OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:securityOrigin
(Results
26 - 50
of
163
) sorted by null
1
2
3
4
5
6
7
/external/chromium_org/third_party/WebKit/Source/core/loader/
TextTrackLoader.cpp
37
#include "platform/weborigin/
SecurityOrigin
.h"
85
void TextTrackLoader::corsPolicyPreventedLoad(
SecurityOrigin
*
securityOrigin
, const KURL& url)
87
String consoleMessage("Text track from origin '" +
SecurityOrigin
::create(url)->toString() + "' has been blocked from loading: Not at same origin as the document, and parent of track element does not have a 'crossorigin' attribute. Origin '" +
securityOrigin
->toString() + "' is therefore not allowed access.");
114
cueRequest.setCrossOriginAccessControl(m_document.
securityOrigin
(), crossOriginMode);
115
} else if (!m_document.
securityOrigin
()->canRequest(url)) {
117
corsPolicyPreventedLoad(m_document.
securityOrigin
(), url);
DocumentThreadableLoader.cpp
51
#include "platform/weborigin/
SecurityOrigin
.h"
77
, m_securityOrigin(m_resourceLoaderOptions.
securityOrigin
)
78
, m_sameOriginRequest(
securityOrigin
()->canRequest(request.url()))
122
updateRequestForAccessControl(crossOriginRequest,
securityOrigin
(), effectiveAllowCredentials());
134
if (CrossOriginPreflightResultCache::shared().canSkipPreflight(
securityOrigin
()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) {
137
ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest,
securityOrigin
());
210
&& (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(),
securityOrigin
(), accessControlErrorDescription));
220
RefPtr<
SecurityOrigin
> originalOrigin =
SecurityOrigin
::create(redirectResponse.url());
221
RefPtr<
SecurityOrigin
> requestOrigin = SecurityOrigin::create(request.url())
[
all
...]
TextResourceDecoderBuilder.cpp
37
#include "platform/weborigin/
SecurityOrigin
.h"
43
return parentFrame && parentFrame->document()->
securityOrigin
()->canAccess(frame->document()->
securityOrigin
());
/external/chromium_org/chrome/renderer/
content_settings_observer.cc
115
WebString top_origin = frame->top()->document().
securityOrigin
().toString();
251
DCHECK(frame->document().
securityOrigin
().toString() == "null" ||
259
if (frame->document().
securityOrigin
().isUnique() ||
260
frame->top()->document().
securityOrigin
().isUnique())
265
routing_id(), GURL(frame->document().
securityOrigin
().toString()),
266
GURL(frame->top()->document().
securityOrigin
().toString()),
274
if (frame->document().
securityOrigin
().isUnique() ||
275
frame->top()->document().
securityOrigin
().isUnique()) {
291
GURL(frame->document().
securityOrigin
().toString()),
292
GURL(frame->top()->document().
securityOrigin
().toString())))
[
all
...]
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
WorkerGlobalScopeFileSystem.cpp
44
#include "platform/weborigin/
SecurityOrigin
.h"
51
if (!secureContext->
securityOrigin
()->canAccessFileSystem()) {
68
if (!secureContext->
securityOrigin
()->canAccessFileSystem()) {
91
if (!secureContext->
securityOrigin
()->canAccessFileSystem() || !secureContext->
securityOrigin
()->canRequest(completedURL)) {
108
if (!secureContext->
securityOrigin
()->canAccessFileSystem() || !secureContext->
securityOrigin
()->canRequest(completedURL)) {
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
IDBFactory.cpp
45
#include "platform/weborigin/
SecurityOrigin
.h"
83
if (!scriptState->executionContext()->
securityOrigin
()->canAccessDatabase()) {
95
blink::Platform::current()->idbFactory()->getDatabaseNames(WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->
securityOrigin
()));
119
if (!scriptState->executionContext()->
securityOrigin
()->canAccessDatabase()) {
133
blink::Platform::current()->idbFactory()->open(name, version, transactionId, WebIDBCallbacksImpl::create(request).leakPtr(), WebIDBDatabaseCallbacksImpl::create(databaseCallbacks).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->
securityOrigin
()));
153
if (!scriptState->executionContext()->
securityOrigin
()->canAccessDatabase()) {
165
blink::Platform::current()->idbFactory()->deleteDatabase(name, WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->
securityOrigin
()));
/external/chromium_org/third_party/WebKit/Source/core/html/canvas/
CanvasRenderingContext.cpp
30
#include "platform/weborigin/
SecurityOrigin
.h"
52
bool taintOrigin = imageSource->wouldTaintOrigin(canvas()->
securityOrigin
());
/external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorDOMStorageAgent.cpp
47
#include "platform/weborigin/
SecurityOrigin
.h"
175
PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(
SecurityOrigin
*
securityOrigin
, bool isLocalStorage)
178
.setSecurityOrigin(
securityOrigin
->toRawString())
182
void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType,
SecurityOrigin
*
securityOrigin
)
187
RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(
securityOrigin
, storageType == LocalStorage);
201
String
securityOrigin
;
203
bool success = storageId->getString("
securityOrigin
", &
securityOrigin
);
[
all
...]
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
SQLTransactionClient.cpp
38
#include "platform/weborigin/
SecurityOrigin
.h"
49
createDatabaseIdentifierFromSecurityOrigin(database->
securityOrigin
()),
DOMWindowWebDatabase.cpp
39
#include "platform/weborigin/
SecurityOrigin
.h"
51
if (RuntimeEnabledFeatures::databaseEnabled() && window.document()->
securityOrigin
()->canAccessDatabase()) {
DatabaseContext.h
45
class
SecurityOrigin
;
74
SecurityOrigin
*
securityOrigin
() const;
WorkerGlobalScopeWebDatabase.cpp
41
#include "platform/weborigin/
SecurityOrigin
.h"
50
if (RuntimeEnabledFeatures::databaseEnabled() && context.
securityOrigin
()->canAccessDatabase()) {
68
if (RuntimeEnabledFeatures::databaseEnabled() && context.
securityOrigin
()->canAccessDatabase()) {
/external/chromium_org/third_party/WebKit/Source/web/
IndexedDBClientImpl.cpp
35
#include "platform/weborigin/
SecurityOrigin
.h"
57
WebSecurityOrigin origin(context->
securityOrigin
());
WebDatabase.cpp
37
#include "platform/weborigin/
SecurityOrigin
.h"
64
WebSecurityOrigin WebDatabase::
securityOrigin
() const
67
return WebSecurityOrigin(m_database->
securityOrigin
());
WebMediaDevicesRequest.cpp
32
#include "platform/weborigin/
SecurityOrigin
.h"
59
WebSecurityOrigin WebMediaDevicesRequest::
securityOrigin
() const
62
return WebSecurityOrigin(m_private->executionContext()->
securityOrigin
());
/external/chromium_org/third_party/WebKit/public/web/
WebDatabase.h
48
BLINK_EXPORT WebSecurityOrigin
securityOrigin
() const;
WebMIDIPermissionRequest.h
53
BLINK_EXPORT WebSecurityOrigin
securityOrigin
() const;
WebMediaDevicesRequest.h
60
BLINK_EXPORT WebSecurityOrigin
securityOrigin
() const;
/external/chromium_org/content/renderer/media/
midi_dispatcher.cc
39
WebSecurityOrigin security_origin = request.
securityOrigin
();
50
base::string16 origin = request.
securityOrigin
().toString();
/external/chromium_org/third_party/WebKit/Source/bindings/v8/
BindingSecurity.cpp
40
#include "platform/weborigin/
SecurityOrigin
.h"
52
if (callingWindow->document()->
securityOrigin
()->canAccess(targetDocument->
securityOrigin
()))
/external/chromium_org/third_party/WebKit/Source/core/dom/
DOMURL.cpp
38
#include "platform/weborigin/
SecurityOrigin
.h"
79
KURL publicURL = BlobURL::createPublicURL(executionContext->
securityOrigin
());
83
executionContext->publicURLManager().registerURL(executionContext->
securityOrigin
(), publicURL, registrable, uuid);
/external/chromium_org/third_party/WebKit/Source/core/storage/
StorageArea.cpp
41
#include "platform/weborigin/
SecurityOrigin
.h"
143
void StorageArea::dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue,
SecurityOrigin
*
securityOrigin
, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
153
if (storage && toLocalFrame(frame)->document()->
securityOrigin
()->canAccess(
securityOrigin
) && !isEventSource(storage, sourceAreaInstance))
156
InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage,
securityOrigin
);
173
void StorageArea::dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue,
SecurityOrigin
*
securityOrigin
, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
184
if (storage && toLocalFrame(frame)->document()->
securityOrigin
()->canAccess(
securityOrigin
) && !isEventSource(storage, sourceAreaInstance)
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/workers/
SharedWorker.cpp
47
#include "platform/weborigin/
SecurityOrigin
.h"
75
if (!document->
securityOrigin
()->canAccessSharedWorkers()) {
76
exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->
securityOrigin
()->toString() + "'.");
/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
ResourceTreeModel.js
143
this._addSecurityOrigin(frame.
securityOrigin
);
147
* @param {string}
securityOrigin
149
_addSecurityOrigin: function(
securityOrigin
)
151
if (!this._securityOriginFrameCount[
securityOrigin
]) {
152
this._securityOriginFrameCount[
securityOrigin
] = 1;
153
this.dispatchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded,
securityOrigin
);
156
this._securityOriginFrameCount[
securityOrigin
] += 1;
160
* @param {string|undefined}
securityOrigin
162
_removeSecurityOrigin: function(
securityOrigin
)
164
if (typeof
securityOrigin
=== "undefined"
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/frame/
History.cpp
40
#include "platform/weborigin/
SecurityOrigin
.h"
132
if (!fullURL.isValid() || !m_frame->document()->
securityOrigin
()->canRequest(fullURL)) {
134
exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->
securityOrigin
()->toString() + "'.");
Completed in 481 milliseconds
1
2
3
4
5
6
7