/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLFrameOwnerElement.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 229 if (!document().securityOrigin()->canDisplay(url)) {
|
HTMLCanvasElement.cpp | 420 SecurityOrigin* HTMLCanvasElement::securityOrigin() const 422 return document().securityOrigin(); 699 bool HTMLCanvasElement::wouldTaintOrigin(SecurityOrigin*) const
|
/external/chromium_org/third_party/WebKit/Source/core/page/ |
DragController.cpp | 75 #include "platform/weborigin/SecurityOrigin.h" 219 ClipboardAccessPolicy policy = (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal()) ? ClipboardReadable : ClipboardTypesReadable; 338 if (m_dragInitiator && !m_documentUnderMouse->securityOrigin()->canReceiveDragData(m_dragInitiator->securityOrigin())) 597 ClipboardAccessPolicy policy = m_documentUnderMouse->securityOrigin()->isLocal() ? ClipboardReadable : ClipboardTypesReadable; [all...] |
/external/chromium_org/third_party/WebKit/Source/core/xml/ |
XMLHttpRequest.h | 36 #include "platform/weborigin/SecurityOrigin.h" 48 class SecurityOrigin; 66 static PassRefPtrWillBeRawPtr<XMLHttpRequest> create(ExecutionContext*, PassRefPtr<SecurityOrigin> = nullptr); 157 XMLHttpRequest(ExecutionContext*, PassRefPtr<SecurityOrigin>); 160 SecurityOrigin* securityOrigin() const; 271 RefPtr<SecurityOrigin> m_securityOrigin;
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
Database.cpp | 50 #include "platform/weborigin/SecurityOrigin.h" 233 SecurityOrigin* Database::securityOrigin() const
|
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/resources/ |
ResourcesPanel.js | [all...] |
IndexedDBViews.js | 82 this._securityOriginTreeElement.title = this._formatHeader(WebInspector.UIString("Security origin"), this._database.databaseId.securityOrigin);
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
DocumentLoader.cpp | 362 RefPtr<SecurityOrigin> redirectingOrigin = SecurityOrigin::create(redirectResponse.url()); 381 if (top->isLocalFrame() && !toLocalFrame(top)->loader().mixedContentChecker()->canRunInsecureContent(toLocalFrame(top)->document()->securityOrigin(), newRequest.url())) { 804 document->setSecurityOrigin(ownerDocument->securityOrigin());
|
ImageLoader.cpp | 42 #include "platform/weborigin/SecurityOrigin.h" 192 request.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode);
|
/external/chromium_org/third_party/WebKit/Source/web/ |
WebSharedWorkerImpl.cpp | 56 #include "platform/weborigin/SecurityOrigin.h" 147 RefPtr<SecurityOrigin> origin = 148 SecurityOrigin::create(KURL(ParsedURLString, "http://localhost")); 356 WebSecurityOrigin webSecurityOrigin(m_loadingDocument->securityOrigin());
|
WebLocalFrameImpl.cpp | 730 void WebLocalFrameImpl::setIsolatedWorldSecurityOrigin(int worldID, const WebSecurityOrigin& securityOrigin) 733 DOMWrapperWorld::setIsolatedWorldSecurityOrigin(worldID, securityOrigin.get()); 780 return frame()->loader().mixedContentChecker()->canRunInsecureContent(frame()->document()->securityOrigin(), url); [all...] |
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/ |
ContentSecurityPolicy.cpp | 58 #include "platform/weborigin/SecurityOrigin.h" 528 SecurityOrigin* ContentSecurityPolicy::securityOrigin() const 530 return m_executionContext->securityContext().securityOrigin(); 555 return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString(); 571 if (!SecurityOrigin::isSecure(document->url()) && document->loader()) [all...] |
/external/chromium_org/content/renderer/media/ |
peer_connection_tracker.cc | 448 user_media_request.securityOrigin().toString().utf8(),
|
media_stream_impl.cc | 144 security_origin = GURL(user_media_request.securityOrigin().toString()); 215 security_origin = GURL(media_devices_request.securityOrigin().toString()); [all...] |
/external/chromium_org/third_party/WebKit/Source/core/css/ |
CSSStyleSheet.cpp | 43 #include "platform/weborigin/SecurityOrigin.h" 283 if (document->securityOrigin()->canRequest(baseURL))
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
ResourceLoader.cpp | 347 if (!m_host->canAccessResource(resource, m_options.securityOrigin.get(), response.url())) {
|
/external/chromium_org/third_party/WebKit/Source/core/rendering/shapes/ |
ShapeOutsideInfo.cpp | 90 if (imageResource.isAccessAllowed(document.securityOrigin()))
|
/external/chromium_org/third_party/WebKit/Source/modules/websockets/ |
WebSocketHandshake.cpp | 45 #include "platform/weborigin/SecurityOrigin.h" 171 return m_document->securityOrigin()->toString();
|
MainThreadWebSocketChannel.cpp | 98 if (m_document->frame() && !m_document->frame()->loader().mixedContentChecker()->canConnectInsecureWebSocket(m_document->securityOrigin(), url)) 100 if (MixedContentChecker::isMixedContent(m_document->securityOrigin(), url)) { [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
InspectorFileSystemAgent.cpp | 61 #include "platform/weborigin/SecurityOrigin.h" 160 KURL rootURL = DOMFileSystemBase::createFileSystemRootURL(executionContext->securityOrigin()->toString(), type); 629 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(origin).get()); 641 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get()); 653 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get()); 665 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get()); 681 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::create(url).get()); 716 ExecutionContext* InspectorFileSystemAgent::assertExecutionContextForOrigin(ErrorString* error, SecurityOrigin* origin) 722 if (localFrame->document() && localFrame->document()->securityOrigin()->isSameSchemeHostPort(origin))
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
ScriptController.cpp | 72 #include "platform/weborigin/SecurityOrigin.h" 135 void ScriptController::updateSecurityOrigin(SecurityOrigin* origin) 428 void ScriptController::collectIsolatedContexts(Vector<std::pair<ScriptState*, SecurityOrigin*> >& result) 432 SecurityOrigin* origin = isolatedWorldShell->world().isolatedWorldSecurityOrigin(); 437 result.append(std::pair<ScriptState*, SecurityOrigin*>(isolatedWorldShell->scriptState(), origin)); 486 ASSERT(m_frame->document()->securityOrigin()->isUnique());
|
/external/chromium_org/third_party/WebKit/Source/modules/crypto/ |
SubtleCrypto.cpp | 80 const SecurityOrigin* origin = scriptState->executionContext()->securityOrigin();
|
/external/chromium_org/chrome/renderer/ |
chrome_content_renderer_client.cc | 502 GetExtensionByOrigin(document.securityOrigin()); [all...] |
/external/chromium_org/components/nacl/renderer/ |
ppb_nacl_private_impl.cc | 219 if (document.securityOrigin().canRequest(gurl)) { 652 plugin_instance->GetContainer()->element().document().securityOrigin(); [all...] |
/external/chromium_org/extensions/renderer/ |
dispatcher.cc | 216 if (frame->document().securityOrigin().isUnique()) 254 frame->document().securityOrigin()); [all...] |