Home | History | Annotate | Download | only in loader

Lines Matching defs:securityOrigin

51 #include "platform/weborigin/SecurityOrigin.h"
77 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin)
78 , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
122 updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials());
134 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) {
137 ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin());
210 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription));
220 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url());
221 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url());
226 m_securityOrigin = SecurityOrigin::createUnique();
291 if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription)) {
309 CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest->url(), preflightResult.release());
323 securityOrigin(), accessControlErrorDescription)) {
388 actualRequest->setHTTPOrigin(securityOrigin()->toAtomicString());
415 resourceLoaderOptions.securityOrigin = m_securityOrigin;
480 return m_sameOriginRequest && securityOrigin()->canRequest(url);
497 SecurityOrigin* DocumentThreadableLoader::securityOrigin() const
499 return m_securityOrigin ? m_securityOrigin.get() : m_document.securityOrigin();