HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 101 - 125 of 163) sorted by null

1 2 3 45 6 7

  /external/chromium_org/third_party/WebKit/Source/modules/imagebitmap/
ImageBitmapFactories.cpp 108 if (!image->cachedImage()->passesAccessControlCheck(eventTarget.toDOMWindow()->document()->securityOrigin()) && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(image->src())) {
145 && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(video->currentSrc())) {
  /external/chromium_org/content/renderer/
notification_provider.cc 41 params.origin = GURL(document.securityOrigin().toString());
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSImageSetValue.cpp 111 request.setCrossOriginAccessControl(loader->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested);
StyleSheetContents.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
139 // If the header is valid we are not going to need to check the SecurityOrigin.
319 void StyleSheetContents::parseAuthorStyleSheet(const CSSStyleSheetResource* cachedStyleSheet, const SecurityOrigin* securityOrigin)
337 bool isCrossOriginCSS = !securityOrigin || !securityOrigin->canRequest(baseURL());
  /external/chromium_org/third_party/WebKit/Source/core/css/resolver/
ScopedStyleResolver.cpp 68 AddRuleFlags addRuleFlags = resolver->document().securityOrigin()->canRequest(sheet->baseURL()) ? RuleHasDocumentSecurityOrigin : RuleHasNoSpecialState;
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.h 55 class SecurityOrigin;
166 SecurityOrigin* securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLAppletElement.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
215 if (!document().securityOrigin()->canDisplay(url)) {
HTMLCanvasElement.h 126 SecurityOrigin* securityOrigin() const;
149 virtual bool wouldTaintOrigin(SecurityOrigin*) const OVERRIDE;
HTMLLinkElement.cpp 508 styleSheet->parseAuthorStyleSheet(cachedStyleSheet, m_owner->document().securityOrigin());
642 if (!document().securityOrigin()->canDisplay(builder.url()))
686 request.setCrossOriginAccessControl(document().securityOrigin(), crossOriginMode);
HTMLAnchorElement.cpp 50 #include "platform/weborigin/SecurityOrigin.h"
386 bool isSameOrigin = completedURL.protocolIsData() || document().securityOrigin()->canRequest(completedURL);
549 if (!document.securityOrigin()->canDisplay(url))
HTMLFormElement.cpp 433 if (MixedContentChecker::isMixedContent(document().securityOrigin(), submission->action())) {
435 if (!document().frame()->loader().mixedContentChecker()->canSubmitToInsecureForm(document().securityOrigin(), submission->action()))
513 if (document().frame() && MixedContentChecker::isMixedContent(document().securityOrigin(), actionURL))
514 document().frame()->loader().mixedContentChecker()->canSubmitToInsecureForm(document().securityOrigin(), actionURL);
  /external/chromium_org/third_party/WebKit/Source/core/workers/
WorkerGlobalScope.h 137 using SecurityContext::securityOrigin;
  /external/chromium_org/third_party/WebKit/Source/modules/mediastream/
MediaStreamTrack.cpp 126 RefPtrWillBeRawPtr<MediaStreamTrackSourcesRequest> request = MediaStreamTrackSourcesRequestImpl::create(context->securityOrigin()->toString(), callback);
  /external/chromium_org/third_party/WebKit/Source/core/dom/
DOMImplementation.cpp 57 #include "platform/weborigin/SecurityOrigin.h"
213 doc->setSecurityOrigin(document().securityOrigin()->isolatedCopy());
330 d->setSecurityOrigin(document().securityOrigin()->isolatedCopy());
ScriptLoader.cpp 48 #include "platform/weborigin/SecurityOrigin.h"
262 request.setCrossOriginAccessControl(elementDocument->securityOrigin(), crossOriginMode);
329 if (!m_isExternalScript || (sourceCode.resource() && sourceCode.resource()->passesAccessControlCheck(m_element->document().securityOrigin())))
Document.cpp 191 #include "platform/weborigin/SecurityOrigin.h"
316 static bool canAccessAncestor(const SecurityOrigin& activeSecurityOrigin, const Frame* targetFrame)
335 const SecurityOrigin* ancestorSecurityOrigin = ancestorDocument->securityOrigin();
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/loader/
FrameLoader.cpp 90 #include "platform/weborigin/SecurityOrigin.h"
314 else if (historyCommitType == InitialCommitInChildFrame && (!m_frame->tree().top()->isLocalFrame() || MixedContentChecker::isMixedContent(toLocalFrame(m_frame->tree().top())->document()->securityOrigin(), m_documentLoader->url())))
639 RefPtr<SecurityOrigin> referrerOrigin = SecurityOrigin::createFromString(referrer);
684 if (!request.originDocument()->securityOrigin()->canDisplay(url)) {
782 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString(item->referrer().referrer);
783 FrameLoader::addHTTPOriginIfNeeded(request, securityOrigin->toAtomicString());
    [all...]
NavigationScheduler.cpp 309 if (originDocument->securityOrigin()->canAccess(m_frame->document()->securityOrigin())) {
  /external/chromium_org/third_party/WebKit/Source/core/page/
EventSource.cpp 53 #include "platform/weborigin/SecurityOrigin.h"
137 SecurityOrigin* origin = executionContext.securityOrigin();
148 resourceLoaderOptions.securityOrigin = origin;
230 m_eventStreamOrigin = SecurityOrigin::create(response.url())->toString();
  /external/chromium_org/third_party/WebKit/Source/modules/websockets/
NewWebSocketChannelImpl.cpp 49 #include "platform/weborigin/SecurityOrigin.h"
137 if (executionContext()->isDocument() && document()->frame() && !document()->frame()->loader().mixedContentChecker()->canConnectInsecureWebSocket(document()->securityOrigin(), url))
139 if (MixedContentChecker::isMixedContent(document()->securityOrigin(), url)) {
160 m_handle->connect(url, webProtocols, *executionContext()->securityOrigin(), this);
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
V8WindowShell.cpp 58 #include "platform/weborigin/SecurityOrigin.h"
228 setSecurityToken(m_frame->document()->securityOrigin());
235 SecurityOrigin* origin = m_world->isolatedWorldSecurityOrigin();
378 void V8WindowShell::setSecurityToken(SecurityOrigin* origin)
421 updateSecurityOrigin(m_frame->document()->securityOrigin());
493 void V8WindowShell::updateSecurityOrigin(SecurityOrigin* origin)
  /external/chromium_org/chrome/renderer/extensions/
app_bindings.cc 127 if (frame->document().securityOrigin().isUnique())
  /external/chromium_org/components/autofill/content/renderer/
password_generation_agent.cc 184 blink::WebSecurityOrigin origin = document.securityOrigin();
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
Resource.cpp 263 bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin)
266 return passesAccessControlCheck(securityOrigin, ignoredErrorDescription);
269 bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin, String& errorDescription)
271 return WebCore::passesAccessControlCheck(m_response, resourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials, securityOrigin, errorDescription);
  /external/chromium_org/third_party/WebKit/Source/core/frame/
Location.cpp 40 #include "platform/weborigin/SecurityOrigin.h"
126 origins->append(toLocalFrame(frame)->document()->securityOrigin()->toString());

Completed in 632 milliseconds

1 2 3 45 6 7