OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:securityOrigin
(Results
101 - 125
of
163
) sorted by null
1
2
3
4
5
6
7
/external/chromium_org/third_party/WebKit/Source/modules/imagebitmap/
ImageBitmapFactories.cpp
108
if (!image->cachedImage()->passesAccessControlCheck(eventTarget.toDOMWindow()->document()->
securityOrigin
()) && eventTarget.toDOMWindow()->document()->
securityOrigin
()->taintsCanvas(image->src())) {
145
&& eventTarget.toDOMWindow()->document()->
securityOrigin
()->taintsCanvas(video->currentSrc())) {
/external/chromium_org/content/renderer/
notification_provider.cc
41
params.origin = GURL(document.
securityOrigin
().toString());
/external/chromium_org/third_party/WebKit/Source/core/css/
CSSImageSetValue.cpp
111
request.setCrossOriginAccessControl(loader->document()->
securityOrigin
(), options.allowCredentials, options.credentialsRequested);
StyleSheetContents.cpp
36
#include "platform/weborigin/
SecurityOrigin
.h"
139
// If the header is valid we are not going to need to check the
SecurityOrigin
.
319
void StyleSheetContents::parseAuthorStyleSheet(const CSSStyleSheetResource* cachedStyleSheet, const
SecurityOrigin
*
securityOrigin
)
337
bool isCrossOriginCSS = !
securityOrigin
|| !
securityOrigin
->canRequest(baseURL());
/external/chromium_org/third_party/WebKit/Source/core/css/resolver/
ScopedStyleResolver.cpp
68
AddRuleFlags addRuleFlags = resolver->document().
securityOrigin
()->canRequest(sheet->baseURL()) ? RuleHasDocumentSecurityOrigin : RuleHasNoSpecialState;
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.h
55
class
SecurityOrigin
;
166
SecurityOrigin
*
securityOrigin
() const;
/external/chromium_org/third_party/WebKit/Source/core/html/
HTMLAppletElement.cpp
38
#include "platform/weborigin/
SecurityOrigin
.h"
215
if (!document().
securityOrigin
()->canDisplay(url)) {
HTMLCanvasElement.h
126
SecurityOrigin
*
securityOrigin
() const;
149
virtual bool wouldTaintOrigin(
SecurityOrigin
*) const OVERRIDE;
HTMLLinkElement.cpp
508
styleSheet->parseAuthorStyleSheet(cachedStyleSheet, m_owner->document().
securityOrigin
());
642
if (!document().
securityOrigin
()->canDisplay(builder.url()))
686
request.setCrossOriginAccessControl(document().
securityOrigin
(), crossOriginMode);
HTMLAnchorElement.cpp
50
#include "platform/weborigin/
SecurityOrigin
.h"
386
bool isSameOrigin = completedURL.protocolIsData() || document().
securityOrigin
()->canRequest(completedURL);
549
if (!document.
securityOrigin
()->canDisplay(url))
HTMLFormElement.cpp
433
if (MixedContentChecker::isMixedContent(document().
securityOrigin
(), submission->action())) {
435
if (!document().frame()->loader().mixedContentChecker()->canSubmitToInsecureForm(document().
securityOrigin
(), submission->action()))
513
if (document().frame() && MixedContentChecker::isMixedContent(document().
securityOrigin
(), actionURL))
514
document().frame()->loader().mixedContentChecker()->canSubmitToInsecureForm(document().
securityOrigin
(), actionURL);
/external/chromium_org/third_party/WebKit/Source/core/workers/
WorkerGlobalScope.h
137
using SecurityContext::
securityOrigin
;
/external/chromium_org/third_party/WebKit/Source/modules/mediastream/
MediaStreamTrack.cpp
126
RefPtrWillBeRawPtr<MediaStreamTrackSourcesRequest> request = MediaStreamTrackSourcesRequestImpl::create(context->
securityOrigin
()->toString(), callback);
/external/chromium_org/third_party/WebKit/Source/core/dom/
DOMImplementation.cpp
57
#include "platform/weborigin/
SecurityOrigin
.h"
213
doc->setSecurityOrigin(document().
securityOrigin
()->isolatedCopy());
330
d->setSecurityOrigin(document().
securityOrigin
()->isolatedCopy());
ScriptLoader.cpp
48
#include "platform/weborigin/
SecurityOrigin
.h"
262
request.setCrossOriginAccessControl(elementDocument->
securityOrigin
(), crossOriginMode);
329
if (!m_isExternalScript || (sourceCode.resource() && sourceCode.resource()->passesAccessControlCheck(m_element->document().
securityOrigin
())))
Document.cpp
191
#include "platform/weborigin/
SecurityOrigin
.h"
316
static bool canAccessAncestor(const
SecurityOrigin
& activeSecurityOrigin, const Frame* targetFrame)
335
const
SecurityOrigin
* ancestorSecurityOrigin = ancestorDocument->
securityOrigin
();
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/loader/
FrameLoader.cpp
90
#include "platform/weborigin/
SecurityOrigin
.h"
314
else if (historyCommitType == InitialCommitInChildFrame && (!m_frame->tree().top()->isLocalFrame() || MixedContentChecker::isMixedContent(toLocalFrame(m_frame->tree().top())->document()->
securityOrigin
(), m_documentLoader->url())))
639
RefPtr<
SecurityOrigin
> referrerOrigin =
SecurityOrigin
::createFromString(referrer);
684
if (!request.originDocument()->
securityOrigin
()->canDisplay(url)) {
782
RefPtr<
SecurityOrigin
>
securityOrigin
=
SecurityOrigin
::createFromString(item->referrer().referrer);
783
FrameLoader::addHTTPOriginIfNeeded(request,
securityOrigin
->toAtomicString());
[
all
...]
NavigationScheduler.cpp
309
if (originDocument->
securityOrigin
()->canAccess(m_frame->document()->
securityOrigin
())) {
/external/chromium_org/third_party/WebKit/Source/core/page/
EventSource.cpp
53
#include "platform/weborigin/
SecurityOrigin
.h"
137
SecurityOrigin
* origin = executionContext.
securityOrigin
();
148
resourceLoaderOptions.
securityOrigin
= origin;
230
m_eventStreamOrigin =
SecurityOrigin
::create(response.url())->toString();
/external/chromium_org/third_party/WebKit/Source/modules/websockets/
NewWebSocketChannelImpl.cpp
49
#include "platform/weborigin/
SecurityOrigin
.h"
137
if (executionContext()->isDocument() && document()->frame() && !document()->frame()->loader().mixedContentChecker()->canConnectInsecureWebSocket(document()->
securityOrigin
(), url))
139
if (MixedContentChecker::isMixedContent(document()->
securityOrigin
(), url)) {
160
m_handle->connect(url, webProtocols, *executionContext()->
securityOrigin
(), this);
/external/chromium_org/third_party/WebKit/Source/bindings/v8/
V8WindowShell.cpp
58
#include "platform/weborigin/
SecurityOrigin
.h"
228
setSecurityToken(m_frame->document()->
securityOrigin
());
235
SecurityOrigin
* origin = m_world->isolatedWorldSecurityOrigin();
378
void V8WindowShell::setSecurityToken(
SecurityOrigin
* origin)
421
updateSecurityOrigin(m_frame->document()->
securityOrigin
());
493
void V8WindowShell::updateSecurityOrigin(
SecurityOrigin
* origin)
/external/chromium_org/chrome/renderer/extensions/
app_bindings.cc
127
if (frame->document().
securityOrigin
().isUnique())
/external/chromium_org/components/autofill/content/renderer/
password_generation_agent.cc
184
blink::WebSecurityOrigin origin = document.
securityOrigin
();
/external/chromium_org/third_party/WebKit/Source/core/fetch/
Resource.cpp
263
bool Resource::passesAccessControlCheck(
SecurityOrigin
*
securityOrigin
)
266
return passesAccessControlCheck(
securityOrigin
, ignoredErrorDescription);
269
bool Resource::passesAccessControlCheck(
SecurityOrigin
*
securityOrigin
, String& errorDescription)
271
return WebCore::passesAccessControlCheck(m_response, resourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials,
securityOrigin
, errorDescription);
/external/chromium_org/third_party/WebKit/Source/core/frame/
Location.cpp
40
#include "platform/weborigin/
SecurityOrigin
.h"
126
origins->append(toLocalFrame(frame)->document()->
securityOrigin
()->toString());
Completed in 632 milliseconds
1
2
3
4
5
6
7