OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
defs:securityOrigin
(Results
1 - 25
of
27
) sorted by null
1
2
/external/chromium_org/third_party/WebKit/Source/web/
WebStorageEventDispatcherImpl.cpp
36
#include "platform/weborigin/
SecurityOrigin
.h"
49
RefPtr<WebCore::
SecurityOrigin
>
securityOrigin
= WebCore::
SecurityOrigin
::create(origin);
51
key, oldValue, newValue,
securityOrigin
.get(), pageURL,
61
RefPtr<WebCore::
SecurityOrigin
>
securityOrigin
= WebCore::
SecurityOrigin
::create(origin);
63
key, oldValue, newValue,
securityOrigin
.get(), pageURL,
WebGeolocationPermissionRequest.cpp
31
#include "platform/weborigin/
SecurityOrigin
.h"
49
WebSecurityOrigin WebGeolocationPermissionRequest::
securityOrigin
() const
51
return WebSecurityOrigin(m_private->executionContext()->
securityOrigin
());
WebMIDIPermissionRequest.cpp
35
#include "platform/weborigin/
SecurityOrigin
.h"
50
WebSecurityOrigin WebMIDIPermissionRequest::
securityOrigin
() const
52
return WebSecurityOrigin(m_initializer->
securityOrigin
());
WebMediaDevicesRequest.cpp
32
#include "platform/weborigin/
SecurityOrigin
.h"
59
WebSecurityOrigin WebMediaDevicesRequest::
securityOrigin
() const
62
return WebSecurityOrigin(m_private->executionContext()->
securityOrigin
());
WebDatabase.cpp
37
#include "platform/weborigin/
SecurityOrigin
.h"
64
WebSecurityOrigin WebDatabase::
securityOrigin
() const
67
return WebSecurityOrigin(m_database->
securityOrigin
());
WebUserMediaRequest.cpp
39
#include "platform/weborigin/
SecurityOrigin
.h"
92
WebSecurityOrigin WebUserMediaRequest::
securityOrigin
() const
95
return WebSecurityOrigin(m_private->executionContext()->
securityOrigin
());
WebDocument.cpp
56
#include "platform/weborigin/
SecurityOrigin
.h"
78
WebSecurityOrigin WebDocument::
securityOrigin
() const
82
return WebSecurityOrigin(constUnwrap<Document>()->
securityOrigin
());
/external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.h
36
class
SecurityOrigin
;
42
SecurityOrigin
*
securityOrigin
() const { return m_securityOrigin.get(); }
50
void setSecurityOrigin(PassRefPtr<
SecurityOrigin
>);
63
RefPtr<
SecurityOrigin
> m_securityOrigin;
ExecutionContext.cpp
132
return !(
securityOrigin
()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
238
SecurityOrigin
* ExecutionContext::
securityOrigin
() const
241
return m_client->securityContext().
securityOrigin
();
333
if (isSandboxed(SandboxOrigin) && m_client->securityContext().
securityOrigin
() && !m_client->securityContext().
securityOrigin
()->isUnique()) {
334
m_client->securityContext().setSecurityOrigin(
SecurityOrigin
::createUnique());
/external/chromium_org/third_party/WebKit/Source/core/css/
CSSFontFaceSrcValue.cpp
91
bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource,
SecurityOrigin
*
securityOrigin
)
95
return !
securityOrigin
->canRequest(resource);
102
SecurityOrigin
*
securityOrigin
= document->
securityOrigin
();
103
if (shouldSetCrossOriginAccessControl(request.url(),
securityOrigin
)) {
104
request.setCrossOriginAccessControl(
securityOrigin
, DoNotAllowStoredCredentials);
/external/chromium_org/third_party/WebKit/Source/modules/quota/
DeprecatedStorageQuota.cpp
42
#include "platform/weborigin/
SecurityOrigin
.h"
66
SecurityOrigin
*
securityOrigin
= executionContext->
securityOrigin
();
67
if (
securityOrigin
->isUnique()) {
72
KURL storagePartition = KURL(KURL(),
securityOrigin
->toString());
StorageQuota.cpp
43
#include "platform/weborigin/
SecurityOrigin
.h"
92
SecurityOrigin
*
securityOrigin
= scriptState->executionContext()->
securityOrigin
();
93
if (
securityOrigin
->isUnique()) {
98
KURL storagePartition = KURL(KURL(),
securityOrigin
->toString());
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/
MIDIAccessInitializer.cpp
88
SecurityOrigin
* MIDIAccessInitializer::
securityOrigin
() const
90
return executionContext()->
securityOrigin
();
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/
V8XMLHttpRequestCustom.cpp
58
RefPtr<
SecurityOrigin
>
securityOrigin
;
62
securityOrigin
= world.isolatedWorldSecurityOrigin();
65
RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context,
securityOrigin
);
/external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorDOMStorageAgent.cpp
47
#include "platform/weborigin/
SecurityOrigin
.h"
175
PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(
SecurityOrigin
*
securityOrigin
, bool isLocalStorage)
178
.setSecurityOrigin(
securityOrigin
->toRawString())
182
void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType,
SecurityOrigin
*
securityOrigin
)
187
RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(
securityOrigin
, storageType == LocalStorage);
201
String
securityOrigin
;
203
bool success = storageId->getString("
securityOrigin
", &
securityOrigin
);
[
all
...]
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DatabaseContext.cpp
38
#include "platform/weborigin/
SecurityOrigin
.h"
257
SecurityOrigin
* DatabaseContext::
securityOrigin
() const
259
return executionContext()->
securityOrigin
();
Database.cpp
50
#include "platform/weborigin/
SecurityOrigin
.h"
233
SecurityOrigin
* Database::
securityOrigin
() const
DatabaseBackendBase.cpp
215
m_contextThreadSecurityOrigin = m_databaseContext->
securityOrigin
()->isolatedCopy();
224
m_guid = guidForOriginAndName(
securityOrigin
()->toString(), name);
234
m_filename = DatabaseManager::manager().fullPathForDatabase(
securityOrigin
(), m_name);
436
SecurityOrigin
* DatabaseBackendBase::
securityOrigin
() const
610
createDatabaseIdentifierFromSecurityOrigin(
securityOrigin
()),
620
createDatabaseIdentifierFromSecurityOrigin(
securityOrigin
()),
630
createDatabaseIdentifierFromSecurityOrigin(
securityOrigin
()),
640
createDatabaseIdentifierFromSecurityOrigin(
securityOrigin
()),
650
createDatabaseIdentifierFromSecurityOrigin(
securityOrigin
()),
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/timing/
Performance.cpp
41
#include "platform/weborigin/
SecurityOrigin
.h"
164
RefPtr<
SecurityOrigin
> resourceOrigin =
SecurityOrigin
::create(response.url());
165
if (resourceOrigin->isSameSchemeHostPort(requestingDocument->
securityOrigin
()))
175
const String&
securityOrigin
= requestingDocument->
securityOrigin
()->toString();
179
if (timingAllowOrigins[i] ==
securityOrigin
)
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFileSystemBase.cpp
47
#include "platform/weborigin/
SecurityOrigin
.h"
79
SecurityOrigin
* DOMFileSystemBase::
securityOrigin
() const
81
return m_context->
securityOrigin
();
140
result.append(
securityOrigin
()->toString());
/external/chromium_org/third_party/WebKit/Source/core/fetch/
ResourceLoaderOptions.h
35
#include "platform/weborigin/
SecurityOrigin
.h"
135
RefPtr<
SecurityOrigin
>
securityOrigin
;
ResourceFetcher.cpp
65
#include "platform/weborigin/
SecurityOrigin
.h"
447
if (!f->loader().mixedContentChecker()->canRunInsecureContent(m_document->
securityOrigin
(), url))
450
if (top != f && !toLocalFrame(top)->loader().mixedContentChecker()->canRunInsecureContent(toLocalFrame(top)->document()->
securityOrigin
(), url))
456
if (!toLocalFrame(top)->loader().mixedContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->
securityOrigin
(), url))
458
if (MixedContentChecker::isMixedContent(toLocalFrame(top)->document()->
securityOrigin
(), url)) {
489
SecurityOrigin
*
securityOrigin
= options.
securityOrigin
.get();
490
if (!
securityOrigin
&& document())
491
securityOrigin
= document()->securityOrigin()
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentThreadableLoader.cpp
51
#include "platform/weborigin/
SecurityOrigin
.h"
77
, m_securityOrigin(m_resourceLoaderOptions.
securityOrigin
)
78
, m_sameOriginRequest(
securityOrigin
()->canRequest(request.url()))
122
updateRequestForAccessControl(crossOriginRequest,
securityOrigin
(), effectiveAllowCredentials());
134
if (CrossOriginPreflightResultCache::shared().canSkipPreflight(
securityOrigin
()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) {
137
ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest,
securityOrigin
());
210
&& (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(),
securityOrigin
(), accessControlErrorDescription));
220
RefPtr<
SecurityOrigin
> originalOrigin =
SecurityOrigin
::create(redirectResponse.url());
221
RefPtr<
SecurityOrigin
> requestOrigin = SecurityOrigin::create(request.url())
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/html/
HTMLCanvasElement.cpp
420
SecurityOrigin
* HTMLCanvasElement::
securityOrigin
() const
422
return document().
securityOrigin
();
699
bool HTMLCanvasElement::wouldTaintOrigin(
SecurityOrigin
*) const
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.cpp
58
#include "platform/weborigin/
SecurityOrigin
.h"
528
SecurityOrigin
* ContentSecurityPolicy::
securityOrigin
() const
530
return m_executionContext->securityContext().
securityOrigin
();
555
return document->
securityOrigin
()->canRequest(url) ? url.strippedForUseAsReferrer() :
SecurityOrigin
::create(url)->toString();
571
if (!
SecurityOrigin
::isSecure(document->url()) && document->loader())
[
all
...]
Completed in 544 milliseconds
1
2