OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:securityOrigin
(Results
26 - 50
of
145
) sorted by null
1
2
3
4
5
6
/external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentThreadableLoader.cpp
50
#include "weborigin/
SecurityOrigin
.h"
74
, m_sameOriginRequest(
securityOrigin
()->canRequest(request.url()))
104
updateRequestForAccessControl(*crossOriginRequest,
securityOrigin
(), m_options.allowCredentials);
112
if (CrossOriginPreflightResultCache::shared().canSkipPreflight(
securityOrigin
()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields()))
135
ResourceRequest preflightRequest = createAccessControlPreflightRequest(request,
securityOrigin
());
215
&& (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials,
securityOrigin
(), accessControlErrorDescription));
222
RefPtr<
SecurityOrigin
> originalOrigin =
SecurityOrigin
::create(redirectResponse.url());
223
RefPtr<
SecurityOrigin
> requestOrigin =
SecurityOrigin
::create(request.url())
[
all
...]
TextResourceDecoderBuilder.cpp
37
#include "weborigin/
SecurityOrigin
.h"
43
return parentFrame && parentFrame->document()->
securityOrigin
()->canAccess(frame->document()->
securityOrigin
());
TextTrackLoader.cpp
39
#include "weborigin/
SecurityOrigin
.h"
128
&& !document->
securityOrigin
()->canRequest(resource->response().url())
129
&& !resource->passesAccessControlCheck(document->
securityOrigin
())) {
160
updateRequestForAccessControl(cueRequest.mutableResourceRequest(), document->
securityOrigin
(), allowCredentials);
163
if (!document->
securityOrigin
()->canRequest(url)) {
ThreadableLoader.h
35
#include "weborigin/
SecurityOrigin
.h"
74
RefPtr<
SecurityOrigin
>
securityOrigin
;
PingLoader.cpp
47
#include "weborigin/
SecurityOrigin
.h"
56
if (!frame->document()->
securityOrigin
()->canDisplay(url)) {
86
SecurityOrigin
* sourceOrigin = frame->document()->
securityOrigin
();
87
RefPtr<
SecurityOrigin
> pingOrigin =
SecurityOrigin
::create(pingURL);
117
OwnPtr<PingLoader> pingLoader = adoptPtr(new PingLoader(frame, request,
SecurityOrigin
::create(reportURL)->isSameSchemeHostPort(frame->document()->
securityOrigin
()) ? AllowStoredCredentials : DoNotAllowStoredCredentials));
/external/chromium_org/third_party/WebKit/public/web/
WebMIDIPermissionRequest.h
55
WEBKIT_EXPORT WebSecurityOrigin
securityOrigin
() const;
WebDatabase.h
49
WEBKIT_EXPORT WebSecurityOrigin
securityOrigin
() const;
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/
CanvasRenderingContext.cpp
34
#include "weborigin/
SecurityOrigin
.h"
67
return wouldTaintOrigin(cachedImage->response().url()) && !cachedImage->passesAccessControlCheck(canvas()->
securityOrigin
());
93
if (canvas()->
securityOrigin
()->taintsCanvas(url))
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
WorkerGlobalScopeWebDatabase.cpp
40
#include "weborigin/
SecurityOrigin
.h"
49
if (RuntimeEnabledFeatures::databaseEnabled() && context->
securityOrigin
()->canAccessDatabase()) {
66
if (RuntimeEnabledFeatures::databaseEnabled() && context->
securityOrigin
()->canAccessDatabase()) {
DOMWindowWebDatabase.cpp
40
#include "weborigin/
SecurityOrigin
.h"
52
if (RuntimeEnabledFeatures::databaseEnabled() && window->document()->
securityOrigin
()->canAccessDatabase()) {
/external/chromium_org/third_party/WebKit/Source/web/
StorageAreaProxy.cpp
42
#include "weborigin/
SecurityOrigin
.h"
151
SecurityOrigin
*
securityOrigin
, const KURL& pageURL, WebKit::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
158
if (storage && frame->document()->
securityOrigin
()->equal(
securityOrigin
) && !isEventSource(storage, sourceAreaInstance))
161
InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage,
securityOrigin
);
179
SecurityOrigin
*
securityOrigin
, const KURL& pageURL, const WebKit::WebStorageNamespace& sessionNamespace,
188
if (storage && frame->document()->
securityOrigin
()->equal(
securityOrigin
) && !isEventSource(storage, sourceAreaInstance)
[
all
...]
WebDatabase.cpp
41
#include "weborigin/
SecurityOrigin
.h"
67
WebSecurityOrigin WebDatabase::
securityOrigin
() const
70
return WebSecurityOrigin(m_database->
securityOrigin
());
WebUserMediaRequest.cpp
48
#include "weborigin/
SecurityOrigin
.h"
93
WebSecurityOrigin WebUserMediaRequest::
securityOrigin
() const
96
return WebSecurityOrigin(m_private->scriptExecutionContext()->
securityOrigin
());
IDBFactoryBackendProxy.cpp
56
#include "weborigin/
SecurityOrigin
.h"
148
WebSecurityOrigin origin(context->
securityOrigin
());
159
WebSecurityOrigin origin(context->
securityOrigin
());
169
WebSecurityOrigin origin(context->
securityOrigin
());
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/
ResourceTreeModel.js
118
this._addSecurityOrigin(frame.
securityOrigin
);
124
* @param {string}
securityOrigin
126
_addSecurityOrigin: function(
securityOrigin
)
128
if (!this._securityOriginFrameCount[
securityOrigin
]) {
129
this._securityOriginFrameCount[
securityOrigin
] = 1;
130
this.dispatchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded,
securityOrigin
);
133
this._securityOriginFrameCount[
securityOrigin
] += 1;
137
* @param {string}
securityOrigin
139
_removeSecurityOrigin: function(
securityOrigin
)
141
console.assert(this._securityOriginFrameCount[
securityOrigin
]);
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/html/
HTMLImportsController.cpp
76
request.setPotentiallyCrossOriginEnabled(
securityOrigin
(), DoNotAllowStoredCredentials);
102
SecurityOrigin
* HTMLImportsController::
securityOrigin
() const
104
return m_master->
securityOrigin
();
HTMLImportsController.h
73
SecurityOrigin
*
securityOrigin
() const;
/external/chromium_org/content/child/
web_database_observer_impl.cc
78
database.
securityOrigin
().databaseIdentifier().utf8();
89
database.
securityOrigin
().databaseIdentifier().utf8(), database.name()));
95
database.
securityOrigin
().databaseIdentifier().utf8();
166
database.
securityOrigin
().databaseIdentifier().utf8(),
/external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.h
36
class
SecurityOrigin
;
60
SecurityOrigin
*
securityOrigin
() const { return m_securityOrigin.get(); }
72
void setSecurityOrigin(PassRefPtr<
SecurityOrigin
>);
94
RefPtr<
SecurityOrigin
> m_securityOrigin;
/external/chromium_org/third_party/WebKit/Source/core/inspector/
PageRuntimeAgent.cpp
44
#include "weborigin/
SecurityOrigin
.h"
127
void PageRuntimeAgent::didCreateIsolatedContext(Frame* frame, ScriptState* scriptState,
SecurityOrigin
* origin)
163
Vector<std::pair<ScriptState*,
SecurityOrigin
*> > isolatedContexts;
180
void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState,
SecurityOrigin
*
securityOrigin
, bool isPageContext)
182
ASSERT(
securityOrigin
|| isPageContext);
184
String name =
securityOrigin
?
securityOrigin
->toRawString() : "";
/external/chromium_org/third_party/WebKit/Source/core/workers/
AbstractWorker.cpp
39
#include "weborigin/
SecurityOrigin
.h"
71
if (!scriptExecutionContext()->
securityOrigin
()->canRequest(scriptURL)) {
/external/chromium_org/third_party/WebKit/Source/modules/mediastream/
MediaStreamTrackSourcesRequest.cpp
33
#include "weborigin/
SecurityOrigin
.h"
46
m_origin = context->
securityOrigin
()->toString();
/external/chromium_org/third_party/WebKit/Source/core/page/
History.cpp
41
#include "weborigin/
SecurityOrigin
.h"
148
if (!fullURL.isValid() || !m_frame->document()->
securityOrigin
()->canRequest(fullURL)) {
149
es.throwDOMException(SecurityError, "A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->
securityOrigin
()->toString() + "'.");
CreateWindow.cpp
41
#include "weborigin/
SecurityOrigin
.h"
141
FrameLoadRequest frameRequest(activeWindow->document()->
securityOrigin
(), request, frameName);
160
FrameLoadRequest request(activeWindow->document()->
securityOrigin
(), ResourceRequest(completedURL, referrer));
163
newFrame->navigationScheduler()->scheduleLocationChange(activeWindow->document()->
securityOrigin
(), completedURL.string(), referrer, false);
/external/chromium_org/content/renderer/
geolocation_dispatcher.cc
90
string16 origin = permissionRequest.
securityOrigin
().toString();
102
string16 origin = permissionRequest.
securityOrigin
().toString();
Completed in 583 milliseconds
1
2
3
4
5
6