Searched refs:securityOrigin (Results 1 - 25 of 164) sorted by relevance

1234567

/macosx-10.10/WebKit2-7600.1.25/Shared/API/c/
H A DWKSecurityOrigin.cpp51 RefPtr<WebSecurityOrigin> securityOrigin = WebSecurityOrigin::create(toImpl(protocol)->string(), toImpl(host)->string(), port); local
52 return toAPI(securityOrigin.release().leakRef());
55 WKStringRef WKSecurityOriginCopyDatabaseIdentifier(WKSecurityOriginRef securityOrigin) argument
57 return toCopiedAPI(toImpl(securityOrigin)->securityOrigin().databaseIdentifier());
60 WKStringRef WKSecurityOriginCopyToString(WKSecurityOriginRef securityOrigin) argument
62 return toCopiedAPI(toImpl(securityOrigin)->securityOrigin().toString());
65 WKStringRef WKSecurityOriginCopyProtocol(WKSecurityOriginRef securityOrigin) argument
67 return toCopiedAPI(toImpl(securityOrigin)
70 WKSecurityOriginCopyHost(WKSecurityOriginRef securityOrigin) argument
75 WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin) argument
84 WKSecurityOriginGetHost(WKSecurityOriginRef securityOrigin) argument
89 WKSecurityOriginGetProtocol(WKSecurityOriginRef securityOrigin) argument
[all...]
H A DWKSecurityOrigin.h41 WK_EXPORT WKStringRef WKSecurityOriginCopyDatabaseIdentifier(WKSecurityOriginRef securityOrigin);
42 WK_EXPORT WKStringRef WKSecurityOriginCopyToString(WKSecurityOriginRef securityOrigin);
43 WK_EXPORT WKStringRef WKSecurityOriginCopyProtocol(WKSecurityOriginRef securityOrigin);
44 WK_EXPORT WKStringRef WKSecurityOriginCopyHost(WKSecurityOriginRef securityOrigin);
45 WK_EXPORT unsigned short WKSecurityOriginGetPort(WKSecurityOriginRef securityOrigin);
/macosx-10.10/WebCore-7600.1.25/Modules/webdatabase/
H A DDatabaseBackendContext.cpp43 SecurityOrigin* DatabaseBackendContext::securityOrigin() const function in class:WebCore::DatabaseBackendContext
45 return m_scriptExecutionContext->securityOrigin();
H A DSQLTransactionClient.cpp48 database->securityOrigin(), database->stringIdentifier());
54 unsigned long long currentQuota = DatabaseManager::manager().quotaForOrigin(database->securityOrigin());
56 unsigned long long newQuota = DatabaseManager::manager().quotaForOrigin(database->securityOrigin());
H A DDatabaseBackendContext.h49 SecurityOrigin* securityOrigin() const;
/macosx-10.10/WebKit2-7600.1.25/Shared/
H A DWebSecurityOrigin.h47 static PassRefPtr<WebSecurityOrigin> create(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) argument
49 if (!securityOrigin)
51 return adoptRef(new WebSecurityOrigin(securityOrigin));
54 WebCore::SecurityOrigin& securityOrigin() const { return *m_securityOrigin; } function in class:WebKit::WebSecurityOrigin
57 WebSecurityOrigin(PassRefPtr<WebCore::SecurityOrigin> securityOrigin) argument
58 : m_securityOrigin(securityOrigin)
H A DSecurityOriginData.cpp38 SecurityOriginData SecurityOriginData::fromSecurityOrigin(const SecurityOrigin* securityOrigin) argument
42 securityOriginData.protocol = securityOrigin->protocol();
43 securityOriginData.host = securityOrigin->host();
44 securityOriginData.port = securityOrigin->port();
49 PassRefPtr<SecurityOrigin> SecurityOriginData::securityOrigin() const function in class:WebKit::SecurityOriginData
/macosx-10.10/WebCore-7600.1.25/storage/
H A DStorageStrategy.cpp43 PassRefPtr<StorageNamespace> StorageStrategy::transientLocalStorageNamespace(PageGroup* pageGroup, SecurityOrigin* securityOrigin) argument
45 return StorageNamespaceImpl::transientLocalStorageNamespace(pageGroup, securityOrigin);
H A DStorageNamespace.cpp39 PassRefPtr<StorageNamespace> StorageNamespace::transientLocalStorageNamespace(PageGroup* pageGroup, SecurityOrigin* securityOrigin) argument
41 return platformStrategies()->storageStrategy()->transientLocalStorageNamespace(pageGroup, securityOrigin);
H A DStorageEventDispatcher.cpp41 void StorageEventDispatcher::dispatchSessionStorageEvents(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument
51 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
55 dispatchSessionStorageEventsToFrames(*page, frames, key, oldValue, newValue, sourceFrame->document()->url(), securityOrigin);
58 void StorageEventDispatcher::dispatchLocalStorageEvents(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, Frame* sourceFrame) argument
70 if (sourceFrame != frame && frame->document()->securityOrigin()->equal(securityOrigin))
75 dispatchLocalStorageEventsToFrames(page->group(), frames, key, oldValue, newValue, sourceFrame->document()->url(), securityOrigin);
78 void StorageEventDispatcher::dispatchSessionStorageEventsToFrames(Page& page, const Vector<RefPtr<Frame>>& frames, const String& key, const String& oldValue, const String& newValue, const String& url, SecurityOrigin* securityOrigin) argument
80 InspectorInstrumentation::didDispatchDOMStorageEvent(key, oldValue, newValue, SessionStorage, securityOrigin,
90 dispatchLocalStorageEventsToFrames(PageGroup& pageGroup, const Vector<RefPtr<Frame>>& frames, const String& key, const String& oldValue, const String& newValue, const String& url, SecurityOrigin* securityOrigin) argument
[all...]
/macosx-10.10/WebCore-7600.1.25/loader/
H A DMixedContentChecker.cpp54 bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const URL& url) argument
56 if (securityOrigin->protocol() != "https")
63 bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const URL& url) const argument
65 if (!isMixedContent(securityOrigin, url))
77 bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const URL& url) const argument
79 if (!isMixedContent(securityOrigin, url))
86 client().didRunInsecureContent(securityOrigin, url);
H A DFrameLoadRequest.cpp40 : m_requester(frame->document()->securityOrigin())
H A DCrossOriginAccessControl.cpp99 void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) argument
103 request.setHTTPOrigin(securityOrigin->toString());
106 ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) argument
109 updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
135 bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) argument
143 if (securityOrigin->isUnique()) {
144 errorDescription = "Cannot make any requests from " + securityOrigin->toString() + ".";
149 if (accessControlOriginString != securityOrigin->toString()) {
153 errorDescription = "Origin " + securityOrigin->toString() + " is not allowed by Access-Control-Allow-Origin.";
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Models/
H A DIndexedDatabase.js26 WebInspector.IndexedDatabase = function(name, securityOrigin, version, objectStores)
31 this._securityOrigin = securityOrigin;
32 this._host = parseSecurityOrigin(securityOrigin).host;
55 get securityOrigin()
/macosx-10.10/WebKit2-7600.1.25/UIProcess/
H A DWebResourceCacheManagerProxy.cpp109 SecurityOriginData securityOrigin; local
110 securityOrigin.protocol = origin->securityOrigin().protocol();
111 securityOrigin.host = origin->securityOrigin().host();
112 securityOrigin.port = origin->securityOrigin().port();
115 context()->sendToAllProcessesRelaunchingThemIfNecessary(Messages::WebResourceCacheManager::ClearCacheForOrigin(securityOrigin, cachesToClear));
/macosx-10.10/WebCore-7600.1.25/fileapi/
H A DBlobURL.cpp44 URL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) argument
46 ASSERT(securityOrigin);
47 return createBlobURL(securityOrigin->toString());
/macosx-10.10/WebKit2-7600.1.25/WebProcess/WebCoreSupport/
H A DWebNotificationClient.cpp78 m_page->notificationPermissionRequestManager()->startRequest(context->securityOrigin(), callback);
85 m_page->notificationPermissionRequestManager()->startRequest(context->securityOrigin(), callback);
91 m_page->notificationPermissionRequestManager()->cancelRequest(context->securityOrigin());
98 return m_page->notificationPermissionRequestManager()->permissionLevel(context->securityOrigin());
/macosx-10.10/WebCore-7600.1.25/dom/
H A DSecurityContext.cpp47 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) argument
49 m_securityOrigin = securityOrigin;
67 return securityOrigin()->canAccess(other.get());
75 if (isSandboxed(SandboxOrigin) && securityOrigin() && !securityOrigin()->isUnique())
/macosx-10.10/WebInspectorUI-7600.1.17/UserInterface/Controllers/
H A DStorageManager.js41 // is added whenever a new securityOrigin is discovered. Check for DOMStorageAgent.getDOMStorageItems,
42 // which was renamed at the same time the change to start using securityOrigin was made.
161 securityOrigin: objectStore.parentDatabase.securityOrigin, property in class:requestArguments
214 if (!frame.securityOrigin || frame.securityOrigin === "://")
219 var localStorageIdentifier = {securityOrigin: frame.securityOrigin, isLocalStorage: true}; property in class:localStorageIdentifier
223 var sessionStorageIdentifier = {securityOrigin: frame.securityOrigin, isLocalStorag property in class:sessionStorageIdentifier
233 var securityOrigin = frame.securityOrigin; variable
[all...]
/macosx-10.10/WebCore-7600.1.25/replay/
H A DReplayInputCreationMethods.cpp46 RefPtr<SecurityOrigin> originCopy = mainFrame.document()->securityOrigin()->isolatedCopy();
/macosx-10.10/WebKit-7600.1.25/win/
H A DWebSecurityOrigin.cpp39 WebSecurityOrigin* WebSecurityOrigin::createInstance(SecurityOrigin* securityOrigin) argument
41 WebSecurityOrigin* origin = new WebSecurityOrigin(securityOrigin);
46 WebSecurityOrigin::WebSecurityOrigin(SecurityOrigin* securityOrigin) argument
48 , m_securityOrigin(securityOrigin)
/macosx-10.10/WebKit2-7600.1.25/UIProcess/API/Cocoa/
H A DWKUIDelegatePrivate.h40 - (void)_webView:(WKWebView *)webView decideDatabaseQuotaForSecurityOrigin:(_WKSecurityOrigin *)securityOrigin currentQuota:(unsigned long long)currentQuota currentOriginUsage:(unsigned long long)currentOriginUsage currentDatabaseUsage:(unsigned long long)currentUsage expectedUsage:(unsigned long long)expectedUsage decisionHandler:(void (^)(unsigned long long newQuota))decisionHandler;
43 - (void)_webView:(WKWebView *)webView decideWebApplicationCacheQuotaForSecurityOrigin:(_WKSecurityOrigin *)securityOrigin currentQuota:(unsigned long long)currentQuota totalBytesNeeded:(unsigned long long)totalBytesNeeded decisionHandler:(void (^)(unsigned long long newQuota))decisionHandler;
/macosx-10.10/WebCore-7600.1.25/inspector/
H A DInspectorDOMStorageAgent.cpp156 RefPtr<SecurityOrigin> securityOrigin = document->securityOrigin(); local
158 return storageId(securityOrigin.get(), isLocalStorage)->toJSONString();
161 PassRefPtr<Inspector::TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) argument
164 .setSecurityOrigin(securityOrigin->toRawString())
168 void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin, Page*) argument
173 RefPtr<Inspector::TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage);
187 String securityOrigin; local
189 bool success = storageId->getString("securityOrigin", &securityOrigin);
[all...]
H A DInspectorIndexedDBAgent.h61 virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) override;
62 virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) override;
63 virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<Inspector::InspectorObject>* keyRange, PassRefPtr<RequestDataCallback>) override;
/macosx-10.10/WebCore-7600.1.25/Modules/indexeddb/
H A DIDBFactory.cpp74 return document->frame() && document->page() && (!document->page()->usesEphemeralSession() || SchemeRegistry::allowsDatabaseAccessInPrivateBrowsing(document->securityOrigin()->protocol()));
98 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) {
104 m_backend->getDatabaseNames(request, *(context->securityOrigin()), *(context->topOrigin()), context, getIndexedDBDatabasePath(context));
133 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) {
141 m_backend->open(name, version, transactionId, request, databaseCallbacks, *(context->securityOrigin()), *(context->topOrigin()));
154 if (!context->securityOrigin()->canAccessDatabase(context->topOrigin())) {
160 m_backend->deleteDatabase(name, *context->securityOrigin(), *context->topOrigin(), request, context, getIndexedDBDatabasePath(context));

Completed in 235 milliseconds

1234567