OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:securityOrigin
(Results
76 - 100
of
163
) sorted by null
1
2
3
4
5
6
7
/external/chromium_org/third_party/WebKit/Source/core/loader/
DocumentThreadableLoader.h
51
class
SecurityOrigin
;
107
SecurityOrigin
*
securityOrigin
() const;
119
RefPtr<
SecurityOrigin
> m_securityOrigin;
PingLoader.cpp
49
#include "platform/weborigin/
SecurityOrigin
.h"
60
if (!frame->document()->
securityOrigin
()->canDisplay(url)) {
88
RefPtr<
SecurityOrigin
> pingOrigin =
SecurityOrigin
::create(pingURL);
91
if (frame->document()->
securityOrigin
()->isSameSchemeHostPort(pingOrigin.get()))
118
PingLoader::start(frame, request, initiatorInfo,
SecurityOrigin
::create(reportURL)->isSameSchemeHostPort(frame->document()->
securityOrigin
()) ? AllowStoredCredentials : DoNotAllowStoredCredentials);
LinkLoader.cpp
130
linkRequest.setCrossOriginAccessControl(document.
securityOrigin
(), crossOriginMode);
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DatabaseBackendBase.h
43
#include "platform/weborigin/
SecurityOrigin
.h"
52
class
SecurityOrigin
;
65
virtual
SecurityOrigin
*
securityOrigin
() const;
124
RefPtr<
SecurityOrigin
> m_contextThreadSecurityOrigin;
DatabaseManager.cpp
46
#include "platform/weborigin/
SecurityOrigin
.h"
177
context->
securityOrigin
()->toString().ascii().data());
226
DatabaseClient::from(context)->didOpenDatabase(database, context->
securityOrigin
()->host(), name, expectedVersion);
262
String DatabaseManager::fullPathForDatabase(
SecurityOrigin
* origin, const String& name, bool createIfDoesNotExist)
/external/chromium_org/third_party/WebKit/Source/core/fileapi/
FileReaderLoader.cpp
85
m_urlForReading = BlobURL::createPublicURL(executionContext.
securityOrigin
());
93
BlobRegistry::registerPublicBlobURL(executionContext.
securityOrigin
(), m_urlForReading, blobData);
96
BlobRegistry::registerStreamURL(executionContext.
securityOrigin
(), m_urlForReading, stream->url());
/external/chromium_org/third_party/WebKit/Source/core/xml/
XMLHttpRequest.cpp
160
PassRefPtrWillBeRawPtr<XMLHttpRequest> XMLHttpRequest::create(ExecutionContext* context, PassRefPtr<
SecurityOrigin
>
securityOrigin
)
162
RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = adoptRefWillBeRefCountedGarbageCollected(new XMLHttpRequest(context,
securityOrigin
));
168
XMLHttpRequest::XMLHttpRequest(ExecutionContext* context, PassRefPtr<
SecurityOrigin
>
securityOrigin
)
186
, m_securityOrigin(
securityOrigin
)
208
SecurityOrigin
* XMLHttpRequest::
securityOrigin
() const
210
return m_securityOrigin ? m_securityOrigin.get() : executionContext()->
securityOrigin
();
266
m_responseDocument->setSecurityOrigin(
securityOrigin
());
[
all
...]
XSLTProcessor.cpp
34
#include "platform/weborigin/
SecurityOrigin
.h"
88
result->updateSecurityOrigin(oldDocument->
securityOrigin
());
/external/chromium_org/third_party/WebKit/Source/core/frame/
LocalDOMWindow.cpp
103
#include "platform/weborigin/
SecurityOrigin
.h"
118
PostMessageTimer(LocalDOMWindow& window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtrWillBeRawPtr<LocalDOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels,
SecurityOrigin
* targetOrigin, PassRefPtrWillBeRawPtr<ScriptCallStack> stackTrace, UserGestureToken* userGestureToken)
136
SecurityOrigin
* targetOrigin() const { return m_targetOrigin.get(); }
155
RefPtr<
SecurityOrigin
> m_targetOrigin;
750
if (!document->
securityOrigin
()->canAccessLocalStorage()) {
772
OwnPtrWillBeRawPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->
securityOrigin
());
792
if (!document->
securityOrigin
()->canAccessLocalStorage()) {
815
OwnPtrWillBeRawPtr<StorageArea> storageArea = StorageNamespace::localStorageArea(document->
securityOrigin
());
834
RefPtr<
SecurityOrigin
> target;
838
target = sourceDocument->
securityOrigin
();
[
all
...]
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/
V8XMLHttpRequestCustom.cpp
58
RefPtr<
SecurityOrigin
>
securityOrigin
;
62
securityOrigin
= world.isolatedWorldSecurityOrigin();
65
RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context,
securityOrigin
);
/external/chromium_org/third_party/WebKit/Source/core/fetch/
ImageResource.cpp
468
bool ImageResource::isAccessAllowed(
SecurityOrigin
*
securityOrigin
)
472
if (passesAccessControlCheck(
securityOrigin
))
474
return !
securityOrigin
->taintsCanvas(response().url());
ResourceFetcher.cpp
65
#include "platform/weborigin/
SecurityOrigin
.h"
447
if (!f->loader().mixedContentChecker()->canRunInsecureContent(m_document->
securityOrigin
(), url))
450
if (top != f && !toLocalFrame(top)->loader().mixedContentChecker()->canRunInsecureContent(toLocalFrame(top)->document()->
securityOrigin
(), url))
456
if (!toLocalFrame(top)->loader().mixedContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->
securityOrigin
(), url))
458
if (MixedContentChecker::isMixedContent(toLocalFrame(top)->document()->
securityOrigin
(), url)) {
489
SecurityOrigin
*
securityOrigin
= options.
securityOrigin
.get();
490
if (!
securityOrigin
&& document())
491
securityOrigin
= document()->securityOrigin()
[
all
...]
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/
CSPSourceList.cpp
12
#include "platform/weborigin/
SecurityOrigin
.h"
50
KURL effectiveURL =
SecurityOrigin
::shouldUseInnerURL(url) ?
SecurityOrigin
::extractInnerURL(url) : url;
455
m_list.append(CSPSource(m_policy, m_policy->
securityOrigin
()->protocol(), m_policy->
securityOrigin
()->host(), m_policy->
securityOrigin
()->port(), String(), false, false));
/external/chromium_org/third_party/WebKit/Source/core/css/
CSSImageValue.cpp
68
request.setCrossOriginAccessControl(fetcher->document()->
securityOrigin
(), options.allowCredentials, options.credentialsRequested);
StyleRuleImport.cpp
86
m_styleSheet->parseAuthorStyleSheet(cachedStyleSheet, document ? document->
securityOrigin
() : 0);
/external/chromium_org/third_party/WebKit/Source/core/dom/
ExecutionContext.h
61
class
SecurityOrigin
;
75
SecurityOrigin
*
securityOrigin
() const;
/external/chromium_org/third_party/WebKit/Source/core/html/
HTMLPlugInElement.cpp
420
&& !document().
securityOrigin
()->canAccess(contentDocument()->
securityOrigin
()))
544
if (!document().
securityOrigin
()->canDisplay(url)) {
558
return frame->loader().mixedContentChecker()->canRunInsecureContent(document().
securityOrigin
(), url);
/external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorInspectorAgent.cpp
46
#include "platform/weborigin/
SecurityOrigin
.h"
74
String origin = frame->document()->
securityOrigin
()->toRawString();
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFileSystemBase.h
55
class
SecurityOrigin
;
88
SecurityOrigin
*
securityOrigin
() const;
DOMFileSystemBase.cpp
47
#include "platform/weborigin/
SecurityOrigin
.h"
79
SecurityOrigin
* DOMFileSystemBase::
securityOrigin
() const
81
return m_context->
securityOrigin
();
140
result.append(
securityOrigin
()->toString());
/external/chromium_org/third_party/WebKit/Source/web/
ContextFeaturesClientImpl.cpp
35
#include "platform/weborigin/
SecurityOrigin
.h"
117
String currentDomain = document->
securityOrigin
()->domain();
SpeechRecognitionClientProxy.cpp
35
#include "platform/weborigin/
SecurityOrigin
.h"
63
WebSpeechRecognitionParams params(webSpeechGrammars, lang, continuous, interimResults, maxAlternatives, WebSecurityOrigin(recognition->executionContext()->
securityOrigin
()));
WebDocument.cpp
56
#include "platform/weborigin/
SecurityOrigin
.h"
78
WebSecurityOrigin WebDocument::
securityOrigin
() const
82
return WebSecurityOrigin(constUnwrap<Document>()->
securityOrigin
());
/external/chromium_org/third_party/WebKit/public/web/
WebDocument.h
79
// Note: Security checks should use the
securityOrigin
(), not url().
80
BLINK_EXPORT WebSecurityOrigin
securityOrigin
() const;
/external/chromium_org/extensions/renderer/
script_context.cc
191
if (frame->document().
securityOrigin
().canAccess(
192
parent_document.
securityOrigin
()))
Completed in 886 milliseconds
1
2
3
4
5
6
7