/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
D | SecurityOrigin.cpp | 57 static SecurityOrigin* cachedOrigin(const KURL& url) in cachedOrigin() 64 bool SecurityOrigin::shouldUseInnerURL(const KURL& url) in shouldUseInnerURL() 77 KURL SecurityOrigin::extractInnerURL(const KURL& url) in extractInnerURL() 86 void SecurityOrigin::setCache(SecurityOriginCache* originCache) in setCache() 97 …KURL innerURL = SecurityOrigin::shouldUseInnerURL(url) ? SecurityOrigin::extractInnerURL(url) : ur… in shouldTreatAsUniqueOrigin() 118 SecurityOrigin::SecurityOrigin(const KURL& url) in SecurityOrigin() function in WebCore::SecurityOrigin 141 SecurityOrigin::SecurityOrigin() in SecurityOrigin() function in WebCore::SecurityOrigin 155 SecurityOrigin::SecurityOrigin(const SecurityOrigin* other) in SecurityOrigin() function in WebCore::SecurityOrigin 170 PassRefPtr<SecurityOrigin> SecurityOrigin::create(const KURL& url) in create() 172 if (RefPtr<SecurityOrigin> origin = cachedOrigin(url)) in create() [all …]
|
D | SecurityOrigin.h | 41 class PLATFORM_EXPORT SecurityOrigin : public ThreadSafeRefCounted<SecurityOrigin> { 49 static PassRefPtr<SecurityOrigin> create(const KURL&); 50 static PassRefPtr<SecurityOrigin> createUnique(); 52 static PassRefPtr<SecurityOrigin> createFromString(const String&); 53 static PassRefPtr<SecurityOrigin> create(const String& protocol, const String& host, int port); 72 PassRefPtr<SecurityOrigin> isolatedCopy() const; 94 bool canAccess(const SecurityOrigin*) const; 109 bool canReceiveDragData(const SecurityOrigin* dragInitiator) const; 191 bool equal(const SecurityOrigin*) const; 195 bool isSameSchemeHostPort(const SecurityOrigin*) const; [all …]
|
D | SecurityOriginHash.h | 39 static unsigned hash(SecurityOrigin* origin) in hash() 48 static unsigned hash(const RefPtr<SecurityOrigin>& origin) in hash() 53 static bool equal(SecurityOrigin* a, SecurityOrigin* b) in equal() 63 static bool equal(SecurityOrigin* a, const RefPtr<SecurityOrigin>& b) in equal() 67 static bool equal(const RefPtr<SecurityOrigin>& a, SecurityOrigin* b) in equal() 71 static bool equal(const RefPtr<SecurityOrigin>& a, const RefPtr<SecurityOrigin>& b) in equal() 85 template<> struct DefaultHash<RefPtr<WebCore::SecurityOrigin> > {
|
D | DatabaseIdentifier.cpp | 48 PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String& databaseIdentif… in createSecurityOriginFromDatabaseIdentifier() 51 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 56 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 61 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 66 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 73 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 76 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 85 return SecurityOrigin::createUnique(); in createSecurityOriginFromDatabaseIdentifier() 87 return SecurityOrigin::create(url); in createSecurityOriginFromDatabaseIdentifier() 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) in createDatabaseIdentifierFromSecurityOrigin()
|
D | SecurityPolicy.h | 39 class SecurityOrigin; variable 53 …static void addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& destin… 54 …static void removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String& des… 57 …static bool isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* targetOr… 58 static bool isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, const KURL&);
|
D | SecurityOriginTest.cpp | 37 using WebCore::SecurityOrigin; 48 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", "example.com", ports[i]); in TEST() 58 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", "example.com", ports[i]); in TEST()
|
D | DatabaseIdentifierTest.cpp | 40 using WebCore::SecurityOrigin; 70 …RefPtr<SecurityOrigin> origin = SecurityOrigin::create(cases[i].protocol, cases[i].host, cases[i].… in TEST() 192 RefPtr<SecurityOrigin> origin = SecurityOrigin::create("http", cases[i].hostname, 80); in TEST() 196 … RefPtr<SecurityOrigin> parsedOrigin = createSecurityOriginFromDatabaseIdentifier(identifier); in TEST() 229 …RefPtr<SecurityOrigin> origin = createSecurityOriginFromDatabaseIdentifier(validCases[i].identifie… in TEST() 255 … RefPtr<SecurityOrigin> origin = createSecurityOriginFromDatabaseIdentifier(bogusIdentifiers[i]); in TEST()
|
D | SecurityPolicy.cpp | 79 String origin = SecurityOrigin::createFromString(referrer)->toString(); in generateReferrerHeader() 93 bool SecurityPolicy::isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* … in isAccessWhiteListed() 104 bool SecurityPolicy::isAccessToURLWhiteListed(const SecurityOrigin* activeOrigin, const KURL& url) in isAccessToURLWhiteListed() 106 RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url); in isAccessToURLWhiteListed() 110 void SecurityPolicy::addOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const String… in addOriginAccessWhitelistEntry() 126 void SecurityPolicy::removeOriginAccessWhitelistEntry(const SecurityOrigin& sourceOrigin, const Str… in removeOriginAccessWhitelistEntry()
|
D | OriginAccessEntryTest.cpp | 40 using WebCore::SecurityOrigin; 72 RefPtr<SecurityOrigin> origin = SecurityOrigin::createFromString("http://www.google.com"); in TEST()
|
D | DatabaseIdentifier.h | 38 PLATFORM_EXPORT PassRefPtr<SecurityOrigin> createSecurityOriginFromDatabaseIdentifier(const String&… 39 PLATFORM_EXPORT String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin*);
|
D | SecurityOriginCache.h | 37 class SecurityOrigin; variable 42 virtual SecurityOrigin* cachedOrigin(const KURL&) = 0;
|
/external/chromium_org/third_party/WebKit/Source/web/ |
D | WebSecurityOrigin.cpp | 45 class WebSecurityOriginPrivate : public SecurityOrigin { 55 return WebSecurityOrigin(SecurityOrigin::createFromString(origin)); in createFromString() 60 return WebSecurityOrigin(SecurityOrigin::create(url)); in create() 131 WebSecurityOrigin::WebSecurityOrigin(const WTF::PassRefPtr<WebCore::SecurityOrigin>& origin) in WebSecurityOrigin() 136 WebSecurityOrigin& WebSecurityOrigin::operator=(const WTF::PassRefPtr<WebCore::SecurityOrigin>& ori… in operator =() 142 WebSecurityOrigin::operator WTF::PassRefPtr<WebCore::SecurityOrigin>() const in operator WTF::PassRefPtr<WebCore::SecurityOrigin>() 144 return PassRefPtr<SecurityOrigin>(const_cast<WebSecurityOriginPrivate*>(m_private)); in operator WTF::PassRefPtr<WebCore::SecurityOrigin>() 147 SecurityOrigin* WebSecurityOrigin::get() const in get()
|
D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchLocalStorageEvent() 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchSessionStorageEvent()
|
/external/chromium_org/third_party/WebKit/Source/modules/notifications/ |
D | NotificationCenter.cpp | 65 case SecurityOrigin::AlwaysAllow: in checkPermission() 67 case SecurityOrigin::AlwaysDeny: in checkPermission() 69 case SecurityOrigin::Ask: in checkPermission() 83 case SecurityOrigin::AlwaysAllow: in requestPermission() 84 case SecurityOrigin::AlwaysDeny: { in requestPermission() 88 case SecurityOrigin::Ask: in requestPermission()
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
D | MixedContentChecker.h | 41 class SecurityOrigin; variable 48 bool canDisplayInsecureContent(SecurityOrigin*, const KURL&) const; 49 bool canRunInsecureContent(SecurityOrigin*, const KURL&) const; 50 static bool isMixedContent(SecurityOrigin*, const KURL&);
|
D | MixedContentChecker.cpp | 52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) in isMixedContent() 58 return !SecurityOrigin::isSecure(url); in isMixedContent() 61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url… in canDisplayInsecureContent() 76 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) co… in canRunInsecureContent()
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
D | SecurityContext.h | 36 class SecurityOrigin; variable 42 SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } in securityOrigin() 50 void setSecurityOrigin(PassRefPtr<SecurityOrigin>); 63 RefPtr<SecurityOrigin> m_securityOrigin;
|
D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) in setSecurityOrigin() 63 RefPtr<SecurityOrigin> other = SecurityOrigin::create(url); in isSecureTransitionTo()
|
/external/chromium_org/third_party/WebKit/public/web/ |
D | WebSecurityOrigin.h | 37 namespace WebCore { class SecurityOrigin; } variable 103 WebSecurityOrigin(const WTF::PassRefPtr<WebCore::SecurityOrigin>&); 104 WebSecurityOrigin& operator=(const WTF::PassRefPtr<WebCore::SecurityOrigin>&); 105 operator WTF::PassRefPtr<WebCore::SecurityOrigin>() const; 106 WebCore::SecurityOrigin* get() const;
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
D | CrossOriginAccessControl.h | 41 class SecurityOrigin; variable 53 void updateRequestForAccessControl(ResourceRequest&, SecurityOrigin*, StoredCredentials); 54 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest&, SecurityOrigin*); 56 bool passesAccessControlCheck(const ResourceResponse&, StoredCredentials, SecurityOrigin*, String& …
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
D | StorageNamespace.h | 34 class SecurityOrigin; variable 39 static PassOwnPtr<StorageArea> localStorageArea(SecurityOrigin*); 43 virtual PassOwnPtr<StorageArea> storageArea(SecurityOrigin*) = 0;
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
D | BlobRegistry.h | 45 class SecurityOrigin; variable 54 static void registerPublicBlobURL(SecurityOrigin*, const KURL&, PassRefPtr<BlobDataHandle>); 59 static void registerStreamURL(SecurityOrigin*, const KURL&, const KURL& srcURL);
|
D | BlobRegistry.cpp | 62 virtual SecurityOrigin* cachedOrigin(const KURL&) OVERRIDE; 110 typedef HashMap<String, RefPtr<SecurityOrigin> > BlobURLOriginMap; 121 static void saveToOriginMap(SecurityOrigin* origin, const KURL& url) in saveToOriginMap() 151 void BlobRegistry::registerPublicBlobURL(SecurityOrigin* origin, const KURL& url, PassRefPtr<BlobDa… in registerPublicBlobURL() 188 void BlobRegistry::registerStreamURL(SecurityOrigin* origin, const KURL& url, const KURL& srcURL) in registerStreamURL() 281 SecurityOrigin::setCache(this); in BlobOriginCache() 284 SecurityOrigin* BlobOriginCache::cachedOrigin(const KURL& url) in cachedOrigin()
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
D | DatabaseTracker.h | 44 class SecurityOrigin; variable 58 … String fullPathForDatabase(SecurityOrigin*, const String& name, bool createIfDoesNotExist = true); 62 …void getOpenDatabases(SecurityOrigin*, const String& name, HashSet<RefPtr<DatabaseBackendBase> >* …
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
D | PageRuntimeAgent.h | 43 class SecurityOrigin; variable 59 void didCreateIsolatedContext(Frame*, ScriptState*, SecurityOrigin*); 68 …void notifyContextCreated(const String& frameId, ScriptState*, SecurityOrigin*, bool isPageContext…
|