Home
last modified time | relevance | path

Searched refs:securityOrigin (Results 1 – 25 of 165) sorted by relevance

1234567

/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/
DIndexedDBModel.js160 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
161 this._removeOrigin(securityOrigin);
169 for (var securityOrigin in this._databaseNamesBySecurityOrigin)
170 this._loadDatabaseNames(securityOrigin);
188 …this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback…
196 var securityOrigin = /** @type {string} */ (event.data);
197 this._addOrigin(securityOrigin);
205 var securityOrigin = /** @type {string} */ (event.data);
206 this._removeOrigin(securityOrigin);
212 _addOrigin: function(securityOrigin) argument
[all …]
DDOMStorage.js37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage) argument
40 this._securityOrigin = securityOrigin;
49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) argument
51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage };
70 get securityOrigin() getter in WebInspector.DOMStorage
139 var securityOrigin = /** @type {string} */ (event.data);
140 var localStorageKey = this._storageKey(securityOrigin, true);
142 var localStorage = new WebInspector.DOMStorage(this, securityOrigin, true);
146 var sessionStorageKey = this._storageKey(securityOrigin, false);
148 var sessionStorage = new WebInspector.DOMStorage(this, securityOrigin, false);
[all …]
DFileSystemModel.js53 for (var securityOrigin in this._fileSystemsForOrigin)
54 this._removeOrigin(securityOrigin);
65 var securityOrigin = /** @type {string} */ (event.data);
66 this._addOrigin(securityOrigin);
74 var securityOrigin = /** @type {string} */ (event.data);
75 this._removeOrigin(securityOrigin);
81 _addOrigin: function(securityOrigin) argument
83 this._fileSystemsForOrigin[securityOrigin] = {};
87 …ystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[…
93 _removeOrigin: function(securityOrigin) argument
[all …]
DResourceTreeModel.js147 this._addSecurityOrigin(frame.securityOrigin);
153 _addSecurityOrigin: function(securityOrigin) argument
155 if (!this._securityOriginFrameCount[securityOrigin]) {
156 this._securityOriginFrameCount[securityOrigin] = 1;
157 …tchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin);
160 this._securityOriginFrameCount[securityOrigin] += 1;
166 _removeSecurityOrigin: function(securityOrigin) argument
168 if (typeof securityOrigin === "undefined")
170 if (this._securityOriginFrameCount[securityOrigin] === 1) {
171 delete this._securityOriginFrameCount[securityOrigin];
[all …]
/external/chromium_org/third_party/WebKit/Source/core/fetch/
DCrossOriginAccessControl.cpp64 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, Stored… in updateRequestForAccessControl() argument
69 if (securityOrigin) in updateRequestForAccessControl()
70 request.setHTTPOrigin(securityOrigin->toAtomicString()); in updateRequestForAccessControl()
73 …createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) in createAccessControlPreflightRequest() argument
76 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); in createAccessControlPreflightRequest()
115 …nse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& error… in passesAccessControlCheck() argument
121 …errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is t… in passesAccessControlCheck()
132 …-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck()
135 } else if (accessControlOriginString != securityOrigin->toAtomicString()) { in passesAccessControlCheck()
137 …low-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck()
[all …]
DResourceLoaderOptions.h146 RefPtr<SecurityOrigin> securityOrigin; member
161 , securityOrigin(options.securityOrigin) { } in CrossThreadResourceLoaderOptionsData()
175 options.securityOrigin = securityOrigin; in ResourceLoaderOptions()
188 RefPtr<SecurityOrigin> securityOrigin; member
/external/chromium_org/third_party/WebKit/Source/core/loader/
DMixedContentChecker.cpp62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) in isMixedContent() argument
64 if (securityOrigin->protocol() != "https") in isMixedContent()
240 if (!isMixedContent(frame->document()->securityOrigin(), url)) in shouldBlockFetch()
245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin(); in shouldBlockFetch() local
254 …playingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); in shouldBlockFetch()
260 …RunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); in shouldBlockFetch()
262 client->didRunInsecureContent(securityOrigin, url); in shouldBlockFetch()
278 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const K… in canDisplayInsecureContentInternal() argument
288 …dContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->securityOrigin(), url)) in canDisplayInsecureContentInternal()
292 …l) && !Platform::current()->isReservedIPAddress(KURL(ParsedURLString, securityOrigin->toString()))) in canDisplayInsecureContentInternal()
[all …]
DMixedContentChecker.h53 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const in canDisplayInsecureContent() argument
55 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); in canDisplayInsecureContent()
58 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const in canRunInsecureContent() argument
60 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution); in canRunInsecureContent()
DDocumentThreadableLoader.cpp80 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin) in DocumentThreadableLoader()
81 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) in DocumentThreadableLoader()
131 … updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials()); in makeCrossOriginAccessRequest()
144 …eflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(),… in makeCrossOriginAccessRequest()
148 …Request preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin()); in makeCrossOriginAccessRequest()
251 …sesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessContr… in redirectReceived()
324 …if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessContr… in handlePreflightResponse()
342 …CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualReques… in handlePreflightResponse()
373 isCrossOriginResponse = !securityOrigin()->canRequest(response.url()); in handleResponse()
389 …if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessContr… in handleResponse()
[all …]
DTextTrackLoader.cpp86 void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url) in corsPolicyPreventedLoad() argument
88 …f track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + … in corsPolicyPreventedLoad()
115 cueRequest.setCrossOriginAccessControl(document().securityOrigin(), crossOriginMode); in load()
116 } else if (!document().securityOrigin()->canRequest(url)) { in load()
118 corsPolicyPreventedLoad(document().securityOrigin(), url); in load()
/external/chromium_org/chrome/renderer/
Dcontent_settings_observer.cc118 WebString top_origin = frame->top()->document().securityOrigin().toString(); in GetOriginOrURL()
256 DCHECK(frame->document().securityOrigin().toString() == "null" || in DidCommitProvisionalLoad()
264 if (frame->document().securityOrigin().isUnique() || in allowDatabase()
265 frame->top()->document().securityOrigin().isUnique()) in allowDatabase()
270 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowDatabase()
271 GURL(frame->top()->document().securityOrigin().toString()), in allowDatabase()
279 if (frame->document().securityOrigin().isUnique() || in requestFileSystemAccessAsync()
280 frame->top()->document().securityOrigin().isUnique()) { in requestFileSystemAccessAsync()
296 GURL(frame->document().securityOrigin().toString()), in requestFileSystemAccessAsync()
297 GURL(frame->top()->document().securityOrigin().toString()))); in requestFileSystemAccessAsync()
[all …]
Dworker_permission_client_proxy.cc20 if (frame->document().securityOrigin().isUnique() || in WorkerPermissionClientProxy()
21 frame->top()->document().securityOrigin().isUnique()) in WorkerPermissionClientProxy()
24 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
26 frame->top()->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
/external/chromium_org/third_party/WebKit/Source/core/css/
DCSSFontFaceSrcValue.cpp101 …ceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) in shouldSetCrossOriginAccessControl() argument
105 return !securityOrigin->canRequest(resource); in shouldSetCrossOriginAccessControl()
112 SecurityOrigin* securityOrigin = document->securityOrigin(); in fetch() local
113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { in fetch()
114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials); in fetch()
/external/chromium_org/third_party/WebKit/Source/core/inspector/
DInspectorDOMStorageAgent.cpp181 …rage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalS… in storageId() argument
184 .setSecurityOrigin(securityOrigin->toRawString()) in storageId()
188 … String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) in didDispatchDOMStorageEvent() argument
193 …RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStor… in didDispatchDOMStorageEvent()
207 String securityOrigin; in findStorageArea() local
209 bool success = storageId->getString("securityOrigin", &securityOrigin); in findStorageArea()
218 LocalFrame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin); in findStorageArea()
227 return StorageNamespace::localStorageArea(frame->document()->securityOrigin()); in findStorageArea()
228 return m_pageAgent->page()->sessionStorage()->storageArea(frame->document()->securityOrigin()); in findStorageArea()
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/
DDatabaseIdentifier.cpp90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) in createDatabaseIdentifierFromSecurityOrigin() argument
97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) in createDatabaseIdentifierFromSecurityOrigin()
102 …return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + S… in createDatabaseIdentifierFromSecurityOrigin()
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/
DDOMWindowFileSystem.cpp60 if (!document->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem()
83 SecurityOrigin* securityOrigin = document->securityOrigin(); in webkitResolveLocalFileSystemURL() local
85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { in webkitResolveLocalFileSystemURL()
DWorkerGlobalScopeFileSystem.cpp51 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem()
68 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystemSync()
91 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemURL()
108 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemSyncURL()
/external/chromium_org/third_party/WebKit/Source/web/
DWebStorageEventDispatcherImpl.cpp49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); in dispatchLocalStorageEvent() local
51 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchLocalStorageEvent()
61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); in dispatchSessionStorageEvent() local
63 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchSessionStorageEvent()
DMediaKeysClientImpl.cpp24 WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); in createContentDecryptionModule() local
25 …return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySys… in createContentDecryptionModule()
/external/chromium_org/chrome/common/extensions/api/
Dwebrtc_logging_private.idl27 // |securityOrigin| is the security origin for the tab identified by |tabId|
34 DOMString securityOrigin,
42 DOMString securityOrigin,
50 DOMString securityOrigin,
57 DOMString securityOrigin,
63 DOMString securityOrigin,
68 DOMString securityOrigin,
74 DOMString securityOrigin,
83 DOMString securityOrigin,
/external/chromium_org/third_party/WebKit/Source/core/storage/
DStorageArea.cpp158 …key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& p… in dispatchLocalStorageEvent() argument
168 …if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !is… in dispatchLocalStorageEvent()
171 …umentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); in dispatchLocalStorageEvent()
188 …key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& p… in dispatchSessionStorageEvent() argument
199 …if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !is… in dispatchSessionStorageEvent()
202 …ntation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); in dispatchSessionStorageEvent()
/external/chromium_org/third_party/WebKit/Source/modules/quota/
DDeprecatedStorageQuota.cpp65 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); in queryUsageAndQuota() local
66 if (securityOrigin->isUnique()) { in queryUsageAndQuota()
71 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryUsageAndQuota()
DStorageQuota.cpp90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); in queryInfo() local
91 if (securityOrigin->isUnique()) { in queryInfo()
96 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryInfo()
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/
DIDBFactory.cpp78 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in getDatabaseNames()
90 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in getDatabaseNames()
114 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in openInternal()
128 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in openInternal()
148 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in deleteDatabase()
160 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in deleteDatabase()
/external/chromium_org/third_party/WebKit/Source/core/dom/
DSecurityContext.cpp44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) in setSecurityOrigin() argument
46 m_securityOrigin = securityOrigin; in setSecurityOrigin()
64 return securityOrigin()->canAccess(other.get()); in isSecureTransitionTo()

1234567