Searched refs:SECURITY_ERR (Results 1 – 15 of 15) sorted by relevance
54 ec = SECURITY_ERR; in Notification()75 ec = SECURITY_ERR; in Notification()
244 ec = SECURITY_ERR; in verifyProtocolHandlerScheme()276 ec = SECURITY_ERR; in verifyProtocolHandlerMimeType()
100 ec = SECURITY_ERR; in stateObjectAdded()
71 ec = SECURITY_ERR; in EventSource()
54 SECURITY_ERR = 18, enumerator
68 const unsigned short SECURITY_ERR = 18;
3224 ec = SECURITY_ERR; in cookie()3245 ec = SECURITY_ERR; in setCookie()3271 ec = SECURITY_ERR; in setDomain()3297 ec = SECURITY_ERR; in setDomain()3304 ec = SECURITY_ERR; in setDomain()3312 ec = SECURITY_ERR; in setDomain()
70 ec = SECURITY_ERR; in resolveURL()
262 ec = SECURITY_ERR; in openDatabase()
149 ec = SECURITY_ERR; in connect()
139 ec = SECURITY_ERR; in toDataURL()
319 ec = SECURITY_ERR; in open()
1297 ec = SECURITY_ERR; in getImageData()
18043 … (WebCore::XMLHttpRequest::open): Don't throw a SECURITY_ERR for cross-domain requests anymore.42492 Throw a SECURITY_ERR when accessing a tainted canvas42801 bug 12182 : XMLHttpRequest should raise SECURITY_ERR for same-origin policy violations42804 by DOM exception SECURITY_ERR. Updated XMLHttpRequest::open to raise SECURITY_ERR.42808 * dom/ExceptionCode.cpp: Added SECURITY_ERR exception.42811 (WebCore::XMLHttpRequest::open): Returns SECURITY_ERR now.67799 SECURITY_ERR.
25025 … * websockets/WebSocket.cpp: (WebCore::WebSocket::connect): Per the spec, raise a SECURITY_ERR54666 … Raise SECURITY_ERR exception if an attempt is made to change document.domain to an invalid value.56964 Canvas drawn with data URL image raises SECURITY_ERR when toDataUrl() called.