HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 26 - 50 of 163) sorted by null

12 3 4 5 6 7

  /external/chromium_org/third_party/WebKit/Source/core/loader/
TextTrackLoader.cpp 37 #include "platform/weborigin/SecurityOrigin.h"
85 void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url)
87 String consoleMessage("Text track from origin '" + SecurityOrigin::create(url)->toString() + "' has been blocked from loading: Not at same origin as the document, and parent of track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.");
114 cueRequest.setCrossOriginAccessControl(m_document.securityOrigin(), crossOriginMode);
115 } else if (!m_document.securityOrigin()->canRequest(url)) {
117 corsPolicyPreventedLoad(m_document.securityOrigin(), url);
DocumentThreadableLoader.cpp 51 #include "platform/weborigin/SecurityOrigin.h"
77 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin)
78 , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
122 updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials());
134 if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) {
137 ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin());
210 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription));
220 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url());
221 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url())
    [all...]
TextResourceDecoderBuilder.cpp 37 #include "platform/weborigin/SecurityOrigin.h"
43 return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin());
  /external/chromium_org/chrome/renderer/
content_settings_observer.cc 115 WebString top_origin = frame->top()->document().securityOrigin().toString();
251 DCHECK(frame->document().securityOrigin().toString() == "null" ||
259 if (frame->document().securityOrigin().isUnique() ||
260 frame->top()->document().securityOrigin().isUnique())
265 routing_id(), GURL(frame->document().securityOrigin().toString()),
266 GURL(frame->top()->document().securityOrigin().toString()),
274 if (frame->document().securityOrigin().isUnique() ||
275 frame->top()->document().securityOrigin().isUnique()) {
291 GURL(frame->document().securityOrigin().toString()),
292 GURL(frame->top()->document().securityOrigin().toString())))
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
WorkerGlobalScopeFileSystem.cpp 44 #include "platform/weborigin/SecurityOrigin.h"
51 if (!secureContext->securityOrigin()->canAccessFileSystem()) {
68 if (!secureContext->securityOrigin()->canAccessFileSystem()) {
91 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
108 if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
  /external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
IDBFactory.cpp 45 #include "platform/weborigin/SecurityOrigin.h"
83 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) {
95 blink::Platform::current()->idbFactory()->getDatabaseNames(WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin()));
119 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) {
133 blink::Platform::current()->idbFactory()->open(name, version, transactionId, WebIDBCallbacksImpl::create(request).leakPtr(), WebIDBDatabaseCallbacksImpl::create(databaseCallbacks).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin()));
153 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) {
165 blink::Platform::current()->idbFactory()->deleteDatabase(name, WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin()));
  /external/chromium_org/third_party/WebKit/Source/core/html/canvas/
CanvasRenderingContext.cpp 30 #include "platform/weborigin/SecurityOrigin.h"
52 bool taintOrigin = imageSource->wouldTaintOrigin(canvas()->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorDOMStorageAgent.cpp 47 #include "platform/weborigin/SecurityOrigin.h"
175 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage)
178 .setSecurityOrigin(securityOrigin->toRawString())
182 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin)
187 RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage);
201 String securityOrigin;
203 bool success = storageId->getString("securityOrigin", &securityOrigin);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
SQLTransactionClient.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
49 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()),
DOMWindowWebDatabase.cpp 39 #include "platform/weborigin/SecurityOrigin.h"
51 if (RuntimeEnabledFeatures::databaseEnabled() && window.document()->securityOrigin()->canAccessDatabase()) {
DatabaseContext.h 45 class SecurityOrigin;
74 SecurityOrigin* securityOrigin() const;
WorkerGlobalScopeWebDatabase.cpp 41 #include "platform/weborigin/SecurityOrigin.h"
50 if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) {
68 if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) {
  /external/chromium_org/third_party/WebKit/Source/web/
IndexedDBClientImpl.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
57 WebSecurityOrigin origin(context->securityOrigin());
WebDatabase.cpp 37 #include "platform/weborigin/SecurityOrigin.h"
64 WebSecurityOrigin WebDatabase::securityOrigin() const
67 return WebSecurityOrigin(m_database->securityOrigin());
WebMediaDevicesRequest.cpp 32 #include "platform/weborigin/SecurityOrigin.h"
59 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const
62 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
  /external/chromium_org/third_party/WebKit/public/web/
WebDatabase.h 48 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
WebMIDIPermissionRequest.h 53 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
WebMediaDevicesRequest.h 60 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/content/renderer/media/
midi_dispatcher.cc 39 WebSecurityOrigin security_origin = request.securityOrigin();
50 base::string16 origin = request.securityOrigin().toString();
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
BindingSecurity.cpp 40 #include "platform/weborigin/SecurityOrigin.h"
52 if (callingWindow->document()->securityOrigin()->canAccess(targetDocument->securityOrigin()))
  /external/chromium_org/third_party/WebKit/Source/core/dom/
DOMURL.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
79 KURL publicURL = BlobURL::createPublicURL(executionContext->securityOrigin());
83 executionContext->publicURLManager().registerURL(executionContext->securityOrigin(), publicURL, registrable, uuid);
  /external/chromium_org/third_party/WebKit/Source/core/storage/
StorageArea.cpp 41 #include "platform/weborigin/SecurityOrigin.h"
143 void StorageArea::dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
153 if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
156 InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin);
173 void StorageArea::dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
184 if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance)
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/workers/
SharedWorker.cpp 47 #include "platform/weborigin/SecurityOrigin.h"
75 if (!document->securityOrigin()->canAccessSharedWorkers()) {
76 exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->securityOrigin()->toString() + "'.");
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
ResourceTreeModel.js 143 this._addSecurityOrigin(frame.securityOrigin);
147 * @param {string} securityOrigin
149 _addSecurityOrigin: function(securityOrigin)
151 if (!this._securityOriginFrameCount[securityOrigin]) {
152 this._securityOriginFrameCount[securityOrigin] = 1;
153 this.dispatchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin);
156 this._securityOriginFrameCount[securityOrigin] += 1;
160 * @param {string|undefined} securityOrigin
162 _removeSecurityOrigin: function(securityOrigin)
164 if (typeof securityOrigin === "undefined"
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/frame/
History.cpp 40 #include "platform/weborigin/SecurityOrigin.h"
132 if (!fullURL.isValid() || !m_frame->document()->securityOrigin()->canRequest(fullURL)) {
134 exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'.");

Completed in 481 milliseconds

12 3 4 5 6 7