/external/chromium_org/third_party/WebKit/Source/devtools/front_end/sdk/ |
D | IndexedDBModel.js | 160 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 161 this._removeOrigin(securityOrigin); 169 for (var securityOrigin in this._databaseNamesBySecurityOrigin) 170 this._loadDatabaseNames(securityOrigin); 188 …this._agent.clearObjectStore(databaseId.securityOrigin, databaseId.name, objectStoreName, callback… 196 var securityOrigin = /** @type {string} */ (event.data); 197 this._addOrigin(securityOrigin); 205 var securityOrigin = /** @type {string} */ (event.data); 206 this._removeOrigin(securityOrigin); 212 _addOrigin: function(securityOrigin) argument [all …]
|
D | DOMStorage.js | 37 WebInspector.DOMStorage = function(model, securityOrigin, isLocalStorage) argument 40 this._securityOrigin = securityOrigin; 49 WebInspector.DOMStorage.storageId = function(securityOrigin, isLocalStorage) argument 51 return { securityOrigin: securityOrigin, isLocalStorage: isLocalStorage }; 70 get securityOrigin() getter in WebInspector.DOMStorage 139 var securityOrigin = /** @type {string} */ (event.data); 140 var localStorageKey = this._storageKey(securityOrigin, true); 142 var localStorage = new WebInspector.DOMStorage(this, securityOrigin, true); 146 var sessionStorageKey = this._storageKey(securityOrigin, false); 148 var sessionStorage = new WebInspector.DOMStorage(this, securityOrigin, false); [all …]
|
D | FileSystemModel.js | 53 for (var securityOrigin in this._fileSystemsForOrigin) 54 this._removeOrigin(securityOrigin); 65 var securityOrigin = /** @type {string} */ (event.data); 66 this._addOrigin(securityOrigin); 74 var securityOrigin = /** @type {string} */ (event.data); 75 this._removeOrigin(securityOrigin); 81 _addOrigin: function(securityOrigin) argument 83 this._fileSystemsForOrigin[securityOrigin] = {}; 87 …ystemRoot(securityOrigin, types[i], this._fileSystemRootReceived.bind(this, securityOrigin, types[… 93 _removeOrigin: function(securityOrigin) argument [all …]
|
D | ResourceTreeModel.js | 147 this._addSecurityOrigin(frame.securityOrigin); 153 _addSecurityOrigin: function(securityOrigin) argument 155 if (!this._securityOriginFrameCount[securityOrigin]) { 156 this._securityOriginFrameCount[securityOrigin] = 1; 157 …tchEventToListeners(WebInspector.ResourceTreeModel.EventTypes.SecurityOriginAdded, securityOrigin); 160 this._securityOriginFrameCount[securityOrigin] += 1; 166 _removeSecurityOrigin: function(securityOrigin) argument 168 if (typeof securityOrigin === "undefined") 170 if (this._securityOriginFrameCount[securityOrigin] === 1) { 171 delete this._securityOriginFrameCount[securityOrigin]; [all …]
|
/external/chromium_org/third_party/WebKit/Source/core/fetch/ |
D | CrossOriginAccessControl.cpp | 64 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, Stored… in updateRequestForAccessControl() argument 69 if (securityOrigin) in updateRequestForAccessControl() 70 request.setHTTPOrigin(securityOrigin->toAtomicString()); in updateRequestForAccessControl() 73 …createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) in createAccessControlPreflightRequest() argument 76 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); in createAccessControlPreflightRequest() 115 …nse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& error… in passesAccessControlCheck() argument 121 …errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is t… in passesAccessControlCheck() 132 …-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck() 135 } else if (accessControlOriginString != securityOrigin->toAtomicString()) { in passesAccessControlCheck() 137 …low-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + … in passesAccessControlCheck() [all …]
|
D | ResourceLoaderOptions.h | 146 RefPtr<SecurityOrigin> securityOrigin; member 161 , securityOrigin(options.securityOrigin) { } in CrossThreadResourceLoaderOptionsData() 175 options.securityOrigin = securityOrigin; in ResourceLoaderOptions() 188 RefPtr<SecurityOrigin> securityOrigin; member
|
/external/chromium_org/third_party/WebKit/Source/core/loader/ |
D | MixedContentChecker.cpp | 62 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) in isMixedContent() argument 64 if (securityOrigin->protocol() != "https") in isMixedContent() 240 if (!isMixedContent(frame->document()->securityOrigin(), url)) in shouldBlockFetch() 245 SecurityOrigin* securityOrigin = frame->document()->securityOrigin(); in shouldBlockFetch() local 254 …playingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); in shouldBlockFetch() 260 …RunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); in shouldBlockFetch() 262 client->didRunInsecureContent(securityOrigin, url); in shouldBlockFetch() 278 bool MixedContentChecker::canDisplayInsecureContentInternal(SecurityOrigin* securityOrigin, const K… in canDisplayInsecureContentInternal() argument 288 …dContentChecker()->canDisplayInsecureContent(toLocalFrame(top)->document()->securityOrigin(), url)) in canDisplayInsecureContentInternal() 292 …l) && !Platform::current()->isReservedIPAddress(KURL(ParsedURLString, securityOrigin->toString()))) in canDisplayInsecureContentInternal() [all …]
|
D | MixedContentChecker.h | 53 bool canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const in canDisplayInsecureContent() argument 55 return canDisplayInsecureContentInternal(securityOrigin, url, MixedContentChecker::Display); in canDisplayInsecureContent() 58 bool canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const in canRunInsecureContent() argument 60 return canRunInsecureContentInternal(securityOrigin, url, MixedContentChecker::Execution); in canRunInsecureContent()
|
D | DocumentThreadableLoader.cpp | 80 , m_securityOrigin(m_resourceLoaderOptions.securityOrigin) in DocumentThreadableLoader() 81 , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) in DocumentThreadableLoader() 131 … updateRequestForAccessControl(crossOriginRequest, securityOrigin(), effectiveAllowCredentials()); in makeCrossOriginAccessRequest() 144 …eflight = CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(),… in makeCrossOriginAccessRequest() 148 …Request preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin()); in makeCrossOriginAccessRequest() 251 …sesAccessControlCheck(redirectResponse, effectiveAllowCredentials(), securityOrigin(), accessContr… in redirectReceived() 324 …if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessContr… in handlePreflightResponse() 342 …CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualReques… in handlePreflightResponse() 373 isCrossOriginResponse = !securityOrigin()->canRequest(response.url()); in handleResponse() 389 …if (!passesAccessControlCheck(response, effectiveAllowCredentials(), securityOrigin(), accessContr… in handleResponse() [all …]
|
D | TextTrackLoader.cpp | 86 void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url) in corsPolicyPreventedLoad() argument 88 …f track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + … in corsPolicyPreventedLoad() 115 cueRequest.setCrossOriginAccessControl(document().securityOrigin(), crossOriginMode); in load() 116 } else if (!document().securityOrigin()->canRequest(url)) { in load() 118 corsPolicyPreventedLoad(document().securityOrigin(), url); in load()
|
/external/chromium_org/chrome/renderer/ |
D | content_settings_observer.cc | 118 WebString top_origin = frame->top()->document().securityOrigin().toString(); in GetOriginOrURL() 256 DCHECK(frame->document().securityOrigin().toString() == "null" || in DidCommitProvisionalLoad() 264 if (frame->document().securityOrigin().isUnique() || in allowDatabase() 265 frame->top()->document().securityOrigin().isUnique()) in allowDatabase() 270 routing_id(), GURL(frame->document().securityOrigin().toString()), in allowDatabase() 271 GURL(frame->top()->document().securityOrigin().toString()), in allowDatabase() 279 if (frame->document().securityOrigin().isUnique() || in requestFileSystemAccessAsync() 280 frame->top()->document().securityOrigin().isUnique()) { in requestFileSystemAccessAsync() 296 GURL(frame->document().securityOrigin().toString()), in requestFileSystemAccessAsync() 297 GURL(frame->top()->document().securityOrigin().toString()))); in requestFileSystemAccessAsync() [all …]
|
D | worker_permission_client_proxy.cc | 20 if (frame->document().securityOrigin().isUnique() || in WorkerPermissionClientProxy() 21 frame->top()->document().securityOrigin().isUnique()) in WorkerPermissionClientProxy() 24 document_origin_url_ = GURL(frame->document().securityOrigin().toString()); in WorkerPermissionClientProxy() 26 frame->top()->document().securityOrigin().toString()); in WorkerPermissionClientProxy()
|
/external/chromium_org/third_party/WebKit/Source/core/css/ |
D | CSSFontFaceSrcValue.cpp | 101 …ceSrcValue::shouldSetCrossOriginAccessControl(const KURL& resource, SecurityOrigin* securityOrigin) in shouldSetCrossOriginAccessControl() argument 105 return !securityOrigin->canRequest(resource); in shouldSetCrossOriginAccessControl() 112 SecurityOrigin* securityOrigin = document->securityOrigin(); in fetch() local 113 if (shouldSetCrossOriginAccessControl(request.url(), securityOrigin)) { in fetch() 114 request.setCrossOriginAccessControl(securityOrigin, DoNotAllowStoredCredentials); in fetch()
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
D | InspectorDOMStorageAgent.cpp | 181 …rage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalS… in storageId() argument 184 .setSecurityOrigin(securityOrigin->toRawString()) in storageId() 188 … String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) in didDispatchDOMStorageEvent() argument 193 …RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStor… in didDispatchDOMStorageEvent() 207 String securityOrigin; in findStorageArea() local 209 bool success = storageId->getString("securityOrigin", &securityOrigin); in findStorageArea() 218 LocalFrame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin); in findStorageArea() 227 return StorageNamespace::localStorageArea(frame->document()->securityOrigin()); in findStorageArea() 228 return m_pageAgent->page()->sessionStorage()->storageArea(frame->document()->securityOrigin()); in findStorageArea()
|
/external/chromium_org/third_party/WebKit/Source/platform/weborigin/ |
D | DatabaseIdentifier.cpp | 90 String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) in createDatabaseIdentifierFromSecurityOrigin() argument 97 if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) in createDatabaseIdentifierFromSecurityOrigin() 102 …return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + S… in createDatabaseIdentifierFromSecurityOrigin()
|
/external/chromium_org/third_party/WebKit/Source/modules/filesystem/ |
D | DOMWindowFileSystem.cpp | 60 if (!document->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem() 83 SecurityOrigin* securityOrigin = document->securityOrigin(); in webkitResolveLocalFileSystemURL() local 85 if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { in webkitResolveLocalFileSystemURL()
|
D | WorkerGlobalScopeFileSystem.cpp | 51 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystem() 68 if (!secureContext->securityOrigin()->canAccessFileSystem()) { in webkitRequestFileSystemSync() 91 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemURL() 108 …if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->c… in webkitResolveLocalFileSystemSyncURL()
|
/external/chromium_org/third_party/WebKit/Source/web/ |
D | WebStorageEventDispatcherImpl.cpp | 49 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); in dispatchLocalStorageEvent() local 51 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchLocalStorageEvent() 61 RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(origin); in dispatchSessionStorageEvent() local 63 key, oldValue, newValue, securityOrigin.get(), pageURL, in dispatchSessionStorageEvent()
|
D | MediaKeysClientImpl.cpp | 24 WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); in createContentDecryptionModule() local 25 …return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySys… in createContentDecryptionModule()
|
/external/chromium_org/chrome/common/extensions/api/ |
D | webrtc_logging_private.idl | 27 // |securityOrigin| is the security origin for the tab identified by |tabId| 34 DOMString securityOrigin, 42 DOMString securityOrigin, 50 DOMString securityOrigin, 57 DOMString securityOrigin, 63 DOMString securityOrigin, 68 DOMString securityOrigin, 74 DOMString securityOrigin, 83 DOMString securityOrigin,
|
/external/chromium_org/third_party/WebKit/Source/core/storage/ |
D | StorageArea.cpp | 158 …key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& p… in dispatchLocalStorageEvent() argument 168 …if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !is… in dispatchLocalStorageEvent() 171 …umentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); in dispatchLocalStorageEvent() 188 …key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& p… in dispatchSessionStorageEvent() argument 199 …if (storage && toLocalFrame(frame)->document()->securityOrigin()->canAccess(securityOrigin) && !is… in dispatchSessionStorageEvent() 202 …ntation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); in dispatchSessionStorageEvent()
|
/external/chromium_org/third_party/WebKit/Source/modules/quota/ |
D | DeprecatedStorageQuota.cpp | 65 SecurityOrigin* securityOrigin = executionContext->securityOrigin(); in queryUsageAndQuota() local 66 if (securityOrigin->isUnique()) { in queryUsageAndQuota() 71 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryUsageAndQuota()
|
D | StorageQuota.cpp | 90 SecurityOrigin* securityOrigin = scriptState->executionContext()->securityOrigin(); in queryInfo() local 91 if (securityOrigin->isUnique()) { in queryInfo() 96 KURL storagePartition = KURL(KURL(), securityOrigin->toString()); in queryInfo()
|
/external/chromium_org/third_party/WebKit/Source/modules/indexeddb/ |
D | IDBFactory.cpp | 78 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in getDatabaseNames() 90 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in getDatabaseNames() 114 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in openInternal() 128 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in openInternal() 148 if (!scriptState->executionContext()->securityOrigin()->canAccessDatabase()) { in deleteDatabase() 160 …(), createDatabaseIdentifierFromSecurityOrigin(scriptState->executionContext()->securityOrigin())); in deleteDatabase()
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
D | SecurityContext.cpp | 44 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) in setSecurityOrigin() argument 46 m_securityOrigin = securityOrigin; in setSecurityOrigin() 64 return securityOrigin()->canAccess(other.get()); in isSecureTransitionTo()
|