/external/chromium_org/third_party/WebKit/Source/web/ |
WebStorageEventDispatcherImpl.cpp | 36 #include "platform/weborigin/SecurityOrigin.h" 49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); 51 key, oldValue, newValue, securityOrigin.get(), pageURL, 61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); 63 key, oldValue, newValue, securityOrigin.get(), pageURL,
|
WebGeolocationPermissionRequest.cpp | 31 #include "platform/weborigin/SecurityOrigin.h" 47 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const 49 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
WebMIDIPermissionRequest.cpp | 35 #include "platform/weborigin/SecurityOrigin.h" 50 WebSecurityOrigin WebMIDIPermissionRequest::securityOrigin() const 52 return WebSecurityOrigin(m_initializer->securityOrigin());
|
WebMediaDevicesRequest.cpp | 32 #include "platform/weborigin/SecurityOrigin.h" 52 WebSecurityOrigin WebMediaDevicesRequest::securityOrigin() const 55 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
WebUserMediaRequest.cpp | 39 #include "platform/weborigin/SecurityOrigin.h" 84 WebSecurityOrigin WebUserMediaRequest::securityOrigin() const 87 return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
|
WebDocument.cpp | 56 #include "platform/weborigin/SecurityOrigin.h" 76 WebSecurityOrigin WebDocument::securityOrigin() const 80 return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin());
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.h | 36 class SecurityOrigin; 42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } 50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 63 RefPtr<SecurityOrigin> m_securityOrigin;
|
ExecutionContext.cpp | 132 return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); 221 SecurityOrigin* ExecutionContext::securityOrigin() 223 return securityContext().securityOrigin(); 261 if (isSandboxed(SandboxOrigin) && securityContext().securityOrigin() && !securityContext().securityOrigin()->isUnique()) { 262 securityContext().setSecurityOrigin(SecurityOrigin::createUnique());
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
DeprecatedStorageQuota.cpp | 42 #include "platform/weborigin/SecurityOrigin.h" 65 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); 66 if (securityOrigin->isUnique()) { 71 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
StorageQuota.cpp | 42 #include "platform/weborigin/SecurityOrigin.h" 90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); 91 if (securityOrigin->isUnique()) { 96 KURL storagePartition = KURL(KURL(), securityOrigin->toString());
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
CSSFontFaceSrcValue.cpp | 101 bool CSSFontFaceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) 105 return !securityOrigin->canRequest(resource); 112 SecurityOrigin* securityOrigin = document->securityOrigin(); 113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { 114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials);
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
DatabaseContext.cpp | 38 #include "platform/weborigin/SecurityOrigin.h" 197 SecurityOrigin* DatabaseContext::securityOrigin() const 199 return executionContext()->securityOrigin();
|
Database.cpp | 211 m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy(); 220 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); 230 m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name); 718 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), 728 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), 738 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), 748 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), 758 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), 768 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/webmidi/ |
MIDIAccessInitializer.cpp | 88 SecurityOrigin* MIDIAccessInitializer::securityOrigin() const 90 return executionContext()->securityOrigin();
|
/external/chromium_org/third_party/WebKit/Source/bindings/core/v8/custom/ |
V8XMLHttpRequestCustom.cpp | 60 RefPtr<SecurityOrigin> securityOrigin; 64 securityOrigin = world.isolatedWorldSecurityOrigin(); 67 RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorDOMStorageAgent.cpp | 47 #include "platform/weborigin/SecurityOrigin.h" 181 PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) 184 .setSecurityOrigin(securityOrigin->toRawString()) 188 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) 193 RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage); 207 String securityOrigin; 209 bool success = storageId->getString("securityOrigin", &securityOrigin); [all...] |
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
MixedContentChecker.cpp | 42 #include "platform/weborigin/SecurityOrigin.h" 62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) 64 if (securityOrigin->protocol() != "https") 68 return !SecurityOrigin::isSecure(url); 224 // FIXME: We need a way to access the top-level frame's SecurityOrigin when that frame 240 if (!isMixedContent(frame->document()->securityOrigin(), url)) 245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin(); [all...] |
DocumentThreadableLoader.cpp | 53 #include "platform/weborigin/SecurityOrigin.h" 80 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin) 81 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) 131 updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials()); 144 bool canSkipPreflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), effectiveAllowCredentials(), m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields()); 148 ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin()); 251 && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessControlErrorDescription)); 261 RefPtr<SecurityOrigin> originalOrigin = SecurityOrigin::create(redirectResponse.url()); 262 RefPtr<SecurityOrigin> requestOrigin = SecurityOrigin::create(request.url()) [all...] |
/external/chromium_org/third_party/WebKit/Source/modules/credentialmanager/ |
CredentialsContainer.cpp | 17 #include "platform/weborigin/SecurityOrigin.h" 103 SecurityOrigin* securityOrigin = resolver->scriptState()->executionContext()->securityOrigin(); 105 if (!securityOrigin->canAccessFeatureRequiringSecureOrigin(errorMessage)) {
|
/external/chromium_org/third_party/WebKit/Source/core/timing/ |
Performance.cpp | 41 #include "platform/weborigin/SecurityOrigin.h" 163 RefPtr<SecurityOrigin> resourceOrigin = SecurityOrigin::create(response.url()); 164 if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin())) 174 const String& securityOrigin = requestingDocument->securityOrigin()->toString(); 178 if (timingAllowOrigins[i] == securityOrigin)
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
DOMFileSystemBase.cpp | 48 #include "platform/weborigin/SecurityOrigin.h" 83 SecurityOrigin* DOMFileSystemBase::securityOrigin() const 85 return m_context->securityOrigin(); 144 result.append(securityOrigin()->toString());
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
ResourceLoaderOptions.h | 36 #include "platform/weborigin/SecurityOrigin.h" 132 // securityOrigin has more complicated checks which callers are responsible for. 146 RefPtr<SecurityOrigin> securityOrigin; 161 , securityOrigin(options.securityOrigin) { } 175 options.securityOrigin = securityOrigin; 188 RefPtr<SecurityOrigin> securityOrigin; [all...] |
ResourceFetcher.cpp | 69 #include "platform/weborigin/SecurityOrigin.h" 444 SecurityOrigin* securityOrigin = options.securityOrigin.get(); 445 if (!securityOrigin && document()) 446 securityOrigin = document()->securityOrigin(); 448 if (originRestriction != FetchRequest::NoOriginRestriction && securityOrigin && !securityOrigin->canDisplay(url)) { 451 WTF_LOG(ResourceLoading, "ResourceFetcher::requestResource URL was not allowed by SecurityOrigin::canDisplay") [all...] |
/external/chromium_org/third_party/WebKit/Source/core/html/ |
HTMLCanvasElement.cpp | 448 SecurityOrigin* HTMLCanvasElement::securityOrigin() const 450 return document().securityOrigin(); 748 bool HTMLCanvasElement::wouldTaintOrigin(SecurityOrigin*) const
|
/external/chromium_org/third_party/WebKit/Source/core/frame/csp/ |
ContentSecurityPolicy.cpp | 59 #include "platform/weborigin/SecurityOrigin.h" 154 m_selfSource = adoptPtr(new CSPSource(this, securityOrigin()->protocol(), securityOrigin()->host(), securityOrigin()->port(), String(), CSPSource::NoWildcard, CSPSource::NoWildcard)); 264 RefPtr<SecurityOrigin> origin = SecurityOrigin::create(url); 575 SecurityOrigin* ContentSecurityPolicy::securityOrigin() const 577 return m_executionContext->securityContext().securityOrigin(); 601 return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString() [all...] |