HomeSort by relevance Sort by last modified time
    Searched refs:securityOrigin (Results 1 - 25 of 162) sorted by null

1 2 3 4 5 6 7

  /external/chromium_org/third_party/WebKit/Source/web/
MediaKeysClientImpl.cpp 24 WebSecurityOrigin securityOrigin(executionContext->securityOrigin());
25 return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
WebGeolocationPermissionRequest.cpp 31 #include "platform/weborigin/SecurityOrigin.h"
47 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const
49 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
WebMIDIPermissionRequest.cpp 35 #include "platform/weborigin/SecurityOrigin.h"
50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const
52 return WebSecurityOrigin(m_initializer->securityOrigin());
WebStorageEventDispatcherImpl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin);
51 key, oldValue, newValue, securityOrigin.get(), pageURL,
61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin);
63 key, oldValue, newValue, securityOrigin.get(), pageURL,
WebMediaDevicesRequest.cpp 32 #include "platform/weborigin/SecurityOrigin.h"
52 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const
55 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.cpp 31 #include "platform/weborigin/SecurityOrigin.h"
44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin)
46 m_securityOrigin = securityOrigin;
63 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url);
64 return securityOrigin()->canAccess(other.get());
SecurityContext.h 36 class SecurityOrigin;
42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>);
63 RefPtr<SecurityOrigin> m_securityOrigin;
  /external/chromium_org/third_party/WebKit/Source/platform/blob/
BlobURL.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin)
45 ASSERT(securityOrigin);
46 return createBlobURL(securityOrigin->toString());
  /external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
IndexedDBModel.js 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
161 this._removeOrigin(securityOrigin);
169 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
170 this._loadDatabaseNames(securityOrigin);
188 this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback);
196 var securityOrigin = /** @type {string} */ (event.data);
197 this._addOrigin(securityOrigin);
205 var securityOrigin = /** @type {string} */ (event.data);
206 this._removeOrigin(securityOrigin);
210 * @param {string} securityOrigin
    [all...]
DOMStorage.js 34 * @param {string} securityOrigin
37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage)
40 this._securityOrigin = securityOrigin;
45 * @param {string} securityOrigin
49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage)
51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
70 get securityOrigin()
139 var securityOrigin = /** @type {string} */ (event.data);
140 var localStorageKey = this._storageKey(securityOrigin, true)
    [all...]
FileSystemModel.js 53 for (var securityOrigin in this._fileSystemsForOrigin)
54 this._removeOrigin(securityOrigin);
65 var securityOrigin = /** @type {string} */ (event.data);
66 this._addOrigin(securityOrigin);
74 var securityOrigin = /** @type {string} */ (event.data);
75 this._removeOrigin(securityOrigin);
79 * @param {string} securityOrigin
81 _addOrigin: function(securityOrigin)
83 this._fileSystemsForOrigin[securityOrigin] = {};
87 this._requestFileSystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[i], this._fileSystemsForO (…)
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/fetch/
CrossOriginAccessControl.cpp 36 #include "platform/weborigin/SecurityOrigin.h"
64 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials)
69 if (securityOrigin)
70 request.setHTTPOrigin(securityOrigin->toAtomicString());
73 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin)
76 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
115 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription
    [all...]
ResourceLoaderOptions.h 36 #include "platform/weborigin/SecurityOrigin.h"
132 // securityOrigin has more complicated checks which callers are responsible for.
146 RefPtr<SecurityOrigin> securityOrigin;
161 , securityOrigin(options.securityOrigin) { }
175 options.securityOrigin = securityOrigin;
188 RefPtr<SecurityOrigin> securityOrigin;
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/loader/
MixedContentChecker.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url)
64 if (securityOrigin->protocol() != "https")
68 return !SecurityOrigin::isSecure(url);
224 // FIXME: We need a way to access the top-level frame's SecurityOrigin when that frame
240 if (!isMixedContent(frame->document()->securityOrigin(), url))
245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin();
    [all...]
MixedContentChecker.h 43 class SecurityOrigin;
53 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
55 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display);
58 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
60 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution);
63 bool canSubmitToInsecureForm(SecurityOrigin*, const KURL&) const;
64 bool canConnectInsecureWebSocket(SecurityOrigin*, const KURL&) const;
65 bool canFrameInsecureContent(SecurityOrigin*, const KURL&) const
    [all...]
MixedContentCheckerTest.cpp 9 #include "platform/weborigin/SecurityOrigin.h"
40 RefPtr<SecurityOrigin> securityOrigin(SecurityOrigin::create(originUrl));
42 EXPECT_EQ(expectation, MixedContentChecker::isMixedContent(securityOrigin.get(), targetUrl)) << "Origin: " << origin << ", Target: " << target << ", Expectation: " << expectation;
  /external/chromium_org/third_party/WebKit/Source/platform/weborigin/
DatabaseIdentifier.cpp 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentifier)
51 return SecurityOrigin::createUnique();
56 return SecurityOrigin::createUnique();
61 return SecurityOrigin::createUnique();
66 return SecurityOrigin::createUnique();
73 return SecurityOrigin::createUnique();
76 return SecurityOrigin::createUnique();
85 return SecurityOrigin::createUnique();
87 return SecurityOrigin::create(url);
90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin
    [all...]
  /external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
InspectorIndexedDBAgent.h 57 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtrWillBeRawPtr<RequestDatabaseNamesCallback>) OVERRIDE;
58 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtrWillBeRawPtr<RequestDatabaseCallback>) OVERRIDE;
59 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtrWillBeRawPtr<RequestDataCallback>) OVERRIDE;
  /external/chromium_org/third_party/WebKit/Source/core/css/
CSSFontFaceSrcValue.cpp 101 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin)
105 return !securityOrigin->canRequest(resource);
112 SecurityOrigin* securityOrigin = document->securityOrigin();
113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) {
114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
  /external/chromium_org/third_party/WebKit/Source/core/workers/
AbstractWorker.cpp 38 #include "platform/weborigin/SecurityOrigin.h"
61 if (!executionContext()->securityOrigin()->canRequest(scriptURL)) {
62 exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
  /external/chromium_org/chrome/renderer/
worker_permission_client_proxy.cc 20 if (frame->document().securityOrigin().isUnique() ||
21 frame->top()->document().securityOrigin().isUnique())
24 document_origin_url_ = GURL(frame->document().securityOrigin().toString());
26 frame->top()->document().securityOrigin().toString());
  /external/chromium_org/third_party/WebKit/Source/modules/quota/
DeprecatedStorageQuota.cpp 42 #include "platform/weborigin/SecurityOrigin.h"
65 SecurityOrigin* securityOrigin = executionContext->securityOrigin();
66 if (securityOrigin->isUnique()) {
71 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
  /external/chromium_org/third_party/WebKit/public/web/
WebGeolocationPermissionRequest.h 45 BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
  /external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DOMWindowFileSystem.cpp 39 #include "platform/weborigin/SecurityOrigin.h"
60 if (!document->securityOrigin()->canAccessFileSystem()) {
83 SecurityOrigin* securityOrigin = document->securityOrigin();
85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
  /external/chromium_org/android_webview/renderer/
aw_render_frame_ext.cc 26 blink::WebSecurityOrigin origin = frame->document().securityOrigin();

Completed in 392 milliseconds

1 2 3 4 5 6 7