/macosx-10.10/WebKit2-7600.1.25/Shared/API/c/ |
H A D | WKSecurityOrigin.cpp | 51 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(protocol)->string(), toImpl(host)->string(), port); local 52 return toAPI(securityOrigin.release().leakRef()); 55 WKStringRef WKSecurityOriginCopyDatabaseIdentifier(WKSecurityOriginRef securityOrigin) argument 57 return toCopiedAPI(toImpl(securityOrigin)->securityOrigin().databaseIdentifier()); 60 WKStringRef WKSecurityOriginCopyToString(WKSecurityOriginRef securityOrigin) argument 62 return toCopiedAPI(toImpl(securityOrigin)->securityOrigin().toString()); 65 WKStringRef WKSecurityOriginCopyProtocol(WKSecurityOriginRef securityOrigin) argument 67 return toCopiedAPI(toImpl(securityOrigin) 70 WKSecurityOriginCopyHost(WKSecurityOriginRef securityOrigin) argument 75 WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin) argument 84 WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin) argument 89 WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin) argument [all...] |
H A D | WKSecurityOrigin.h | 41 WK_EXPORT WKStringRef WKSecurityOriginCopyDatabaseIdentifier(WKSecurityOriginRef securityOrigin); 42 WK_EXPORT WKStringRef WKSecurityOriginCopyToString(WKSecurityOriginRef securityOrigin); 43 WK_EXPORT WKStringRef WKSecurityOriginCopyProtocol(WKSecurityOriginRef securityOrigin); 44 WK_EXPORT WKStringRef WKSecurityOriginCopyHost(WKSecurityOriginRef securityOrigin); 45 WK_EXPORT unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin);
|
/macosx-10.10/WebCore-7600.1.25/Modules/webdatabase/ |
H A D | DatabaseBackendContext.cpp | 43 SecurityOrigin* DatabaseBackendContext::securityOrigin() const function in class:WebCore::DatabaseBackendContext 45 return m_scriptExecutionContext->securityOrigin();
|
H A D | SQLTransactionClient.cpp | 48 database->securityOrigin(), database->stringIdentifier()); 54 unsigned long long currentQuota = DatabaseManager::manager().quotaForOrigin(database->securityOrigin()); 56 unsigned long long newQuota = DatabaseManager::manager().quotaForOrigin(database->securityOrigin());
|
H A D | DatabaseBackendContext.h | 49 SecurityOrigin* securityOrigin() const;
|
/macosx-10.10/WebKit2-7600.1.25/Shared/ |
H A D | WebSecurityOrigin.h | 47 static PassRefPtr<WebSecurityOrigin> create(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) argument 49 if (!securityOrigin) 51 return adoptRef(new WebSecurityOrigin(securityOrigin)); 54 WebCore::SecurityOrigin& securityOrigin() const { return *m_securityOrigin; } function in class:WebKit::WebSecurityOrigin 57 WebSecurityOrigin(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) argument 58 : m_securityOrigin(securityOrigin)
|
H A D | SecurityOriginData.cpp | 38 SecurityOriginData SecurityOriginData::fromSecurityOrigin(const SecurityOrigin* securityOrigin) argument 42 securityOriginData.protocol = securityOrigin->protocol(); 43 securityOriginData.host = securityOrigin->host(); 44 securityOriginData.port = securityOrigin->port(); 49 PassRefPtr<SecurityOrigin> SecurityOriginData::securityOrigin() const function in class:WebKit::SecurityOriginData
|
/macosx-10.10/WebCore-7600.1.25/storage/ |
H A D | StorageStrategy.cpp | 43 PassRefPtr<StorageNamespace> StorageStrategy::transientLocalStorageNamespace(PageGroup* pageGroup, SecurityOrigin* securityOrigin) argument 45 return StorageNamespaceImpl::transientLocalStorageNamespace(pageGroup, securityOrigin);
|
H A D | StorageNamespace.cpp | 39 PassRefPtr<StorageNamespace> StorageNamespace::transientLocalStorageNamespace(PageGroup* pageGroup, SecurityOrigin* securityOrigin) argument 41 return platformStrategies()->storageStrategy()->transientLocalStorageNamespace(pageGroup, securityOrigin);
|
H A D | StorageEventDispatcher.cpp | 41 void StorageEventDispatcher::dispatchSessionStorageEvents(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 51 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 55 dispatchSessionStorageEventsToFrames(*page, frames, key, oldValue, newValue, sourceFrame->document()->url(), securityOrigin); 58 void StorageEventDispatcher::dispatchLocalStorageEvents(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument 70 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin)) 75 dispatchLocalStorageEventsToFrames(page->group(), frames, key, oldValue, newValue, sourceFrame->document()->url(), securityOrigin); 78 void StorageEventDispatcher::dispatchSessionStorageEventsToFrames(Page& page, const Vector<RefPtr<Frame>>& frames, const String& key, const String& oldValue, const String& newValue, const String& url, SecurityOrigin* securityOrigin) argument 80 InspectorInstrumentation::didDispatchDOMStorageEvent(key, oldValue, newValue, SessionStorage, securityOrigin, 90 dispatchLocalStorageEventsToFrames(PageGroup& pageGroup, const Vector<RefPtr<Frame>>& frames, const String& key, const String& oldValue, const String& newValue, const String& url, SecurityOrigin* securityOrigin) argument [all...] |
/macosx-10.10/WebCore-7600.1.25/loader/ |
H A D | MixedContentChecker.cpp | 54 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const URL& url) argument 56 if (securityOrigin->protocol() != "https") 63 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const URL& url) const argument 65 if (!isMixedContent(securityOrigin, url)) 77 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const URL& url) const argument 79 if (!isMixedContent(securityOrigin, url)) 86 client().didRunInsecureContent(securityOrigin, url);
|
H A D | FrameLoadRequest.cpp | 40 : m_requester(frame->document()->securityOrigin())
|
H A D | CrossOriginAccessControl.cpp | 99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument 103 request.setHTTPOrigin(securityOrigin->toString()); 106 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument 109 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); 135 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument 143 if (securityOrigin->isUnique()) { 144 errorDescription = "Cannot make any requests from " + securityOrigin->toString() + "."; 149 if (accessControlOriginString != securityOrigin->toString()) { 153 errorDescription = "Origin " + securityOrigin->toString() + " is not allowed by Access-Control-Allow-Origin.";
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Models/ |
H A D | IndexedDatabase.js | 26 WebInspector.IndexedDatabase = function(name, securityOrigin, version, objectStores) 31 this._securityOrigin = securityOrigin; 32 this._host = parseSecurityOrigin(securityOrigin).host; 55 get securityOrigin()
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/ |
H A D | WebResourceCacheManagerProxy.cpp | 109 SecurityOriginData securityOrigin; local 110 securityOrigin.protocol = origin->securityOrigin().protocol(); 111 securityOrigin.host = origin->securityOrigin().host(); 112 securityOrigin.port = origin->securityOrigin().port(); 115 context()->sendToAllProcessesRelaunchingThemIfNecessary(Messages::WebResourceCacheManager::ClearCacheForOrigin(securityOrigin, cachesToClear));
|
/macosx-10.10/WebCore-7600.1.25/fileapi/ |
H A D | BlobURL.cpp | 44 URL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument 46 ASSERT(securityOrigin); 47 return createBlobURL(securityOrigin->toString());
|
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/ |
H A D | WebNotificationClient.cpp | 78 m_page->notificationPermissionRequestManager()->startRequest(context->securityOrigin(), callback); 85 m_page->notificationPermissionRequestManager()->startRequest(context->securityOrigin(), callback); 91 m_page->notificationPermissionRequestManager()->cancelRequest(context->securityOrigin()); 98 return m_page->notificationPermissionRequestManager()->permissionLevel(context->securityOrigin());
|
/macosx-10.10/WebCore-7600.1.25/dom/ |
H A D | SecurityContext.cpp | 47 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument 49 m_securityOrigin = securityOrigin; 67 return securityOrigin()->canAccess(other.get()); 75 if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique())
|
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Controllers/ |
H A D | StorageManager.js | 41 // is added whenever a new securityOrigin is discovered. Check for DOMStorageAgent.getDOMStorageItems, 42 // which was renamed at the same time the change to start using securityOrigin was made. 161 securityOrigin: objectStore.parentDatabase.securityOrigin, property in class:requestArguments 214 if (!frame.securityOrigin || frame.securityOrigin === "://") 219 var localStorageIdentifier = {securityOrigin: frame.securityOrigin, isLocalStorage: true}; property in class:localStorageIdentifier 223 var sessionStorageIdentifier = {securityOrigin: frame.securityOrigin, isLocalStorag property in class:sessionStorageIdentifier 233 var securityOrigin = frame.securityOrigin; variable [all...] |
/macosx-10.10/WebCore-7600.1.25/replay/ |
H A D | ReplayInputCreationMethods.cpp | 46 RefPtr<SecurityOrigin> originCopy = mainFrame.document()->securityOrigin()->isolatedCopy();
|
/macosx-10.10/WebKit-7600.1.25/win/ |
H A D | WebSecurityOrigin.cpp | 39 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) argument 41 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin); 46 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) argument 48 , m_securityOrigin(securityOrigin)
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/ |
H A D | WKUIDelegatePrivate.h | 40 - (void)_webView:(WKWebView *)webView decideDatabaseQuotaForSecurityOrigin:(_WKSecurityOrigin *)securityOrigin currentQuota:(unsigned long long)currentQuota currentOriginUsage:(unsigned long long)currentOriginUsage currentDatabaseUsage:(unsigned long long)currentUsage expectedUsage:(unsigned long long)expectedUsage decisionHandler:(void (^)(unsigned long long newQuota))decisionHandler; 43 - (void)_webView:(WKWebView *)webView decideWebApplicationCacheQuotaForSecurityOrigin:(_WKSecurityOrigin *)securityOrigin currentQuota:(unsigned long long)currentQuota totalBytesNeeded:(unsigned long long)totalBytesNeeded decisionHandler:(void (^)(unsigned long long newQuota))decisionHandler;
|
/macosx-10.10/WebCore-7600.1.25/inspector/ |
H A D | InspectorDOMStorageAgent.cpp | 156 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); local 158 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString(); 161 PassRefPtr<Inspector::TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) argument 164 .setSecurityOrigin(securityOrigin->toRawString()) 168 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Page*) argument 173 RefPtr<Inspector::TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage); 187 String securityOrigin; local 189 bool success = storageId->getString("securityOrigin", &securityOrigin); [all...] |
H A D | InspectorIndexedDBAgent.h | 61 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) override; 62 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) override; 63 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<Inspector::InspectorObject>* keyRange, PassRefPtr<RequestDataCallback>) override;
|
/macosx-10.10/WebCore-7600.1.25/Modules/indexeddb/ |
H A D | IDBFactory.cpp | 74 return document->frame() && document->page() && (!document->page()->usesEphemeralSession() || SchemeRegistry::allowsDatabaseAccessInPrivateBrowsing(document->securityOrigin()->protocol())); 98 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) { 104 m_backend->getDatabaseNames(request, *(context->securityOrigin()), *(context->topOrigin()), context, getIndexedDBDatabasePath(context)); 133 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) { 141 m_backend->open(name, version, transactionId, request, databaseCallbacks, *(context->securityOrigin()), *(context->topOrigin())); 154 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) { 160 m_backend->deleteDatabase(name, *context->securityOrigin(), *context->topOrigin(), request, context, getIndexedDBDatabasePath(context));
|