HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 126 - 150 of 163) sorted by null

1 2 3 4 56 7

  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLFrameOwnerElement.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
229 if (!document().securityOrigin()->canDisplay(url)) {
HTMLCanvasElement.cpp 420 SecurityOrigin* HTMLCanvasElement::securityOrigin() const
422 return document().securityOrigin();
699 bool HTMLCanvasElement::wouldTaintOrigin(SecurityOrigin*) const
  /external/chromium_org/third_party/WebKit/Source/core/page/
DragController.cpp 75 #include "platform/weborigin/SecurityOrigin.h"
219 ClipboardAccessPolicy policy = (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal()) ? ClipboardReadable : ClipboardTypesReadable;
338 if (m_dragInitiator && !m_documentUnderMouse->securityOrigin()->canReceiveDragData(m_dragInitiator->securityOrigin()))
597 ClipboardAccessPolicy policy = m_documentUnderMouse->securityOrigin()->isLocal() ? ClipboardReadable : ClipboardTypesReadable;
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/xml/
XMLHttpRequest.h 36 #include "platform/weborigin/SecurityOrigin.h"
48 class SecurityOrigin;
66 static PassRefPtrWillBeRawPtr<XMLHttpRequest> create(ExecutionContext*, PassRefPtr<SecurityOrigin> = nullptr);
157 XMLHttpRequest(ExecutionContext*, PassRefPtr<SecurityOrigin>);
160 SecurityOrigin* securityOrigin() const;
271 RefPtr<SecurityOrigin> m_securityOrigin;
  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
Database.cpp 50 #include "platform/weborigin/SecurityOrigin.h"
233 SecurityOrigin* Database::securityOrigin() const
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/resources/
ResourcesPanel.js     [all...]
IndexedDBViews.js 82 this._securityOriginTreeElement.title = this._formatHeader(WebInspector.UIString("Security origin"), this._database.databaseId.securityOrigin);
  /external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentLoader.cpp 362 RefPtr<SecurityOrigin> redirectingOrigin = SecurityOrigin::create(redirectResponse.url());
381 if (top->isLocalFrame() && !toLocalFrame(top)->loader().mixedContentChecker()->canRunInsecureContent(toLocalFrame(top)->document()->securityOrigin(), newRequest.url())) {
804 document->setSecurityOrigin(ownerDocument->securityOrigin());
ImageLoader.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
192 request.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode);
  /external/chromium_org/third_party/WebKit/Source/web/
WebSharedWorkerImpl.cpp 56 #include "platform/weborigin/SecurityOrigin.h"
147 RefPtr<SecurityOrigin> origin =
148 SecurityOrigin::create(KURL(ParsedURLString, "http://localhost"));
356 WebSecurityOrigin webSecurityOrigin(m_loadingDocument->securityOrigin());
WebLocalFrameImpl.cpp 730 void WebLocalFrameImpl::setIsolatedWorldSecurityOrigin(int worldID, const WebSecurityOrigin& securityOrigin)
733 DOMWrapperWorld::setIsolatedWorldSecurityOrigin(worldID, securityOrigin.get());
780 return frame()->loader().mixedContentChecker()->canRunInsecureContent(frame()->document()->securityOrigin(), url);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.cpp 58 #include "platform/weborigin/SecurityOrigin.h"
528 SecurityOrigin* ContentSecurityPolicy::securityOrigin() const
530 return m_executionContext->securityContext().securityOrigin();
555 return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString();
571 if (!SecurityOrigin::isSecure(document->url()) && document->loader())
    [all...]
  /external/chromium_org/content/renderer/media/
peer_connection_tracker.cc 448 user_media_request.securityOrigin().toString().utf8(),
media_stream_impl.cc 144 security_origin = GURL(user_media_request.securityOrigin().toString());
215 security_origin = GURL(media_devices_request.securityOrigin().toString());
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSStyleSheet.cpp 43 #include "platform/weborigin/SecurityOrigin.h"
283 if (document->securityOrigin()->canRequest(baseURL))
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
ResourceLoader.cpp 347 if (!m_host->canAccessResource(resource, m_options.securityOrigin.get(), response.url())) {
  /external/chromium_org/third_party/WebKit/Source/core/rendering/shapes/
ShapeOutsideInfo.cpp 90 if (imageResource.isAccessAllowed(document.securityOrigin()))
  /external/chromium_org/third_party/WebKit/Source/modules/websockets/
WebSocketHandshake.cpp 45 #include "platform/weborigin/SecurityOrigin.h"
171 return m_document->securityOrigin()->toString();
MainThreadWebSocketChannel.cpp 98 if (m_document->frame() && !m_document->frame()->loader().mixedContentChecker()->canConnectInsecureWebSocket(m_document->securityOrigin(), url))
100 if (MixedContentChecker::isMixedContent(m_document->securityOrigin(), url)) {
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
InspectorFileSystemAgent.cpp 61 #include "platform/weborigin/SecurityOrigin.h"
160 KURL rootURL = DOMFileSystemBase::createFileSystemRootURL(executionContext->securityOrigin()->toString(), type);
629 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(origin).get());
641 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get());
653 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get());
665 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::createFromString(url).get());
681 ExecutionContext* executionContext = assertExecutionContextForOrigin(error, SecurityOrigin::create(url).get());
716 ExecutionContext* InspectorFileSystemAgent::assertExecutionContextForOrigin(ErrorString* error, SecurityOrigin* origin)
722 if (localFrame->document() && localFrame->document()->securityOrigin()->isSameSchemeHostPort(origin))
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
ScriptController.cpp 72 #include "platform/weborigin/SecurityOrigin.h"
135 void ScriptController::updateSecurityOrigin(SecurityOrigin* origin)
428 void ScriptController::collectIsolatedContexts(Vector<std::pair<ScriptState*, SecurityOrigin*> >& result)
432 SecurityOrigin* origin = isolatedWorldShell->world().isolatedWorldSecurityOrigin();
437 result.append(std::pair<ScriptState*, SecurityOrigin*>(isolatedWorldShell->scriptState(), origin));
486 ASSERT(m_frame->document()->securityOrigin()->isUnique());
  /external/chromium_org/third_party/WebKit/Source/modules/crypto/
SubtleCrypto.cpp 80 const SecurityOrigin* origin = scriptState->executionContext()->securityOrigin();
  /external/chromium_org/chrome/renderer/
chrome_content_renderer_client.cc 502 GetExtensionByOrigin(document.securityOrigin());
    [all...]
  /external/chromium_org/components/nacl/renderer/
ppb_nacl_private_impl.cc 219 if (document.securityOrigin().canRequest(gurl)) {
652 plugin_instance->GetContainer()->element().document().securityOrigin();
    [all...]
  /external/chromium_org/extensions/renderer/
dispatcher.cc 216 if (frame->document().securityOrigin().isUnique())
254 frame->document().securityOrigin());
    [all...]

Completed in 1104 milliseconds

1 2 3 4 56 7