/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.h | 41 class SecurityOrigin; 48 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 50 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); 53 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const 55 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution); 57 bool canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const 59 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::WebSocket) [all...] |
MixedContentChecker.cpp | 37 #include "platform/weborigin/SecurityOrigin.h" 53 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) 55 if (securityOrigin->protocol() != "https") 59 return !SecurityOrigin::isSecure(url); 62 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const 64 if (!isMixedContent(securityOrigin, url)) 68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); 77 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) cons [all...] |
MixedContentCheckerTest.cpp | 9 #include "platform/weborigin/SecurityOrigin.h" 40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl)); 42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.cpp | 31 #include "platform/weborigin/SecurityOrigin.h" 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) 46 m_securityOrigin = securityOrigin; 63 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); 64 return securityOrigin()->canAccess(other.get());
|
SecurityContext.h | 36 class SecurityOrigin; 42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 63 RefPtr<SecurityOrigin> m_securityOrigin;
|
/external/chromium_org/third_party/WebKit/Source/web/ |
MediaKeysClientImpl.cpp | 26 WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); 27 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
|
WebGeolocationPermissionRequest.cpp | 31 #include "platform/weborigin/SecurityOrigin.h" 49 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const 51 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
WebMIDIPermissionRequest.cpp | 35 #include "platform/weborigin/SecurityOrigin.h" 50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const 52 return WebSecurityOrigin(m_initializer->securityOrigin());
|
WebStorageEventDispatcherImpl.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
NotificationPresenterImpl.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 48 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback) 50 , m_securityOrigin(securityOrigin) 66 RefPtr<SecurityOrigin> m_securityOrigin; 100 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); 106 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
BlobURL.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) 45 ASSERT(securityOrigin); 46 return createBlobURL(securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
IndexedDBModel.js | 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 161 this._removeOrigin(securityOrigin); 169 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 170 this._loadDatabaseNames(securityOrigin); 188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback); 196 var securityOrigin = /** @type {string} */ (event.data); 197 this._addOrigin(securityOrigin); 205 var securityOrigin = /** @type {string} */ (event.data); 206 this._removeOrigin(securityOrigin); 210 * @param {string} securityOrigin [all...] |
DOMStorage.js | 34 * @param {string} securityOrigin 37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage) 40 this._securityOrigin = securityOrigin; 45 * @param {string} securityOrigin 49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) 51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 70 get securityOrigin() 139 var securityOrigin = /** @type {string} */ (event.data); 140 var localStorageKey = this._storageKey(securityOrigin, true) [all...] |
FileSystemModel.js | 53 for (var securityOrigin in this._fileSystemsForOrigin) 54 this._removeOrigin(securityOrigin); 65 var securityOrigin = /** @type {string} */ (event.data); 66 this._addOrigin(securityOrigin); 74 var securityOrigin = /** @type {string} */ (event.data); 75 this._removeOrigin(securityOrigin); 79 * @param {string} securityOrigin 81 _addOrigin: function(securityOrigin) 83 this._fileSystemsForOrigin[securityOrigin] = {}; 87 this._requestFileSystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[i], this._fileSystemsForO (…) [all...] |
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
CrossOriginAccessControl.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 103 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) 108 if (securityOrigin) 109 request.setHTTPOrigin(securityOrigin->toAtomicString()); 112 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) 115 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 145 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription [all...] |
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
DatabaseIdentifier.cpp | 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier) 51 return SecurityOrigin::createUnique(); 56 return SecurityOrigin::createUnique(); 61 return SecurityOrigin::createUnique(); 66 return SecurityOrigin::createUnique(); 73 return SecurityOrigin::createUnique(); 76 return SecurityOrigin::createUnique(); 85 return SecurityOrigin::createUnique(); 87 return SecurityOrigin::create(url); 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
InspectorIndexedDBAgent.h | 56 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) OVERRIDE; 57 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) OVERRIDE; 58 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>) OVERRIDE;
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
CSSFontFaceSrcValue.cpp | 91 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) 95 return !securityOrigin->canRequest(resource); 102 SecurityOrigin* securityOrigin = document->securityOrigin(); 103 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { 104 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
|
/external/chromium_org/third_party/WebKit/Source/core/workers/ |
AbstractWorker.cpp | 38 #include "platform/weborigin/SecurityOrigin.h" 61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) { 62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
|
/external/chromium_org/chrome/renderer/ |
worker_permission_client_proxy.cc | 20 if (frame->document().securityOrigin().isUnique() || 21 frame->top()->document().securityOrigin().isUnique()) 24 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); 26 frame->top()->document().securityOrigin().toString());
|
/external/chromium_org/third_party/WebKit/public/web/ |
WebGeolocationPermissionRequest.h | 47 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
DOMWindowFileSystem.cpp | 39 #include "platform/weborigin/SecurityOrigin.h" 60 if (!document->securityOrigin()->canAccessFileSystem()) { 83 SecurityOrigin* securityOrigin = document->securityOrigin(); 85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
|
/external/chromium_org/android_webview/renderer/ |
aw_render_frame_ext.cc | 25 blink::WebSecurityOrigin origin = frame->document().securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
DeprecatedStorageQuota.cpp | 42 #include "platform/weborigin/SecurityOrigin.h" 66 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); 67 if (securityOrigin->isUnique()) { 72 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
StorageQuota.cpp | 43 #include "platform/weborigin/SecurityOrigin.h" 92 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); 93 if (securityOrigin->isUnique()) { 98 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|