HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 76 - 100 of 163) sorted by null

1 2 34 5 6 7

  /external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentThreadableLoader.h 51 class SecurityOrigin;
107 SecurityOrigin* securityOrigin() const;
119 RefPtr<SecurityOrigin> m_securityOrigin;
PingLoader.cpp 49 #include "platform/weborigin/SecurityOrigin.h"
60 if (!frame->document()->securityOrigin()->canDisplay(url)) {
88 RefPtr<SecurityOrigin> pingOrigin = SecurityOrigin::create(pingURL);
91 if (frame->document()->securityOrigin()->isSameSchemeHostPort(pingOrigin.get()))
118 PingLoader::start(frame, request, initiatorInfo, SecurityOrigin::create(reportURL)->isSameSchemeHostPort(frame->document()->securityOrigin()) ? AllowStoredCredentials : DoNotAllowStoredCredentials);
LinkLoader.cpp 130 linkRequest.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode);
  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DatabaseBackendBase.h 43 #include "platform/weborigin/SecurityOrigin.h"
52 class SecurityOrigin;
65 virtual SecurityOrigin* securityOrigin() const;
124 RefPtr<SecurityOrigin> m_contextThreadSecurityOrigin;
DatabaseManager.cpp 46 #include "platform/weborigin/SecurityOrigin.h"
177 context->securityOrigin()->toString().ascii().data());
226 DatabaseClient::from(context)->didOpenDatabase(database, context->securityOrigin()->host(), name, expectedVersion);
262 String DatabaseManager::fullPathForDatabase(SecurityOrigin* origin, const String& name, bool createIfDoesNotExist)
  /external/chromium_org/third_party/WebKit/Source/core/fileapi/
FileReaderLoader.cpp 85 m_urlForReading = BlobURL::createPublicURL(executionContext.securityOrigin());
93 BlobRegistry::registerPublicBlobURL(executionContext.securityOrigin(), m_urlForReading, blobData);
96 BlobRegistry::registerStreamURL(executionContext.securityOrigin(), m_urlForReading, stream->url());
  /external/chromium_org/third_party/WebKit/Source/core/xml/
XMLHttpRequest.cpp 160 PassRefPtrWillBeRawPtr<XMLHttpRequest> XMLHttpRequest::create(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin)
162 RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = adoptRefWillBeRefCountedGarbageCollected(new XMLHttpRequest(context, securityOrigin));
168 XMLHttpRequest::XMLHttpRequest(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin)
186 , m_securityOrigin(securityOrigin)
208 SecurityOrigin* XMLHttpRequest::securityOrigin() const
210 return m_securityOrigin ? m_securityOrigin.get() : executionContext()->securityOrigin();
266 m_responseDocument->setSecurityOrigin(securityOrigin());
    [all...]
XSLTProcessor.cpp 34 #include "platform/weborigin/SecurityOrigin.h"
88 result->updateSecurityOrigin(oldDocument->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/core/frame/
LocalDOMWindow.cpp 103 #include "platform/weborigin/SecurityOrigin.h"
118 PostMessageTimer(LocalDOMWindow& window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtrWillBeRawPtr<LocalDOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels, SecurityOrigin* targetOrigin, PassRefPtrWillBeRawPtr<ScriptCallStack> stackTrace, UserGestureToken* userGestureToken)
136 SecurityOrigin* targetOrigin() const { return m_targetOrigin.get(); }
155 RefPtr<SecurityOrigin> m_targetOrigin;
750 if (!document->securityOrigin()->canAccessLocalStorage()) {
772 OwnPtrWillBeRawPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin());
792 if (!document->securityOrigin()->canAccessLocalStorage()) {
815 OwnPtrWillBeRawPtr<StorageArea> storageArea = StorageNamespace::localStorageArea(document->securityOrigin());
834 RefPtr<SecurityOrigin> target;
838 target = sourceDocument->securityOrigin();
    [all...]
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/
V8XMLHttpRequestCustom.cpp 58 RefPtr<SecurityOrigin> securityOrigin;
62 securityOrigin = world.isolatedWorldSecurityOrigin();
65 RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
ImageResource.cpp 468 bool ImageResource::isAccessAllowed(SecurityOrigin* securityOrigin)
472 if (passesAccessControlCheck(securityOrigin))
474 return !securityOrigin->taintsCanvas(response().url());
ResourceFetcher.cpp 65 #include "platform/weborigin/SecurityOrigin.h"
447 if (!f->loader().mixedContentChecker()->canRunInsecureContent(m_document->securityOrigin(), url))
450 if (top != f && !toLocalFrame(top)->loader().mixedContentChecker()->canRunInsecureContent(toLocalFrame(top)->document()->securityOrigin(), url))
456 if (!toLocalFrame(top)->loader().mixedContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->securityOrigin(), url))
458 if (MixedContentChecker::isMixedContent(toLocalFrame(top)->document()->securityOrigin(), url)) {
489 SecurityOrigin* securityOrigin = options.securityOrigin.get();
490 if (!securityOrigin && document())
491 securityOrigin = document()->securityOrigin()
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
CSPSourceList.cpp 12 #include "platform/weborigin/SecurityOrigin.h"
50 KURL effectiveURL = SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : url;
455 m_list.append(CSPSource(m_policy, m_policy->securityOrigin()->protocol(), m_policy->securityOrigin()->host(), m_policy->securityOrigin()->port(), String(), false, false));
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSImageValue.cpp 68 request.setCrossOriginAccessControl(fetcher->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested);
StyleRuleImport.cpp 86 m_styleSheet->parseAuthorStyleSheet(cachedStyleSheet, document ? document->securityOrigin() : 0);
  /external/chromium_org/third_party/WebKit/Source/core/dom/
ExecutionContext.h 61 class SecurityOrigin;
75 SecurityOrigin* securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLPlugInElement.cpp 420 && !document().securityOrigin()->canAccess(contentDocument()->securityOrigin()))
544 if (!document().securityOrigin()->canDisplay(url)) {
558 return frame->loader().mixedContentChecker()->canRunInsecureContent(document().securityOrigin(), url);
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorInspectorAgent.cpp 46 #include "platform/weborigin/SecurityOrigin.h"
74 String origin = frame->document()->securityOrigin()->toRawString();
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFileSystemBase.h 55 class SecurityOrigin;
88 SecurityOrigin* securityOrigin() const;
DOMFileSystemBase.cpp 47 #include "platform/weborigin/SecurityOrigin.h"
79 SecurityOrigin* DOMFileSystemBase::securityOrigin() const
81 return m_context->securityOrigin();
140 result.append(securityOrigin()->toString());
  /external/chromium_org/third_party/WebKit/Source/web/
ContextFeaturesClientImpl.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
117 String currentDomain = document->securityOrigin()->domain();
SpeechRecognitionClientProxy.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
63 WebSpeechRecognitionParams params(webSpeechGrammars, lang, continuous, interimResults, maxAlternatives, WebSecurityOrigin(recognition->executionContext()->securityOrigin()));
WebDocument.cpp 56 #include "platform/weborigin/SecurityOrigin.h"
78 WebSecurityOrigin WebDocument::securityOrigin() const
82 return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin());
  /external/chromium_org/third_party/WebKit/public/web/
WebDocument.h 79 // Note: Security checks should use the securityOrigin(), not url().
80 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/extensions/renderer/
script_context.cc 191 if (frame->document().securityOrigin().canAccess(
192 parent_document.securityOrigin()))

Completed in 886 milliseconds

1 2 34 5 6 7