• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /macosx-10.10/WebCore-7600.1.25/dom/

Lines Matching defs:content

1354 void Document::setContent(const String& content)
1361 m_parser->append(content.impl());
1837 // dangerous to try to stop it a second time, after page content has already been loaded and displayed
2147 // FIXME: For iOS, do we need to add content change observers that were removed in Document::suspendActiveDOMObjects()?
2793 void Document::processHttpEquiv(const String& equiv, const String& content)
2795 ASSERT(!equiv.isNull() && !content.isNull());
2811 m_styleSheetCollection.setSelectedStylesheetSetName(content);
2812 m_styleSheetCollection.setPreferredStylesheetSetName(content);
2819 if (frame && parseHTTPRefresh(content, true, delay, urlString)) {
2840 toHTMLDocument(this)->setCookie(content, IGNORE_EXCEPTION);
2845 setContentLanguage(content);
2849 parseDNSPrefetchControlHeader(content);
2858 if (frameLoader.shouldInterruptLoadForXFrameOptions(content, url(), requestIdentifier)) {
2859 String message = "Refused to display '" + url().stringCenterEllipsizedToLength() + "' in a frame because it set 'X-Frame-Options' to '" + content + "'.";
2871 contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicy::Enforce);
2875 contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicy::Report);
2879 contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicy::PrefixedEnforce);
2883 contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicy::PrefixedReport);
3385 // FIXME: We should remove firing DOMFocusOutEvent event when we are sure no content depends
3432 // FIXME: We should remove firing DOMFocusInEvent event when we are sure no content depends
4530 // so that dynamically inserted content can also benefit from sharing optimizations.
4655 // loading URL with a fresh content security policy.