/external/chromium_org/third_party/WebKit/Source/devtools/front_end/ |
D | IndexedDBModel.js | 146 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 147 this._removeOrigin(securityOrigin); 155 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 156 this._loadDatabaseNames(securityOrigin); 174 …IndexedDBAgent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callb… 182 var securityOrigin = /** @type {string} */ (event.data); 183 this._addOrigin(securityOrigin); 191 var securityOrigin = /** @type {string} */ (event.data); 192 this._removeOrigin(securityOrigin); 198 _addOrigin: function(securityOrigin) argument [all …]
|
D | DOMStorage.js | 36 WebInspector.DOMStorage = function(securityOrigin, isLocalStorage) argument 38 this._securityOrigin = securityOrigin; 47 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) argument 49 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 68 get securityOrigin() getter in WebInspector.DOMStorage 133 var securityOrigin = /** @type {string} */ (event.data); 134 var localStorageKey = this._storageKey(securityOrigin, true); 136 var localStorage = new WebInspector.DOMStorage(securityOrigin, true); 140 var sessionStorageKey = this._storageKey(securityOrigin, false); 142 var sessionStorage = new WebInspector.DOMStorage(securityOrigin, false); [all …]
|
D | FileSystemModel.js | 52 for (var securityOrigin in this._fileSystemsForOrigin) 53 this._removeOrigin(securityOrigin); 64 var securityOrigin = /** @type {string} */ (event.data); 65 this._addOrigin(securityOrigin); 73 var securityOrigin = /** @type {string} */ (event.data); 74 this._removeOrigin(securityOrigin); 80 _addOrigin: function(securityOrigin) argument 82 this._fileSystemsForOrigin[securityOrigin] = {}; 86 …ystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[… 92 _removeOrigin: function(securityOrigin) argument [all …]
|
D | ResourceTreeModel.js | 121 this._addSecurityOrigin(frame.securityOrigin); 129 _addSecurityOrigin: function(securityOrigin) argument 131 if (!this._securityOriginFrameCount[securityOrigin]) { 132 this._securityOriginFrameCount[securityOrigin] = 1; 133 …tchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin); 136 this._securityOriginFrameCount[securityOrigin] += 1; 142 _removeSecurityOrigin: function(securityOrigin) argument 144 if (typeof securityOrigin === "undefined") 146 if (this._securityOriginFrameCount[securityOrigin] === 1) { 147 delete this._securityOriginFrameCount[securityOrigin]; [all …]
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
D | MixedContentChecker.cpp | 52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) in isMixedContent() argument 54 if (securityOrigin->protocol() != "https") in isMixedContent() 61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url… in canDisplayInsecureContent() argument 63 if (!isMixedContent(securityOrigin, url)) in canDisplayInsecureContent() 67 …playingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); in canDisplayInsecureContent() 76 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) co… in canRunInsecureContent() argument 78 if (!isMixedContent(securityOrigin, url)) in canRunInsecureContent() 82 …RunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); in canRunInsecureContent() 86 client()->didRunInsecureContent(securityOrigin, url); in canRunInsecureContent()
|
D | DocumentThreadableLoader.cpp | 74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) in DocumentThreadableLoader() 104 … updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials); in makeCrossOriginAccessRequest() 112 …if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_act… in makeCrossOriginAccessRequest() 135 … ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin()); in makeCrossOriginAccessRequestWithPreflight() 203 …ssesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessContr… in redirectReceived() 217 m_options.securityOrigin = SecurityOrigin::createUnique(); in redirectReceived() 275 …if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessContro… in didReceiveResponse() 293 …CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualReques… in didReceiveResponse() 296 …if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessContro… in didReceiveResponse() 374 actualRequest->setHTTPOrigin(securityOrigin()->toString()); in preflightSuccess() [all …]
|
D | TextTrackLoader.cpp | 97 && !m_document.securityOrigin()->canRequest(resource->response().url()) in notifyFinished() 98 && !resource->passesAccessControlCheck(m_document.securityOrigin())) { in notifyFinished() 124 …uestForAccessControl(cueRequest.mutableResourceRequest(), m_document.securityOrigin(), allowCreden… in load() 127 if (!m_document.securityOrigin()->canRequest(url)) { in load()
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
D | CrossOriginAccessControl.cpp | 99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, Stored… in updateRequestForAccessControl() argument 104 if (securityOrigin) in updateRequestForAccessControl() 105 request.setHTTPOrigin(securityOrigin->toString()); in updateRequestForAccessControl() 108 …createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) in createAccessControlPreflightRequest() argument 111 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); in createAccessControlPreflightRequest() 141 …nse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& error… in passesAccessControlCheck() argument 152 if (accessControlOriginString != securityOrigin->toString()) { in passesAccessControlCheck() 154 …-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck() 156 …low-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck() 158 …accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck() [all …]
|
/external/chromium_org/chrome/renderer/ |
D | content_settings_observer.cc | 111 WebString top_origin = frame->top()->document().securityOrigin().toString(); in GetOriginOrURL() 229 DCHECK(frame->document().securityOrigin().toString() == "null" || in DidCommitProvisionalLoad() 237 if (frame->document().securityOrigin().isUnique() || in allowDatabase() 238 frame->top()->document().securityOrigin().isUnique()) in allowDatabase() 243 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowDatabase() 244 GURL(frame->top()->document().securityOrigin().toString()), in allowDatabase() 250 if (frame->document().securityOrigin().isUnique() || in allowFileSystem() 251 frame->top()->document().securityOrigin().isUnique()) in allowFileSystem() 256 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowFileSystem() 257 GURL(frame->top()->document().securityOrigin().toString()), &result)); in allowFileSystem() [all …]
|
D | worker_permission_client_proxy.cc | 19 if (frame->document().securityOrigin().isUnique() || in WorkerPermissionClientProxy() 20 frame->top()->document().securityOrigin().isUnique()) in WorkerPermissionClientProxy() 23 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); in WorkerPermissionClientProxy() 25 frame->top()->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
D | InspectorDOMStorageAgent.cpp | 177 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); in storageId() local 179 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); in storageId() 182 …rage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalS… in storageId() argument 185 .setSecurityOrigin(securityOrigin->toRawString()) in storageId() 189 … String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) in didDispatchDOMStorageEvent() argument 194 …RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStor… in didDispatchDOMStorageEvent() 208 String securityOrigin; in findStorageArea() local 210 bool success = storageId->getString("securityOrigin", &securityOrigin); in findStorageArea() 219 Frame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin); in findStorageArea() 228 return StorageNamespace::localStorageArea(frame->document()->securityOrigin()); in findStorageArea() [all …]
|
D | InspectorIndexedDBAgent.h | 59 …virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDa… 60 …virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseNam… 61 …virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, c…
|
/external/chromium_org/third_party/WebKit/Source/web/ |
D | NotificationPresenterImpl.cpp | 69 …ient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<No… in NotificationPermissionCallbackClient() argument 71 , m_securityOrigin(securityOrigin) in NotificationPermissionCallbackClient() 118 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); in checkPermission() 125 …m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClien… in requestPermission() 131 …(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presente… in requestPermission()
|
D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchLocalStorageEvent() local 51 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchLocalStorageEvent() 61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchSessionStorageEvent() local 63 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchSessionStorageEvent()
|
D | StorageAreaProxy.cpp | 157 …SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bo… in dispatchLocalStorageEvent() argument 164 …if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storag… in dispatchLocalStorageEvent() 167 …umentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); in dispatchLocalStorageEvent() 185 …SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionName… in dispatchSessionStorageEvent() argument 194 …if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storag… in dispatchSessionStorageEvent() 197 …ntation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); in dispatchSessionStorageEvent()
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
D | DatabaseIdentifier.cpp | 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) in createDatabaseIdentifierFromSecurityOrigin() argument 97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) in createDatabaseIdentifierFromSecurityOrigin() 102 …return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + S… in createDatabaseIdentifierFromSecurityOrigin()
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
D | DOMWindowFileSystem.cpp | 60 if (!document->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem() 83 SecurityOrigin* securityOrigin = document->securityOrigin(); in webkitResolveLocalFileSystemURL() local 85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { in webkitResolveLocalFileSystemURL()
|
D | WorkerGlobalScopeFileSystem.cpp | 51 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem() 68 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystemSync() 91 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemURL() 108 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemSyncURL()
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
D | StorageQuota.cpp | 64 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); in queryUsageAndQuota() local 65 if (securityOrigin->isUnique()) { in queryUsageAndQuota() 70 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryUsageAndQuota()
|
/external/chromium_org/chrome/common/extensions/api/ |
D | webrtc_logging_private.idl | 27 // |securityOrigin| is the security origin for the tab identified by |tabId| 34 DOMString securityOrigin, 42 DOMString securityOrigin, 50 DOMString securityOrigin, 57 DOMString securityOrigin, 62 DOMString securityOrigin, 67 DOMString securityOrigin,
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) in setSecurityOrigin() argument 46 m_securityOrigin = securityOrigin; in setSecurityOrigin() 64 return securityOrigin()->canAccess(other.get()); in isSecureTransitionTo()
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
D | IDBFactory.cpp | 80 if (!context->securityOrigin()->canAccessDatabase()) { in getDatabaseNames() 92 …:create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in getDatabaseNames() 116 if (!context->securityOrigin()->canAccessDatabase()) { in openInternal() 130 …backs.release()).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in openInternal() 150 if (!context->securityOrigin()->canAccessDatabase()) { in deleteDatabase() 162 …:create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in deleteDatabase()
|
/external/chromium_org/third_party/WebKit/Source/platform/blob/ |
D | BlobURL.cpp | 43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) in createPublicURL() argument 45 ASSERT(securityOrigin); in createPublicURL() 46 return createBlobURL(securityOrigin->toString()); in createPublicURL()
|
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/ |
D | DatabaseBackendBase.cpp | 214 m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy(); in DatabaseBackendBase() 223 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); in DatabaseBackendBase() 233 m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name); in DatabaseBackendBase() 426 SecurityOrigin* DatabaseBackendBase::securityOrigin() const in securityOrigin() function in WebCore::DatabaseBackendBase 611 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportOpenDatabaseResult() 621 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportChangeVersionResult() 631 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportStartTransactionResult() 641 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportCommitTransactionResult() 651 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportExecuteStatementResult() 661 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportVacuumDatabaseResult()
|
D | DatabaseTracker.cpp | 55 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in databaseClosed() 91 … String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); in addOpenDatabase() 136 … String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); in removeOpenDatabase() 174 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in prepareToOpenDatabase() 195 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in getMaxSizeForDatabase() 207 …ap = m_openDatabaseMap->get(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in interruptAllDatabasesForContext()
|