Home
last modified time | relevance | path

Searched refs:securityOrigin (Results 1 – 25 of 151) sorted by relevance

1234567

/external/chromium_org/third_party/WebKit/Source/devtools/front_end/
DIndexedDBModel.js146 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
147 this._removeOrigin(securityOrigin);
155 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
156 this._loadDatabaseNames(securityOrigin);
174 …IndexedDBAgent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callb…
182 var securityOrigin = /** @type {string} */ (event.data);
183 this._addOrigin(securityOrigin);
191 var securityOrigin = /** @type {string} */ (event.data);
192 this._removeOrigin(securityOrigin);
198 _addOrigin: function(securityOrigin) argument
[all …]
DDOMStorage.js36 WebInspector.DOMStorage = function(securityOrigin, isLocalStorage) argument
38 this._securityOrigin = securityOrigin;
47 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) argument
49 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
68 get securityOrigin() getter in WebInspector.DOMStorage
133 var securityOrigin = /** @type {string} */ (event.data);
134 var localStorageKey = this._storageKey(securityOrigin, true);
136 var localStorage = new WebInspector.DOMStorage(securityOrigin, true);
140 var sessionStorageKey = this._storageKey(securityOrigin, false);
142 var sessionStorage = new WebInspector.DOMStorage(securityOrigin, false);
[all …]
DFileSystemModel.js52 for (var securityOrigin in this._fileSystemsForOrigin)
53 this._removeOrigin(securityOrigin);
64 var securityOrigin = /** @type {string} */ (event.data);
65 this._addOrigin(securityOrigin);
73 var securityOrigin = /** @type {string} */ (event.data);
74 this._removeOrigin(securityOrigin);
80 _addOrigin: function(securityOrigin) argument
82 this._fileSystemsForOrigin[securityOrigin] = {};
86 …ystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[…
92 _removeOrigin: function(securityOrigin) argument
[all …]
DResourceTreeModel.js121 this._addSecurityOrigin(frame.securityOrigin);
129 _addSecurityOrigin: function(securityOrigin) argument
131 if (!this._securityOriginFrameCount[securityOrigin]) {
132 this._securityOriginFrameCount[securityOrigin] = 1;
133 …tchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin);
136 this._securityOriginFrameCount[securityOrigin] += 1;
142 _removeSecurityOrigin: function(securityOrigin) argument
144 if (typeof securityOrigin === "undefined")
146 if (this._securityOriginFrameCount[securityOrigin] === 1) {
147 delete this._securityOriginFrameCount[securityOrigin];
[all …]
/external/chromium_org/third_party/WebKit/Source/core/loader/
DMixedContentChecker.cpp52 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) in isMixedContent() argument
54 if (securityOrigin->protocol() != "https") in isMixedContent()
61 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url… in canDisplayInsecureContent() argument
63 if (!isMixedContent(securityOrigin, url)) in canDisplayInsecureContent()
67 …playingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); in canDisplayInsecureContent()
76 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) co… in canRunInsecureContent() argument
78 if (!isMixedContent(securityOrigin, url)) in canRunInsecureContent()
82 …RunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); in canRunInsecureContent()
86 client()->didRunInsecureContent(securityOrigin, url); in canRunInsecureContent()
DDocumentThreadableLoader.cpp74 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) in DocumentThreadableLoader()
104 … updateRequestForAccessControl(*crossOriginRequest, securityOrigin(), m_options.allowCredentials); in makeCrossOriginAccessRequest()
112 …if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_act… in makeCrossOriginAccessRequest()
135 … ResourceRequest preflightRequest = createAccessControlPreflightRequest(request, securityOrigin()); in makeCrossOriginAccessRequestWithPreflight()
203 …ssesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessContr… in redirectReceived()
217 m_options.securityOrigin = SecurityOrigin::createUnique(); in redirectReceived()
275 …if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessContro… in didReceiveResponse()
293 …CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualReques… in didReceiveResponse()
296 …if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessContro… in didReceiveResponse()
374 actualRequest->setHTTPOrigin(securityOrigin()->toString()); in preflightSuccess()
[all …]
DTextTrackLoader.cpp97 && !m_document.securityOrigin()->canRequest(resource->response().url()) in notifyFinished()
98 && !resource->passesAccessControlCheck(m_document.securityOrigin())) { in notifyFinished()
124 …uestForAccessControl(cueRequest.mutableResourceRequest(), m_document.securityOrigin(), allowCreden… in load()
127 if (!m_document.securityOrigin()->canRequest(url)) { in load()
/external/chromium_org/third_party/WebKit/Source/core/fetch/
DCrossOriginAccessControl.cpp99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, Stored… in updateRequestForAccessControl() argument
104 if (securityOrigin) in updateRequestForAccessControl()
105 request.setHTTPOrigin(securityOrigin->toString()); in updateRequestForAccessControl()
108 …createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) in createAccessControlPreflightRequest() argument
111 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); in createAccessControlPreflightRequest()
141 …nse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& error… in passesAccessControlCheck() argument
152 if (accessControlOriginString != securityOrigin->toString()) { in passesAccessControlCheck()
154 …-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck()
156 …low-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck()
158 …accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck()
[all …]
/external/chromium_org/chrome/renderer/
Dcontent_settings_observer.cc111 WebString top_origin = frame->top()->document().securityOrigin().toString(); in GetOriginOrURL()
229 DCHECK(frame->document().securityOrigin().toString() == "null" || in DidCommitProvisionalLoad()
237 if (frame->document().securityOrigin().isUnique() || in allowDatabase()
238 frame->top()->document().securityOrigin().isUnique()) in allowDatabase()
243 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowDatabase()
244 GURL(frame->top()->document().securityOrigin().toString()), in allowDatabase()
250 if (frame->document().securityOrigin().isUnique() || in allowFileSystem()
251 frame->top()->document().securityOrigin().isUnique()) in allowFileSystem()
256 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowFileSystem()
257 GURL(frame->top()->document().securityOrigin().toString()), &result)); in allowFileSystem()
[all …]
Dworker_permission_client_proxy.cc19 if (frame->document().securityOrigin().isUnique() || in WorkerPermissionClientProxy()
20 frame->top()->document().securityOrigin().isUnique()) in WorkerPermissionClientProxy()
23 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
25 frame->top()->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
/external/chromium_org/third_party/WebKit/Source/core/inspector/
DInspectorDOMStorageAgent.cpp177 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); in storageId() local
179 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); in storageId()
182 …rage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalS… in storageId() argument
185 .setSecurityOrigin(securityOrigin->toRawString()) in storageId()
189 … String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) in didDispatchDOMStorageEvent() argument
194 …RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStor… in didDispatchDOMStorageEvent()
208 String securityOrigin; in findStorageArea() local
210 bool success = storageId->getString("securityOrigin", &securityOrigin); in findStorageArea()
219 Frame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin); in findStorageArea()
228 return StorageNamespace::localStorageArea(frame->document()->securityOrigin()); in findStorageArea()
[all …]
DInspectorIndexedDBAgent.h59 …virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDa…
60 …virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseNam…
61 …virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, c…
/external/chromium_org/third_party/WebKit/Source/web/
DNotificationPresenterImpl.cpp69 …ient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<No… in NotificationPermissionCallbackClient() argument
71 , m_securityOrigin(securityOrigin) in NotificationPermissionCallbackClient()
118 int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); in checkPermission()
125 …m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new VoidCallbackClien… in requestPermission()
131 …(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presente… in requestPermission()
DWebStorageEventDispatcherImpl.cpp49 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchLocalStorageEvent() local
51 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchLocalStorageEvent()
61 RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); in dispatchSessionStorageEvent() local
63 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchSessionStorageEvent()
DStorageAreaProxy.cpp157 …SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bo… in dispatchLocalStorageEvent() argument
164 …if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storag… in dispatchLocalStorageEvent()
167 …umentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); in dispatchLocalStorageEvent()
185 …SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionName… in dispatchSessionStorageEvent() argument
194 …if (storage && frame->document()->securityOrigin()->equal(securityOrigin) && !isEventSource(storag… in dispatchSessionStorageEvent()
197 …ntation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); in dispatchSessionStorageEvent()
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/
DDatabaseIdentifier.cpp90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) in createDatabaseIdentifierFromSecurityOrigin() argument
97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) in createDatabaseIdentifierFromSecurityOrigin()
102 …return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + S… in createDatabaseIdentifierFromSecurityOrigin()
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DDOMWindowFileSystem.cpp60 if (!document->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem()
83 SecurityOrigin* securityOrigin = document->securityOrigin(); in webkitResolveLocalFileSystemURL() local
85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { in webkitResolveLocalFileSystemURL()
DWorkerGlobalScopeFileSystem.cpp51 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem()
68 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystemSync()
91 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemURL()
108 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemSyncURL()
/external/chromium_org/third_party/WebKit/Source/modules/quota/
DStorageQuota.cpp64 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); in queryUsageAndQuota() local
65 if (securityOrigin->isUnique()) { in queryUsageAndQuota()
70 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryUsageAndQuota()
/external/chromium_org/chrome/common/extensions/api/
Dwebrtc_logging_private.idl27 // |securityOrigin| is the security origin for the tab identified by |tabId|
34 DOMString securityOrigin,
42 DOMString securityOrigin,
50 DOMString securityOrigin,
57 DOMString securityOrigin,
62 DOMString securityOrigin,
67 DOMString securityOrigin,
/external/chromium_org/third_party/WebKit/Source/core/dom/
DSecurityContext.cpp44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) in setSecurityOrigin() argument
46 m_securityOrigin = securityOrigin; in setSecurityOrigin()
64 return securityOrigin()->canAccess(other.get()); in isSecureTransitionTo()
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
DIDBFactory.cpp80 if (!context->securityOrigin()->canAccessDatabase()) { in getDatabaseNames()
92 …:create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in getDatabaseNames()
116 if (!context->securityOrigin()->canAccessDatabase()) { in openInternal()
130 …backs.release()).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in openInternal()
150 if (!context->securityOrigin()->canAccessDatabase()) { in deleteDatabase()
162 …:create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in deleteDatabase()
/external/chromium_org/third_party/WebKit/Source/platform/blob/
DBlobURL.cpp43 KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) in createPublicURL() argument
45 ASSERT(securityOrigin); in createPublicURL()
46 return createBlobURL(securityOrigin->toString()); in createPublicURL()
/external/chromium_org/third_party/WebKit/Source/modules/webdatabase/
DDatabaseBackendBase.cpp214 m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy(); in DatabaseBackendBase()
223 m_guid = guidForOriginAndName(securityOrigin()->toString(), name); in DatabaseBackendBase()
233 m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name); in DatabaseBackendBase()
426 SecurityOrigin* DatabaseBackendBase::securityOrigin() const in securityOrigin() function in WebCore::DatabaseBackendBase
611 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportOpenDatabaseResult()
621 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportChangeVersionResult()
631 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportStartTransactionResult()
641 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportCommitTransactionResult()
651 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportExecuteStatementResult()
661 createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), in reportVacuumDatabaseResult()
DDatabaseTracker.cpp55 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in databaseClosed()
91 … String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); in addOpenDatabase()
136 … String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); in removeOpenDatabase()
174 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in prepareToOpenDatabase()
195 createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), in getMaxSizeForDatabase()
207 …ap = m_openDatabaseMap->get(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); in interruptAllDatabasesForContext()

1234567