/external/webkit/Source/WebKit/gtk/webkit/ |
D | webkitsecurityorigin.cpp | 64 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); in G_DEFINE_TYPE() local 65 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; in G_DEFINE_TYPE() 75 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); in webkit_security_origin_dispose() local 76 WebKitSecurityOriginPrivate* priv = securityOrigin->priv; in webkit_security_origin_dispose() 89 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); in webkit_security_origin_set_property() local 93 webkit_security_origin_set_web_database_quota(securityOrigin, g_value_get_uint64(value)); in webkit_security_origin_set_property() 103 WebKitSecurityOrigin* securityOrigin = WEBKIT_SECURITY_ORIGIN(object); in webkit_security_origin_get_property() local 107 g_value_set_string(value, webkit_security_origin_get_protocol(securityOrigin)); in webkit_security_origin_get_property() 110 g_value_set_string(value, webkit_security_origin_get_host(securityOrigin)); in webkit_security_origin_get_property() 113 g_value_set_uint(value, webkit_security_origin_get_port(securityOrigin)); in webkit_security_origin_get_property() [all …]
|
D | webkitsecurityorigin.h | 57 webkit_security_origin_get_protocol (WebKitSecurityOrigin* securityOrigin); 60 webkit_security_origin_get_host (WebKitSecurityOrigin* securityOrigin); 63 webkit_security_origin_get_port (WebKitSecurityOrigin* securityOrigin); 66 webkit_security_origin_get_web_database_usage (WebKitSecurityOrigin* securityOrigin); 69 webkit_security_origin_get_web_database_quota (WebKitSecurityOrigin* securityOrigin); 72 webkit_security_origin_set_web_database_quota (WebKitSecurityOrigin* securityOrigin, guint64 quota); 75 webkit_security_origin_get_all_web_databases (WebKitSecurityOrigin* securityOrigin);
|
/external/webkit/Source/WebKit2/Shared/API/c/ |
D | WKSecurityOrigin.cpp | 41 …RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(identifier)->string()); in WKSecurityOriginCreateFromIdentifier() local 42 return toAPI(securityOrigin.release().leakRef()); in WKSecurityOriginCreateFromIdentifier() 47 …RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(protocol)->string(), t… in WKSecurityOriginCreate() local 48 return toAPI(securityOrigin.release().leakRef()); in WKSecurityOriginCreate() 51 WKStringRef WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin) in WKSecurityOriginGetProtocol() argument 53 return toCopiedAPI(toImpl(securityOrigin)->protocol()); in WKSecurityOriginGetProtocol() 56 WKStringRef WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin) in WKSecurityOriginGetHost() argument 58 return toCopiedAPI(toImpl(securityOrigin)->host()); in WKSecurityOriginGetHost() 61 unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin) in WKSecurityOriginGetPort() argument 63 return toImpl(securityOrigin)->port(); in WKSecurityOriginGetPort()
|
D | WKSecurityOrigin.h | 40 WK_EXPORT WKStringRef WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin); 41 WK_EXPORT WKStringRef WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin); 42 WK_EXPORT unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin);
|
/external/webkit/Source/WebKit2/Shared/ |
D | WebSecurityOrigin.h | 41 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromDatabaseIdenti… in create() local 42 if (!securityOrigin) in create() 44 return adoptRef(new WebSecurityOrigin(securityOrigin.release())); in create() 49 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(protocol, host, p… in create() local 50 if (!securityOrigin) in create() 52 return adoptRef(new WebSecurityOrigin(securityOrigin.release())); in create() 62 WebSecurityOrigin(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) in WebSecurityOrigin() argument 63 : m_securityOrigin(securityOrigin) in WebSecurityOrigin()
|
/external/webkit/Source/WebCore/loader/ |
D | NavigationScheduler.cpp | 97 …ScheduledURLNavigation(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url,… in ScheduledURLNavigation() argument 99 , m_securityOrigin(securityOrigin) in ScheduledURLNavigation() 127 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } in securityOrigin() function in WebCore::ScheduledURLNavigation 140 …ScheduledRedirect(double delay, PassRefPtr<SecurityOrigin> securityOrigin, const String& url, bool… in ScheduledRedirect() argument 141 …: ScheduledURLNavigation(delay, securityOrigin, url, String(), lockHistory, lockBackForwardList, f… in ScheduledRedirect() 151 …ScheduledLocationChange(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String… in ScheduledLocationChange() argument 152 …: ScheduledURLNavigation(0.0, securityOrigin, url, referrer, lockHistory, lockBackForwardList, dur… in ScheduledLocationChange() 157 …ScheduledRefresh(PassRefPtr<SecurityOrigin> securityOrigin, const String& url, const String& refer… in ScheduledRefresh() argument 158 : ScheduledURLNavigation(0.0, securityOrigin, url, referrer, true, true, false, true) in ScheduledRefresh() 165 …frame->loader()->changeLocation(securityOrigin(), KURL(ParsedURLString, url()), referrer(), lockHi… in fire() [all …]
|
D | CrossOriginAccessControl.cpp | 96 …ResourceResponse& response, bool includeCredentials, SecurityOrigin* securityOrigin, String& error… in passesAccessControlCheck() argument 104 if (securityOrigin->isUnique()) { in passesAccessControlCheck() 105 errorDescription = "Cannot make any requests from " + securityOrigin->toString() + "."; in passesAccessControlCheck() 111 if (!accessControlOrigin->isSameSchemeHostPort(securityOrigin)) { in passesAccessControlCheck() 113 … : "Origin " + securityOrigin->toString() + " is not allowed by Access-Control-Allow-Origin."; in passesAccessControlCheck()
|
D | DocumentThreadableLoader.cpp | 71 , m_sameOriginRequest(document->securityOrigin()->canRequest(request.url())) in DocumentThreadableLoader() 100 …if (CrossOriginPreflightResultCache::shared().canSkipPreflight(document->securityOrigin()->toStrin… in DocumentThreadableLoader() 119 crossOriginRequest.setHTTPOrigin(m_document->securityOrigin()->toString()); in makeSimpleCrossOriginAccessRequest() 128 preflightRequest.setHTTPOrigin(m_document->securityOrigin()->toString()); in makeCrossOriginAccessRequestWithPreflight() 209 …AccessControlCheck(response, m_options.allowCredentials, m_document->securityOrigin(), accessContr… in didReceiveResponse() 222 …CrossOriginPreflightResultCache::shared().appendEntry(m_document->securityOrigin()->toString(), m_… in didReceiveResponse() 225 …AccessControlCheck(response, m_options.allowCredentials, m_document->securityOrigin(), accessContr… in didReceiveResponse() 326 actualRequest->setHTTPOrigin(m_document->securityOrigin()->toString()); in preflightSuccess() 401 return m_sameOriginRequest && m_document->securityOrigin()->canRequest(url); in isAllowedRedirect()
|
D | SubframeLoader.cpp | 114 if (m_frame->document()->securityOrigin()->isSandboxed(SandboxPlugins)) in requestPlugin() 159 if (!m_frame->document()->securityOrigin()->canDisplay(completedURL)) { in loadMediaPlayerProxyPlugin() 173 … m_frame->loader()->checkIfRunInsecureContent(m_frame->document()->securityOrigin(), completedURL); in loadMediaPlayerProxyPlugin() 206 if (!element->document()->securityOrigin()->canDisplay(codeBaseURL)) { in createJavaAppletWidget() 230 …frame->navigationScheduler()->scheduleLocationChange(m_frame->document()->securityOrigin(), url.st… in loadOrRedirectSubframe() 248 if (!ownerElement->document()->securityOrigin()->canDisplay(url)) { in loadSubframe() 337 if (!document()->securityOrigin()->canDisplay(url)) { in loadPlugin() 343 frameLoader->checkIfRunInsecureContent(document()->securityOrigin(), url); in loadPlugin()
|
D | DocumentWriter.cpp | 54 …eturn parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->secur… in canReferToParentFrameEncoding() 70 begin(m_frame->document()->url(), true, m_frame->document()->securityOrigin()); in replaceDocument() 130 …achine()->isDisplayingInitialEmptyDocument() && m_frame->document()->securityOrigin()->isSecureTra… in begin() 145 m_frame->domWindow()->setSecurityOrigin(document->securityOrigin()); in begin()
|
/external/webkit/Source/WebKit/android/jni/ |
D | WebStorage.cpp | 78 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originS… in GetQuotaForOrigin() local 79 …unsigned long long quota = WebCore::DatabaseTracker::tracker().quotaForOrigin(securityOrigin.get()… in GetQuotaForOrigin() 86 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originS… in GetUsageForOrigin() local 87 …unsigned long long usage = WebCore::DatabaseTracker::tracker().usageForOrigin(securityOrigin.get()… in GetUsageForOrigin() 96 if (manifestOrigin->isSameSchemeHostPort(securityOrigin.get())) { in GetUsageForOrigin() 108 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originS… in SetQuotaForOrigin() local 109 WebCore::DatabaseTracker::tracker().setQuota(securityOrigin.get(), quota); in SetQuotaForOrigin() 115 …RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::createFromString(originS… in DeleteOrigin() local 116 WebCore::DatabaseTracker::tracker().deleteOrigin(securityOrigin.get()); in DeleteOrigin() 126 if (manifestOrigin->isSameSchemeHostPort(securityOrigin.get())) in DeleteOrigin()
|
/external/webkit/Source/WebKit/chromium/src/ |
D | StorageAreaProxy.cpp | 84 … storageEvent(key, oldValue, value, m_storageType, frame->document()->securityOrigin(), frame); in setItem() 93 … storageEvent(key, oldValue, String(), m_storageType, frame->document()->securityOrigin(), frame); in removeItem() 102 …storageEvent(String(), String(), String(), m_storageType, frame->document()->securityOrigin(), fra… in clear() 112 …ue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* source… in storageEvent() argument 124 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) in storageEvent() 140 … if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) in storageEvent()
|
D | StorageEventDispatcherImpl.cpp | 54 … const String& newValue, SecurityOrigin* securityOrigin, in dispatchStorageEvent() argument 69 if (frame->document()->securityOrigin()->equal(securityOrigin)) in dispatchStorageEvent()
|
D | WebDatabase.cpp | 50 SecurityOrigin* securityOrigin() const { return 0; } in securityOrigin() function in WebCore::AbstractDatabase 79 WebSecurityOrigin WebDatabase::securityOrigin() const in securityOrigin() function in WebKit::WebDatabase 82 return WebSecurityOrigin(m_database->securityOrigin()); in securityOrigin()
|
D | WebGeolocationPermissionRequest.cpp | 39 WebSecurityOrigin WebGeolocationPermissionRequest::securityOrigin() const in securityOrigin() function in WebKit::WebGeolocationPermissionRequest 41 return WebSecurityOrigin(m_private->frame()->document()->securityOrigin()); in securityOrigin()
|
/external/webkit/Source/WebKit2/UIProcess/ |
D | WebResourceCacheManagerProxy.cpp | 83 SecurityOriginData securityOrigin; in clearCacheForOrigin() local 84 securityOrigin.protocol = origin->protocol(); in clearCacheForOrigin() 85 securityOrigin.host = origin->host(); in clearCacheForOrigin() 86 securityOrigin.port = origin->port(); in clearCacheForOrigin() 88 …emIfNecessary(Messages::WebResourceCacheManager::ClearCacheForOrigin(securityOrigin, cachesToClear… in clearCacheForOrigin()
|
/external/webkit/Source/WebCore/storage/ |
D | StorageEventDispatcher.cpp | 41 …ue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Frame* source… in dispatch() argument 57 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) in dispatch() 73 … if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) in dispatch()
|
D | SQLTransactionClient.cpp | 46 database->securityOrigin(), database->stringIdentifier()); in didCommitWriteTransaction() 57 …ned long long currentQuota = DatabaseTracker::tracker().quotaForOrigin(database->securityOrigin()); in didExceedQuota() 59 …nsigned long long newQuota = DatabaseTracker::tracker().quotaForOrigin(database->securityOrigin()); in didExceedQuota()
|
D | IDBFactoryBackendImpl.cpp | 73 …name, PassRefPtr<IDBCallbacks> callbacks, PassRefPtr<SecurityOrigin> securityOrigin, Frame*, const… in open() argument 75 String fileIdentifier = securityOrigin->databaseIdentifier(); in open() 91 …backingStore = IDBSQLiteBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdentif… in open() 94 …backingStore = IDBLevelDBBackingStore::open(securityOrigin.get(), dataDir, maximumSize, fileIdenti… in open()
|
/external/webkit/Source/WebCore/storage/chromium/ |
D | DatabaseTrackerChromium.cpp | 81 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); in addOpenDatabase() 84 m_openDatabaseMap->set(database->securityOrigin(), nameMap); in addOpenDatabase() 129 DatabaseNameMap* nameMap = m_openDatabaseMap->get(database->securityOrigin()); in removeOpenDatabase() 140 m_openDatabaseMap->remove(database->securityOrigin()); in removeOpenDatabase() 172 database->securityOrigin()->databaseIdentifier(), in getMaxSizeForDatabase() 186 DatabaseNameMap* nameMap = m_openDatabaseMap->get(context->securityOrigin()); in interruptAllDatabasesForContext()
|
/external/webkit/Source/WebCore/fileapi/ |
D | BlobURL.cpp | 44 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) in createPublicURL() argument 46 ASSERT(securityOrigin); in createPublicURL() 47 return createBlobURL(securityOrigin->toString()); in createPublicURL()
|
/external/webkit/Source/WebKit/win/ |
D | WebSecurityOrigin.cpp | 43 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) in createInstance() argument 45 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); in createInstance() 50 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) in WebSecurityOrigin() argument 52 , m_securityOrigin(securityOrigin) in WebSecurityOrigin()
|
D | WebDatabaseManager.cpp | 247 …DatabaseTracker::tracker().databaseNamesForOrigin(webSecurityOrigin->securityOrigin(), databaseNam… in databasesWithOrigin() 273 webSecurityOrigin->securityOrigin()); in detailsForDatabase() 305 DatabaseTracker::tracker().deleteOrigin(webSecurityOrigin->securityOrigin()); in deleteOrigin() 327 …DatabaseTracker::tracker().deleteDatabase(webSecurityOrigin->securityOrigin(), String(databaseName… in deleteDatabase() 370 COMPtr<WebSecurityOrigin> securityOrigin(AdoptCOM, WebSecurityOrigin::createInstance(origin)); in dispatchDidModifyOrigin() local 371 notifyCenter->postNotificationName(databaseDidModifyOriginName, securityOrigin.get(), 0); in dispatchDidModifyOrigin() 399 COMPtr<WebSecurityOrigin> securityOrigin(AdoptCOM, WebSecurityOrigin::createInstance(origin)); in dispatchDidModifyDatabase() local 410 …notifyCenter->postNotificationName(databaseDidModifyOriginName, securityOrigin.get(), userInfoBag.… in dispatchDidModifyDatabase()
|
/external/webkit/Source/WebCore/workers/ |
D | WorkerContext.cpp | 295 if (!securityOrigin()->canAccessDatabase() || !AbstractDatabase::isAvailable()) { in openDatabase() 308 DatabaseTracker::tracker().setQuota(securityOrigin(), defaultQuota); in databaseExceededQuota() 314 if (!securityOrigin()->canAccessDatabase() || !AbstractDatabase::isAvailable()) { in openDatabaseSync() 355 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem() 372 if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystemSync() 391 …if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem() || !securityOrigin… in webkitResolveLocalFileSystemURL() 410 …if (!AsyncFileSystem::isAvailable() || !securityOrigin()->canAccessFileSystem() || !securityOrigin… in webkitResolveLocalFileSystemSyncURL()
|
/external/webkit/Source/WebCore/inspector/ |
D | InspectorDOMStorageResource.cpp | 64 …return equalIgnoringCase(m_frame->document()->securityOrigin()->host(), frame->document()->securit… in isSameHostAndType() 73 jsonObject->setString("host", m_frame->document()->securityOrigin()->host()); in bind()
|