/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
SecurityOriginCache.h | 37 class SecurityOrigin; 42 virtual SecurityOrigin* cachedOrigin(const KURL&) = 0;
|
DatabaseIdentifier.h | 33 #include "platform/weborigin/SecurityOrigin.h" 38 PLATFORM_EXPORT PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String&); 39 PLATFORM_EXPORT String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin*);
|
SecurityPolicy.h | 39 class SecurityOrigin; 53 static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomain, bool allowDestinationSubdomains); 54 static void removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destinationProtocol, const String& destinationDomain, bool allowDestinationSubdomains); 57 static bool isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* targetOrigin); 58 static bool isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, const KURL&);
|
SecurityOrigin.cpp | 30 #include "platform/weborigin/SecurityOrigin.h" 58 static SecurityOrigin* cachedOrigin(const KURL& url) 65 bool SecurityOrigin::shouldUseInnerURL(const KURL& url) 78 KURL SecurityOrigin::extractInnerURL(const KURL& url) 87 void SecurityOrigin::setCache(SecurityOriginCache* originCache) 98 KURL innerURL = SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : url; 119 SecurityOrigin::SecurityOrigin(const KURL& url) 142 SecurityOrigin::SecurityOrigin( [all...] |
SecurityOrigin.h | 41 class PLATFORM_EXPORT SecurityOrigin : public ThreadSafeRefCounted<SecurityOrigin> { 49 static PassRefPtr<SecurityOrigin> create(const KURL&); 50 static PassRefPtr<SecurityOrigin> createUnique(); 52 static PassRefPtr<SecurityOrigin> createFromString(const String&); 53 static PassRefPtr<SecurityOrigin> create(const String& protocol, const String& host, int port); 70 // Create a deep copy of this SecurityOrigin. This method is useful 71 // when marshalling a SecurityOrigin to another thread. 72 PassRefPtr<SecurityOrigin> isolatedCopy() const; 90 // Returns true if this SecurityOrigin can script objects in the give [all...] |
SecurityOriginHash.h | 33 #include "platform/weborigin/SecurityOrigin.h" 39 static unsigned hash(SecurityOrigin* origin) 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) 53 static bool equal(SecurityOrigin* a, SecurityOrigin* b) 72 static bool equal(SecurityOrigin* a, const RefPtr<SecurityOrigin>& b) 76 static bool equal(const RefPtr<SecurityOrigin>& a, SecurityOrigin* b) 80 static bool equal(const RefPtr<SecurityOrigin>& a, const RefPtr<SecurityOrigin>& b [all...] |
DatabaseIdentifier.cpp | 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier) 51 return SecurityOrigin::createUnique(); 56 return SecurityOrigin::createUnique(); 61 return SecurityOrigin::createUnique(); 66 return SecurityOrigin::createUnique(); 73 return SecurityOrigin::createUnique(); 76 return SecurityOrigin::createUnique(); 85 return SecurityOrigin::createUnique(); 87 return SecurityOrigin::create(url); 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin [all...] |
SecurityOriginTest.cpp | 32 #include "platform/weborigin/SecurityOrigin.h" 37 using WebCore::SecurityOrigin; 48 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", "example.com", ports[i]); 58 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", "example.com", ports[i]); 129 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromString(inputs[i].url); 134 RefPtr<SecurityOrigin> uniqueOrigin = SecurityOrigin::createUnique() [all...] |
OriginAccessEntryTest.cpp | 35 #include "platform/weborigin/SecurityOrigin.h" 40 using WebCore::SecurityOrigin; 72 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromString("http://www.google.com");
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.h | 41 class SecurityOrigin; 48 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 50 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); 53 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 55 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution); 57 bool canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const 59 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::WebSocket) [all...] |
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.h | 36 class SecurityOrigin; 42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 63 RefPtr<SecurityOrigin> m_securityOrigin;
|
SecurityContext.cpp | 31 #include "platform/weborigin/SecurityOrigin.h" 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) 46 m_securityOrigin = securityOrigin; 63 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); 64 return securityOrigin()->canAccess(other.get());
|
/external/chromium_org/third_party/WebKit/Source/platform/exported/ |
WebSerializedOrigin.cpp | 8 #include "platform/weborigin/SecurityOrigin.h" 12 WebSerializedOrigin::WebSerializedOrigin(const WebCore::SecurityOrigin& origin)
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
StorageNamespace.h | 40 class SecurityOrigin; 48 static PassOwnPtrWillBeRawPtr<StorageArea> localStorageArea(SecurityOrigin*); 50 PassOwnPtrWillBeRawPtr<StorageArea> storageArea(SecurityOrigin*);
|
/external/chromium_org/third_party/WebKit/Source/core/html/ |
URLRegistry.h | 39 class SecurityOrigin; 52 virtual void registerURL(SecurityOrigin*, const KURL&, URLRegistrable*) = 0;
|
PublicURLManager.h | 39 class SecurityOrigin; 48 void registerURL(SecurityOrigin*, const KURL&, URLRegistrable*, const String& uuid = String());
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
BlobURL.h | 40 class SecurityOrigin; 51 static KURL createPublicURL(SecurityOrigin*);
|
BlobRegistry.h | 45 class SecurityOrigin; 54 static void registerPublicBlobURL(SecurityOrigin*, const KURL&, PassRefPtr<BlobDataHandle>); 59 static void registerStreamURL(SecurityOrigin*, const KURL&, const KURL& srcURL);
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
CrossOriginAccessControl.h | 44 class SecurityOrigin; 54 static bool handleRedirect(Resource*, SecurityOrigin*, ResourceRequest&, const ResourceResponse&, ResourceLoaderOptions&, String&); 62 void updateRequestForAccessControl(ResourceRequest&, SecurityOrigin*, StoredCredentials); 63 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest&, SecurityOrigin*); 65 bool passesAccessControlCheck(const ResourceResponse&, StoredCredentials, SecurityOrigin*, String& errorDescription);
|
/external/chromium_org/third_party/WebKit/Source/web/ |
WebStorageEventDispatcherImpl.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
WebSecurityOrigin.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 45 class WebSecurityOriginPrivate : public SecurityOrigin { 55 return WebSecurityOrigin(SecurityOrigin::createFromString(origin)); 60 return WebSecurityOrigin(SecurityOrigin::create(url)); 131 WebSecurityOrigin::WebSecurityOrigin(const WTF::PassRefPtr<WebCore::SecurityOrigin>& origin) 136 WebSecurityOrigin& WebSecurityOrigin::operator=(const WTF::PassRefPtr<WebCore::SecurityOrigin>& origin) 142 WebSecurityOrigin::operator WTF::PassRefPtr<WebCore::SecurityOrigin>() const 144 return PassRefPtr<SecurityOrigin>(const_cast<WebSecurityOriginPrivate*>(m_private)); 147 SecurityOrigin* WebSecurityOrigin::get() const
|
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/ |
CanvasImageSource.h | 35 class SecurityOrigin; 59 virtual bool wouldTaintOrigin(SecurityOrigin* destinationSecurityOrigin) const = 0;
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
AbstractDatabaseServer.h | 40 class SecurityOrigin; 44 virtual String fullPathForDatabase(SecurityOrigin*, const String& name, bool createIfDoesNotExist = true) = 0;
|
/external/chromium_org/third_party/WebKit/public/platform/ |
WebSerializedOrigin.h | 11 namespace WebCore { class SecurityOrigin; } 23 BLINK_PLATFORM_EXPORT WebSerializedOrigin(const WebCore::SecurityOrigin&);
|
/external/chromium_org/third_party/WebKit/public/web/ |
WebSecurityOrigin.h | 37 namespace WebCore { class SecurityOrigin; } 76 // SecurityOrigin. For example, call this function before allowing 78 // another SecurityOrigin. 103 WebSecurityOrigin(const WTF::PassRefPtr<WebCore::SecurityOrigin>&); 104 WebSecurityOrigin& operator=(const WTF::PassRefPtr<WebCore::SecurityOrigin>&); 105 operator WTF::PassRefPtr<WebCore::SecurityOrigin>() const; 106 WebCore::SecurityOrigin* get() const;
|