriginFrameCount[securityOrigin] += 1;
137 * @param {string} securityOrigin
139 _removeSecurityOrigin: function(securityOrigin)
141 console.assert(this._securityOriginFrameCount[securityOrigin]);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLImportsController.cpp 76 request.setPotentiallyCrossOriginEnabled(securityOrigin(), DoNotAllowStoredCredentials);
102 SecurityOrigin* HTMLImportsController::securityOrigin() const
104 return m_master->securityOrigin();
HTMLImportsController.h 73 SecurityOrigin* securityOrigin() const;
  /external/chromium_org/content/child/
web_database_observer_impl.cc 78 database.securityOrigin().databaseIdentifier().utf8();
89 database.securityOrigin().databaseIdentifier().utf8(), database.name()));
95 database.securityOrigin().databaseIdentifier().utf8();
166 database.securityOrigin().databaseIdentifier().utf8(),
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.h 36 class SecurityOrigin;
60 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
72 void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
94 RefPtr<SecurityOrigin> m_securityOrigin;
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
PageRuntimeAgent.cpp 44 #include "weborigin/SecurityOrigin.h"
127 void PageRuntimeAgent::didCreateIsolatedContext(Frame* frame, ScriptState* scriptState, SecurityOrigin* origin)
163 Vector<std::pair<ScriptState*, SecurityOrigin*> > isolatedContexts;
180 void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState, SecurityOrigin* securityOrigin, bool isPageContext)
182 ASSERT(securityOrigin || isPageContext);
184 String name = securityOrigin ? securityOrigin->toRawString() : "";
  /external/chromium_org/third_party/WebKit/Source/core/workers/
AbstractWorker.cpp 39 #include "weborigin/SecurityOrigin.h"
71 if (!scriptExecutionContext()->securityOrigin()->canRequest(scriptURL)) {
  /external/chromium_org/third_party/WebKit/Source/modules/mediastream/
MediaStreamTrackSourcesRequest.cpp 33 #include "weborigin/SecurityOrigin.h"
46 m_origin = context->securityOrigin()->toString();
  /external/chromium_org/third_party/WebKit/Source/core/page/
History.cpp 41 #include "weborigin/SecurityOrigin.h"
148 if (!fullURL.isValid() || !m_frame->document()->securityOrigin()->canRequest(fullURL)) {
149 es.throwDOMException(SecurityError, "A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'.");
CreateWindow.cpp 41 #include "weborigin/SecurityOrigin.h"
141 FrameLoadRequest frameRequest(activeWindow->document()->securityOrigin(), request, frameName);
160 FrameLoadRequest request(activeWindow->document()->securityOrigin(), ResourceRequest(completedURL, referrer));
163 newFrame->navigationScheduler()->scheduleLocationChange(activeWindow->document()->securityOrigin(), completedURL.string(), referrer, false);
  /external/chromium_org/content/renderer/
geolocation_dispatcher.cc 90 string16 origin = permissionRequest.securityOrigin().toString();
102 string16 origin = permissionRequest.securityOrigin().toString();

Completed in 583 milliseconds

12 3 4 5 6