HomeSort by relevance Sort by last modified time
    Searched defs:securityOrigin (Results 1 - 25 of 27) sorted by null

1 2

  /external/chromium_org/third_party/WebKit/Source/web/
WebStorageEventDispatcherImpl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin);
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin);
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
WebGeolocationPermissionRequest.cpp 31 #include "platform/weborigin/SecurityOrigin.h"
47 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const
49 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
WebMIDIPermissionRequest.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const
52 return WebSecurityOrigin(m_initializer->securityOrigin());
WebMediaDevicesRequest.cpp 32 #include "platform/weborigin/SecurityOrigin.h"
52 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const
55 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
WebUserMediaRequest.cpp 39 #include "platform/weborigin/SecurityOrigin.h"
84 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const
87 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
WebDocument.cpp 56 #include "platform/weborigin/SecurityOrigin.h"
76 WebSecurityOrigin WebDocument::securityOrigin() const
80 return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.h 36 class SecurityOrigin;
42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
63 RefPtr<SecurityOrigin> m_securityOrigin;
ExecutionContext.cpp 132 return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
221 SecurityOrigin* ExecutionContext::securityOrigin()
223 return securityContext().securityOrigin();
261 if (isSandboxed(SandboxOrigin) && securityContext().securityOrigin() && !securityContext().securityOrigin()->isUnique()) {
262 securityContext().setSecurityOrigin(SecurityOrigin::createUnique());
  /external/chromium_org/third_party/WebKit/Source/modules/quota/
DeprecatedStorageQuota.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
65 SecurityOrigin* securityOrigin = executionContext->securityOrigin();
66 if (securityOrigin->isUnique()) {
71 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
StorageQuota.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin();
91 if (securityOrigin->isUnique()) {
96 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSFontFaceSrcValue.cpp 101 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin)
105 return !securityOrigin->canRequest(resource);
112 SecurityOrigin* securityOrigin = document->securityOrigin();
113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) {
114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
  /external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DatabaseContext.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
197 SecurityOrigin* DatabaseContext::securityOrigin() const
199 return executionContext()->securityOrigin();
Database.cpp 211 m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy();
220 m_guid = guidForOriginAndName(securityOrigin()->toString(), name);
230 m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name);
718 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
728 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
738 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
748 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
758 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
768 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/webmidi/
MIDIAccessInitializer.cpp 88 SecurityOrigin* MIDIAccessInitializer::securityOrigin() const
90 return executionContext()->securityOrigin();
  /external/chromium_org/third_party/WebKit/Source/bindings/core/v8/custom/
V8XMLHttpRequestCustom.cpp 60 RefPtr<SecurityOrigin> securityOrigin;
64 securityOrigin = world.isolatedWorldSecurityOrigin();
67 RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorDOMStorageAgent.cpp 47 #include "platform/weborigin/SecurityOrigin.h"
181 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage)
184 .setSecurityOrigin(securityOrigin->toRawString())
188 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin)
193 RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage);
207 String securityOrigin;
209 bool success = storageId->getString("securityOrigin", &securityOrigin);
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/loader/
MixedContentChecker.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url)
64 if (securityOrigin->protocol() != "https")
68 return !SecurityOrigin::isSecure(url);
224 // FIXME: We need a way to access the top-level frame's SecurityOrigin when that frame
240 if (!isMixedContent(frame->document()->securityOrigin(), url))
245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin();
    [all...]
DocumentThreadableLoader.cpp 53 #include "platform/weborigin/SecurityOrigin.h"
80 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin)
81 , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
131 updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials());
144 bool canSkipPreflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields());
148 ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin());
251 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription));
261 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url());
262 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url())
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/credentialmanager/
CredentialsContainer.cpp 17 #include "platform/weborigin/SecurityOrigin.h"
103 SecurityOrigin* securityOrigin = resolver->scriptState()->executionContext()->securityOrigin();
105 if (!securityOrigin->canAccessFeatureRequiringSecureOrigin(errorMessage)) {
  /external/chromium_org/third_party/WebKit/Source/core/timing/
Performance.cpp 41 #include "platform/weborigin/SecurityOrigin.h"
163 RefPtr<SecurityOrigin> resourceOrigin = SecurityOrigin::create(response.url());
164 if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin()))
174 const String& securityOrigin = requestingDocument->securityOrigin()->toString();
178 if (timingAllowOrigins[i] == securityOrigin)
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMFileSystemBase.cpp 48 #include "platform/weborigin/SecurityOrigin.h"
83 SecurityOrigin* DOMFileSystemBase::securityOrigin() const
85 return m_context->securityOrigin();
144 result.append(securityOrigin()->toString());
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
ResourceLoaderOptions.h 36 #include "platform/weborigin/SecurityOrigin.h"
132 // securityOrigin has more complicated checks which callers are responsible for.
146 RefPtr<SecurityOrigin> securityOrigin;
161 , securityOrigin(options.securityOrigin) { }
175 options.securityOrigin = securityOrigin;
188 RefPtr<SecurityOrigin> securityOrigin;
    [all...]
ResourceFetcher.cpp 69 #include "platform/weborigin/SecurityOrigin.h"
444 SecurityOrigin* securityOrigin = options.securityOrigin.get();
445 if (!securityOrigin && document())
446 securityOrigin = document()->securityOrigin();
448 if (originRestriction != FetchRequest::NoOriginRestriction && securityOrigin && !securityOrigin->canDisplay(url)) {
451 WTF_LOG(ResourceLoading, "ResourceFetcher::requestResource URL was not allowed by SecurityOrigin::canDisplay")
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/html/
HTMLCanvasElement.cpp 448 SecurityOrigin* HTMLCanvasElement::securityOrigin() const
450 return document().securityOrigin();
748 bool HTMLCanvasElement::wouldTaintOrigin(SecurityOrigin*) const
  /external/chromium_org/third_party/WebKit/Source/core/frame/csp/
ContentSecurityPolicy.cpp 59 #include "platform/weborigin/SecurityOrigin.h"
154 m_selfSource = adoptPtr(new CSPSource(this, securityOrigin()->protocol(), securityOrigin()->host(), securityOrigin()->port(), String(), CSPSource::NoWildcard, CSPSource::NoWildcard));
264 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(url);
575 SecurityOrigin* ContentSecurityPolicy::securityOrigin() const
577 return m_executionContext->securityContext().securityOrigin();
601 return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString()
    [all...]

Completed in 385 milliseconds

1 2