HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 1 - 25 of 163) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/third_party/WebKit/Source/core/loader/
MixedContentChecker.h 41 class SecurityOrigin;
48 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
50 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display);
53 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
55 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution);
57 bool canConnectInsecureWebSocket(SecurityOrigin* securityOrigin, const KURL& url) const
59 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::WebSocket)
    [all...]
MixedContentChecker.cpp 37 #include "platform/weborigin/SecurityOrigin.h"
53 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url)
55 if (securityOrigin->protocol() != "https")
59 return !SecurityOrigin::isSecure(url);
62 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) const
64 if (!isMixedContent(securityOrigin, url))
68 bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
77 bool MixedContentChecker::canRunInsecureContentInternal(SecurityOrigin* securityOrigin, const KURL& url, const MixedContentType type) cons
    [all...]
MixedContentCheckerTest.cpp 9 #include "platform/weborigin/SecurityOrigin.h"
40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl));
42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.cpp 31 #include "platform/weborigin/SecurityOrigin.h"
44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin)
46 m_securityOrigin = securityOrigin;
63 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url);
64 return securityOrigin()->canAccess(other.get());
SecurityContext.h 36 class SecurityOrigin;
42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
63 RefPtr<SecurityOrigin> m_securityOrigin;
  /external/chromium_org/third_party/WebKit/Source/web/
MediaKeysClientImpl.cpp 26 WebSecurityOrigin securityOrigin(executionContext->securityOrigin());
27 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
WebGeolocationPermissionRequest.cpp 31 #include "platform/weborigin/SecurityOrigin.h"
49 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const
51 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
WebMIDIPermissionRequest.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const
52 return WebSecurityOrigin(m_initializer->securityOrigin());
WebStorageEventDispatcherImpl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
NotificationPresenterImpl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
48 NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback)
50 , m_securityOrigin(securityOrigin)
66 RefPtr<SecurityOrigin> m_securityOrigin;
100 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin()));
106 m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
  /external/chromium_org/third_party/WebKit/Source/platform/blob/
BlobURL.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin)
45 ASSERT(securityOrigin);
46 return createBlobURL(securityOrigin->toString());
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
IndexedDBModel.js 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
161 this._removeOrigin(securityOrigin);
169 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
170 this._loadDatabaseNames(securityOrigin);
188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback);
196 var securityOrigin = /** @type {string} */ (event.data);
197 this._addOrigin(securityOrigin);
205 var securityOrigin = /** @type {string} */ (event.data);
206 this._removeOrigin(securityOrigin);
210 * @param {string} securityOrigin
    [all...]
DOMStorage.js 34 * @param {string} securityOrigin
37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage)
40 this._securityOrigin = securityOrigin;
45 * @param {string} securityOrigin
49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage)
51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
70 get securityOrigin()
139 var securityOrigin = /** @type {string} */ (event.data);
140 var localStorageKey = this._storageKey(securityOrigin, true)
    [all...]
FileSystemModel.js 53 for (var securityOrigin in this._fileSystemsForOrigin)
54 this._removeOrigin(securityOrigin);
65 var securityOrigin = /** @type {string} */ (event.data);
66 this._addOrigin(securityOrigin);
74 var securityOrigin = /** @type {string} */ (event.data);
75 this._removeOrigin(securityOrigin);
79 * @param {string} securityOrigin
81 _addOrigin: function(securityOrigin)
83 this._fileSystemsForOrigin[securityOrigin] = {};
87 this._requestFileSystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[i], this._fileSystemsForO (…)
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
CrossOriginAccessControl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
103 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials)
108 if (securityOrigin)
109 request.setHTTPOrigin(securityOrigin->toAtomicString());
112 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin)
115 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
145 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription
    [all...]
  /external/chromium_org/third_party/WebKit/Source/platform/weborigin/
DatabaseIdentifier.cpp 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier)
51 return SecurityOrigin::createUnique();
56 return SecurityOrigin::createUnique();
61 return SecurityOrigin::createUnique();
66 return SecurityOrigin::createUnique();
73 return SecurityOrigin::createUnique();
76 return SecurityOrigin::createUnique();
85 return SecurityOrigin::createUnique();
87 return SecurityOrigin::create(url);
90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
InspectorIndexedDBAgent.h 56 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) OVERRIDE;
57 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) OVERRIDE;
58 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>) OVERRIDE;
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSFontFaceSrcValue.cpp 91 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin)
95 return !securityOrigin->canRequest(resource);
102 SecurityOrigin* securityOrigin = document->securityOrigin();
103 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) {
104 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
  /external/chromium_org/third_party/WebKit/Source/core/workers/
AbstractWorker.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) {
62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
  /external/chromium_org/chrome/renderer/
worker_permission_client_proxy.cc 20 if (frame->document().securityOrigin().isUnique() ||
21 frame->top()->document().securityOrigin().isUnique())
24 document_origin_url_ = GURL(frame->document().securityOrigin().toString());
26 frame->top()->document().securityOrigin().toString());
  /external/chromium_org/third_party/WebKit/public/web/
WebGeolocationPermissionRequest.h 47 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMWindowFileSystem.cpp 39 #include "platform/weborigin/SecurityOrigin.h"
60 if (!document->securityOrigin()->canAccessFileSystem()) {
83 SecurityOrigin* securityOrigin = document->securityOrigin();
85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
  /external/chromium_org/android_webview/renderer/
aw_render_frame_ext.cc 25 blink::WebSecurityOrigin origin = frame->document().securityOrigin();
  /external/chromium_org/third_party/WebKit/Source/modules/quota/
DeprecatedStorageQuota.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
66 SecurityOrigin* securityOrigin = executionContext->securityOrigin();
67 if (securityOrigin->isUnique()) {
72 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
StorageQuota.cpp 43 #include "platform/weborigin/SecurityOrigin.h"
92 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin();
93 if (securityOrigin->isUnique()) {
98 KURL storagePartition = KURL(KURL(), securityOrigin->toString());

Completed in 244 milliseconds

1 2 3 4 5 6 7