securityOrigin     52 Source/bindings/v8/BindingSecurity.cpp     if (callingWindow->document()->securityOrigin()->canAccess(targetDocument->securityOrigin()))
securityOrigin    158 Source/bindings/v8/DOMWrapperWorld.cpp void DOMWrapperWorld::setIsolatedWorldSecurityOrigin(int worldId, PassRefPtr<SecurityOrigin> securityOrigin)
securityOrigin    161 Source/bindings/v8/DOMWrapperWorld.cpp     if (securityOrigin)
securityOrigin    162 Source/bindings/v8/DOMWrapperWorld.cpp         isolatedWorldSecurityOrigins().set(worldId, securityOrigin);
securityOrigin    504 Source/bindings/v8/ScriptController.cpp         ASSERT(m_frame->document()->securityOrigin()->isUnique());
securityOrigin    227 Source/bindings/v8/V8WindowShell.cpp             setSecurityToken(m_frame->document()->securityOrigin());
securityOrigin    421 Source/bindings/v8/V8WindowShell.cpp     updateSecurityOrigin(m_frame->document()->securityOrigin());
securityOrigin     58 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp     RefPtr<SecurityOrigin> securityOrigin;
securityOrigin     62 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp             securityOrigin = world.isolatedWorldSecurityOrigin();
securityOrigin     65 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp     RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin);
securityOrigin    109 Source/core/css/CSSImageSetValue.cpp                 request.setCrossOriginAccessControl(loader->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested);
securityOrigin     67 Source/core/css/CSSImageValue.cpp             request.setCrossOriginAccessControl(fetcher->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested);
securityOrigin    277 Source/core/css/CSSStyleSheet.cpp     if (document->securityOrigin()->canRequest(baseURL))
securityOrigin     83 Source/core/css/StyleRuleImport.cpp     m_styleSheet->parseAuthorStyleSheet(cachedStyleSheet, document ? document->securityOrigin() : 0);
securityOrigin    319 Source/core/css/StyleSheetContents.cpp void StyleSheetContents::parseAuthorStyleSheet(const CSSStyleSheetResource* cachedStyleSheet, const SecurityOrigin* securityOrigin)
securityOrigin    337 Source/core/css/StyleSheetContents.cpp         bool isCrossOriginCSS = !securityOrigin || !securityOrigin->canRequest(baseURL());
securityOrigin     75 Source/core/css/resolver/ScopedStyleResolver.cpp     AddRuleFlags addRuleFlags = resolver->document().securityOrigin()->canRequest(sheet->baseURL()) ? RuleHasDocumentSecurityOrigin : RuleHasNoSpecialState;
securityOrigin    221 Source/core/dom/DOMImplementation.cpp     doc->setSecurityOrigin(m_document.securityOrigin()->isolatedCopy());
securityOrigin    347 Source/core/dom/DOMImplementation.cpp     d->setSecurityOrigin(m_document.securityOrigin()->isolatedCopy());
securityOrigin     79 Source/core/dom/DOMURL.cpp     KURL publicURL = BlobURL::createPublicURL(executionContext->securityOrigin());
securityOrigin     83 Source/core/dom/DOMURL.cpp     executionContext->publicURLManager().registerURL(executionContext->securityOrigin(), publicURL, registrable, uuid);
securityOrigin    325 Source/core/dom/Document.cpp         const SecurityOrigin* ancestorSecurityOrigin = ancestorDocument->securityOrigin();
securityOrigin   2262 Source/core/dom/Document.cpp         setSecurityOrigin(ownerDocument->securityOrigin());
securityOrigin   2838 Source/core/dom/Document.cpp     ASSERT(securityOrigin());
securityOrigin   2839 Source/core/dom/Document.cpp     SecurityOrigin& origin = *securityOrigin();
securityOrigin   2880 Source/core/dom/Document.cpp         if (!ancestorFrame->document()->securityOrigin()->canAccess(securityOrigin()))
securityOrigin   3137 Source/core/dom/Document.cpp     return securityOrigin()->toString();
securityOrigin   3285 Source/core/dom/Document.cpp     setSecurityOrigin(other.securityOrigin()->isolatedCopy());
securityOrigin   3861 Source/core/dom/Document.cpp     if (!securityOrigin()->canAccessCookies()) {
securityOrigin   3887 Source/core/dom/Document.cpp     if (!securityOrigin()->canAccessCookies()) {
securityOrigin   3913 Source/core/dom/Document.cpp     return securityOrigin()->domain();
securityOrigin   3923 Source/core/dom/Document.cpp     if (SchemeRegistry::isDomainRelaxationForbiddenForURLScheme(securityOrigin()->protocol())) {
securityOrigin   3924 Source/core/dom/Document.cpp         exceptionState.throwSecurityError("Assignment is forbidden for the '" + securityOrigin()->protocol() + "' scheme.");
securityOrigin   3934 Source/core/dom/Document.cpp     OriginAccessEntry accessEntry(securityOrigin()->protocol(), newDomain, OriginAccessEntry::AllowSubdomains, ipAddressSetting);
securityOrigin   3935 Source/core/dom/Document.cpp     OriginAccessEntry::MatchResult result = accessEntry.matchesOrigin(*securityOrigin());
securityOrigin   3946 Source/core/dom/Document.cpp     securityOrigin()->setDomainFromDOM(newDomain);
securityOrigin   3948 Source/core/dom/Document.cpp         m_frame->script().updateSecurityOrigin(securityOrigin());
securityOrigin   4590 Source/core/dom/Document.cpp         ASSERT(securityOrigin());
securityOrigin   4614 Source/core/dom/Document.cpp             securityOrigin()->grantUniversalAccess();
securityOrigin   4615 Source/core/dom/Document.cpp         } else if (securityOrigin()->isLocal()) {
securityOrigin   4618 Source/core/dom/Document.cpp                 securityOrigin()->grantUniversalAccess();
securityOrigin   4623 Source/core/dom/Document.cpp                 securityOrigin()->enforceFilePathSeparation();
securityOrigin   4649 Source/core/dom/Document.cpp         if (initializer.owner()->securityOrigin()->canLoadLocalResources())
securityOrigin   4650 Source/core/dom/Document.cpp             securityOrigin()->grantLoadLocalResources();
securityOrigin   4657 Source/core/dom/Document.cpp     setSecurityOrigin(initializer.owner()->securityOrigin());
securityOrigin   4712 Source/core/dom/Document.cpp     m_frame->script().updateSecurityOrigin(securityOrigin());
securityOrigin   4787 Source/core/dom/Document.cpp     m_isDNSPrefetchEnabled = settings && settings->dnsPrefetchingEnabled() && securityOrigin()->protocol() == "http";
securityOrigin    248 Source/core/dom/Document.h     using SecurityContext::securityOrigin;
securityOrigin    128 Source/core/dom/ExecutionContext.cpp     return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin);
securityOrigin    237 Source/core/dom/ExecutionContext.cpp     return m_client->securityContext().securityOrigin();
securityOrigin    329 Source/core/dom/ExecutionContext.cpp     if (isSandboxed(SandboxOrigin) && m_client->securityContext().securityOrigin() && !m_client->securityContext().securityOrigin()->isUnique()) {
securityOrigin     72 Source/core/dom/ExecutionContext.h     SecurityOrigin* securityOrigin() const;
securityOrigin    262 Source/core/dom/ScriptLoader.cpp             request.setCrossOriginAccessControl(elementDocument->securityOrigin(), crossOriginMode);
securityOrigin    329 Source/core/dom/ScriptLoader.cpp         if (!m_isExternalScript || (sourceCode.resource() && sourceCode.resource()->passesAccessControlCheck(m_element->document().securityOrigin())))
securityOrigin     44 Source/core/dom/SecurityContext.cpp void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin)
securityOrigin     46 Source/core/dom/SecurityContext.cpp     m_securityOrigin = securityOrigin;
securityOrigin     64 Source/core/dom/SecurityContext.cpp     return securityOrigin()->canAccess(other.get());
securityOrigin     42 Source/core/dom/SecurityContext.h     SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); }
securityOrigin    103 Source/core/fetch/CrossOriginAccessControl.cpp void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials)
securityOrigin    108 Source/core/fetch/CrossOriginAccessControl.cpp     if (securityOrigin)
securityOrigin    109 Source/core/fetch/CrossOriginAccessControl.cpp         request.setHTTPOrigin(securityOrigin->toAtomicString());
securityOrigin    112 Source/core/fetch/CrossOriginAccessControl.cpp ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin)
securityOrigin    115 Source/core/fetch/CrossOriginAccessControl.cpp     updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials);
securityOrigin    145 Source/core/fetch/CrossOriginAccessControl.cpp bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription)
securityOrigin    151 Source/core/fetch/CrossOriginAccessControl.cpp         errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    162 Source/core/fetch/CrossOriginAccessControl.cpp             errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    165 Source/core/fetch/CrossOriginAccessControl.cpp     } else if (accessControlOriginString != securityOrigin->toAtomicString()) {
securityOrigin    167 Source/core/fetch/CrossOriginAccessControl.cpp             errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    169 Source/core/fetch/CrossOriginAccessControl.cpp             errorDescription = "The 'Access-Control-Allow-Origin' header contains multiple values '" + accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    173 Source/core/fetch/CrossOriginAccessControl.cpp                 errorDescription = "The 'Access-Control-Allow-Origin' header contains the invalid value '" + accessControlOriginString + "'. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    175 Source/core/fetch/CrossOriginAccessControl.cpp                 errorDescription = "The 'Access-Control-Allow-Origin' header has a value '" + accessControlOriginString + "' that is not equal to the supplied origin. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.";
securityOrigin    228 Source/core/fetch/CrossOriginAccessControl.cpp bool CrossOriginAccessControl::handleRedirect(Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage)
securityOrigin    234 Source/core/fetch/CrossOriginAccessControl.cpp     bool redirectCrossOrigin = !securityOrigin->canRequest(requestURL);
securityOrigin    237 Source/core/fetch/CrossOriginAccessControl.cpp     if (!securityOrigin->canRequest(originalURL)) {
securityOrigin    246 Source/core/fetch/CrossOriginAccessControl.cpp             allowRedirect = passesAccessControlCheck(redirectResponse, withCredentials, securityOrigin, errorDescription);
securityOrigin    252 Source/core/fetch/CrossOriginAccessControl.cpp                     options.securityOrigin = SecurityOrigin::createUnique();
securityOrigin    253 Source/core/fetch/CrossOriginAccessControl.cpp                     securityOrigin = options.securityOrigin.get();
securityOrigin    266 Source/core/fetch/CrossOriginAccessControl.cpp         request.setHTTPOrigin(securityOrigin->toAtomicString());
securityOrigin     77 Source/core/fetch/FetchRequest.cpp     m_options.securityOrigin = origin;
securityOrigin    472 Source/core/fetch/ImageResource.cpp bool ImageResource::isAccessAllowed(SecurityOrigin* securityOrigin)
securityOrigin    476 Source/core/fetch/ImageResource.cpp     if (passesAccessControlCheck(securityOrigin))
securityOrigin    478 Source/core/fetch/ImageResource.cpp     return !securityOrigin->taintsCanvas(response().url());
securityOrigin    264 Source/core/fetch/Resource.cpp bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin)
securityOrigin    267 Source/core/fetch/Resource.cpp     return passesAccessControlCheck(securityOrigin, ignoredErrorDescription);
securityOrigin    270 Source/core/fetch/Resource.cpp bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin, String& errorDescription)
securityOrigin    272 Source/core/fetch/Resource.cpp     return WebCore::passesAccessControlCheck(m_response, resourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials, securityOrigin, errorDescription);
securityOrigin    429 Source/core/fetch/ResourceFetcher.cpp             if (!f->loader().mixedContentChecker()->canRunInsecureContent(m_document->securityOrigin(), url))
securityOrigin    432 Source/core/fetch/ResourceFetcher.cpp             if (top != f && !top->loader().mixedContentChecker()->canRunInsecureContent(top->document()->securityOrigin(), url))
securityOrigin    438 Source/core/fetch/ResourceFetcher.cpp             if (!top->loader().mixedContentChecker()->canDisplayInsecureContent(top->document()->securityOrigin(), url))
securityOrigin    449 Source/core/fetch/ResourceFetcher.cpp     SecurityOrigin* securityOrigin = options.securityOrigin.get();
securityOrigin    450 Source/core/fetch/ResourceFetcher.cpp     if (!securityOrigin && document())
securityOrigin    451 Source/core/fetch/ResourceFetcher.cpp         securityOrigin = document()->securityOrigin();
securityOrigin    453 Source/core/fetch/ResourceFetcher.cpp     if (securityOrigin && !securityOrigin->canDisplay(url)) {
securityOrigin    480 Source/core/fetch/ResourceFetcher.cpp         if (originRestriction == FetchRequest::RestrictToSameOrigin && !securityOrigin->canRequest(url)) {
securityOrigin    488 Source/core/fetch/ResourceFetcher.cpp         if (!securityOrigin->canRequest(url)) {
securityOrigin    559 Source/core/fetch/ResourceFetcher.cpp         sourceOrigin = document()->securityOrigin();
securityOrigin   1289 Source/core/fetch/ResourceFetcher.cpp         SecurityOrigin* sourceOrigin = options.securityOrigin.get();
securityOrigin   1291 Source/core/fetch/ResourceFetcher.cpp             sourceOrigin = document()->securityOrigin();
securityOrigin    342 Source/core/fetch/ResourceLoader.cpp         if (!m_host->canAccessResource(resource, m_options.securityOrigin.get(), response.url())) {
securityOrigin    135 Source/core/fetch/ResourceLoaderOptions.h     RefPtr<SecurityOrigin> securityOrigin;
securityOrigin     87 Source/core/fileapi/FileReaderLoader.cpp     m_urlForReading = BlobURL::createPublicURL(executionContext->securityOrigin());
securityOrigin     95 Source/core/fileapi/FileReaderLoader.cpp         BlobRegistry::registerPublicBlobURL(executionContext->securityOrigin(), m_urlForReading, blobData);
securityOrigin     98 Source/core/fileapi/FileReaderLoader.cpp         BlobRegistry::registerStreamURL(executionContext->securityOrigin(), m_urlForReading, stream->url());
securityOrigin    742 Source/core/frame/DOMWindow.cpp     if (!document->securityOrigin()->canAccessLocalStorage()) {
securityOrigin    764 Source/core/frame/DOMWindow.cpp     OwnPtrWillBeRawPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin());
securityOrigin    784 Source/core/frame/DOMWindow.cpp     if (!document->securityOrigin()->canAccessLocalStorage()) {
securityOrigin    807 Source/core/frame/DOMWindow.cpp     OwnPtrWillBeRawPtr<StorageArea> storageArea = StorageNamespace::localStorageArea(document->securityOrigin());
securityOrigin    830 Source/core/frame/DOMWindow.cpp         target = sourceDocument->securityOrigin();
securityOrigin    849 Source/core/frame/DOMWindow.cpp     String sourceOrigin = sourceDocument->securityOrigin()->toString();
securityOrigin    887 Source/core/frame/DOMWindow.cpp         if (!intendedTargetOrigin->isSameSchemeHostPort(document()->securityOrigin())) {
securityOrigin    888 Source/core/frame/DOMWindow.cpp             String message = ExceptionMessages::failedToExecute("postMessage", "DOMWindow", "The target origin provided ('" + intendedTargetOrigin->toString() + "') does not match the recipient window's origin ('" + document()->securityOrigin()->toString() + "').");
securityOrigin   1689 Source/core/frame/DOMWindow.cpp     ASSERT(!callingWindow->document()->securityOrigin()->canAccess(document()->securityOrigin()));
securityOrigin   1691 Source/core/frame/DOMWindow.cpp     SecurityOrigin* activeOrigin = callingWindow->document()->securityOrigin();
securityOrigin   1708 Source/core/frame/DOMWindow.cpp     ASSERT(!callingWindow->document()->securityOrigin()->canAccess(document()->securityOrigin()));
securityOrigin   1711 Source/core/frame/DOMWindow.cpp     SecurityOrigin* activeOrigin = callingWindow->document()->securityOrigin();
securityOrigin   1712 Source/core/frame/DOMWindow.cpp     SecurityOrigin* targetOrigin = document()->securityOrigin();
securityOrigin   1759 Source/core/frame/DOMWindow.cpp         if (callingWindow.document()->securityOrigin()->canAccess(document()->securityOrigin()))
securityOrigin    132 Source/core/frame/History.cpp     if (!fullURL.isValid() || !m_frame->document()->securityOrigin()->canRequest(fullURL)) {
securityOrigin    134 Source/core/frame/History.cpp         exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'.");
securityOrigin    124 Source/core/frame/Location.cpp         origins->append(frame->document()->securityOrigin()->toString());
securityOrigin     39 Source/core/frame/csp/CSPSource.cpp         String protectedResourceScheme(m_policy->securityOrigin()->protocol());
securityOrigin    484 Source/core/frame/csp/CSPSourceList.cpp     m_list.append(CSPSource(m_policy, m_policy->securityOrigin()->protocol(), m_policy->securityOrigin()->host(), m_policy->securityOrigin()->port(), String(), false, false));
securityOrigin    544 Source/core/frame/csp/ContentSecurityPolicy.cpp     return m_client->securityContext().securityOrigin();
securityOrigin    569 Source/core/frame/csp/ContentSecurityPolicy.cpp     return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString();
securityOrigin    166 Source/core/frame/csp/ContentSecurityPolicy.h     SecurityOrigin* securityOrigin() const;
securityOrigin    669 Source/core/html/HTMLAnchorElement.cpp     if (!document.securityOrigin()->canDisplay(url))
securityOrigin    215 Source/core/html/HTMLAppletElement.cpp     if (!document().securityOrigin()->canDisplay(url)) {
securityOrigin    413 Source/core/html/HTMLCanvasElement.cpp     return document().securityOrigin();
securityOrigin    121 Source/core/html/HTMLCanvasElement.h     SecurityOrigin* securityOrigin() const;
securityOrigin    224 Source/core/html/HTMLFrameOwnerElement.cpp     if (!document().securityOrigin()->canDisplay(url)) {
securityOrigin    489 Source/core/html/HTMLLinkElement.cpp     styleSheet->parseAuthorStyleSheet(cachedStyleSheet, m_owner->document().securityOrigin());
securityOrigin    626 Source/core/html/HTMLLinkElement.cpp         if (!document().securityOrigin()->canDisplay(builder.url()))
securityOrigin    670 Source/core/html/HTMLLinkElement.cpp             request.setCrossOriginAccessControl(document().securityOrigin(), crossOriginMode);
securityOrigin   1310 Source/core/html/HTMLMediaElement.cpp     if (!frame || !document().securityOrigin()->canDisplay(url)) {
securityOrigin    414 Source/core/html/HTMLPlugInElement.cpp         && !document().securityOrigin()->canAccess(contentDocument()->securityOrigin()))
securityOrigin    538 Source/core/html/HTMLPlugInElement.cpp     if (!document().securityOrigin()->canDisplay(url)) {
securityOrigin    552 Source/core/html/HTMLPlugInElement.cpp     return frame->loader().mixedContentChecker()->canRunInsecureContent(document().securityOrigin(), url);
securityOrigin   1582 Source/core/html/canvas/CanvasRenderingContext2D.cpp     if (canvas()->originClean() && imageSource->wouldTaintOrigin(canvas()->securityOrigin()))
securityOrigin   1757 Source/core/html/canvas/CanvasRenderingContext2D.cpp     return CanvasPattern::create(imageForRendering.release(), repeatX, repeatY, !imageSource->wouldTaintOrigin(canvas()->securityOrigin()));
securityOrigin   5129 Source/core/html/canvas/WebGLRenderingContextBase.cpp     if (image->wouldTaintOrigin(canvas()->securityOrigin())) {
securityOrigin   5142 Source/core/html/canvas/WebGLRenderingContextBase.cpp     if (canvas->wouldTaintOrigin(this->canvas()->securityOrigin())) {
securityOrigin   5155 Source/core/html/canvas/WebGLRenderingContextBase.cpp     if (video->wouldTaintOrigin(canvas()->securityOrigin())) {
securityOrigin     91 Source/core/html/imports/HTMLImportsController.cpp     bool sameOriginRequest = securityOrigin()->canRequest(request.url());
securityOrigin     93 Source/core/html/imports/HTMLImportsController.cpp         securityOrigin(), sameOriginRequest ? AllowStoredCredentials : DoNotAllowStoredCredentials,
securityOrigin    125 Source/core/html/imports/HTMLImportsController.cpp     return m_master->securityOrigin();
securityOrigin     75 Source/core/html/imports/HTMLImportsController.h     SecurityOrigin* securityOrigin() const;
securityOrigin     60 Source/core/html/parser/HTMLResourcePreloader.cpp         request.setCrossOriginAccessControl(document->securityOrigin(), m_allowCredentials);
securityOrigin    290 Source/core/html/parser/XSSAuditor.cpp             if (MixedContentChecker::isMixedContent(document->securityOrigin(), xssProtectionReportURL)) {
securityOrigin    440 Source/core/html/shadow/TextControlInnerElements.cpp     if (speechInput()->startRecognition(m_listenerId, rect, language, grammar, document().securityOrigin()))
securityOrigin    169 Source/core/inspector/InspectorDOMStorageAgent.cpp PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage)
securityOrigin    172 Source/core/inspector/InspectorDOMStorageAgent.cpp         .setSecurityOrigin(securityOrigin->toRawString())
securityOrigin    176 Source/core/inspector/InspectorDOMStorageAgent.cpp void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin)
securityOrigin    181 Source/core/inspector/InspectorDOMStorageAgent.cpp     RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage);
securityOrigin    195 Source/core/inspector/InspectorDOMStorageAgent.cpp     String securityOrigin;
securityOrigin    197 Source/core/inspector/InspectorDOMStorageAgent.cpp     bool success = storageId->getString("securityOrigin", &securityOrigin);
securityOrigin    206 Source/core/inspector/InspectorDOMStorageAgent.cpp     LocalFrame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin);
securityOrigin    215 Source/core/inspector/InspectorDOMStorageAgent.cpp         return StorageNamespace::localStorageArea(frame->document()->securityOrigin());
securityOrigin    216 Source/core/inspector/InspectorDOMStorageAgent.cpp     return m_pageAgent->page()->sessionStorage()->storageArea(frame->document()->securityOrigin());
securityOrigin     74 Source/core/inspector/InspectorInspectorAgent.cpp     String origin = frame->document()->securityOrigin()->toRawString();
securityOrigin    930 Source/core/inspector/InspectorPageAgent.cpp         RefPtr<SecurityOrigin> documentOrigin = frame->document()->securityOrigin();
securityOrigin   1076 Source/core/inspector/InspectorPageAgent.cpp         .setSecurityOrigin(frame->document()->securityOrigin()->toRawString());
securityOrigin    181 Source/core/inspector/PageRuntimeAgent.cpp void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState, SecurityOrigin* securityOrigin, bool isPageContext)
securityOrigin    183 Source/core/inspector/PageRuntimeAgent.cpp     ASSERT(securityOrigin || isPageContext);
securityOrigin    185 Source/core/inspector/PageRuntimeAgent.cpp     String name = securityOrigin ? securityOrigin->toRawString() : "";
securityOrigin    378 Source/core/loader/DocumentLoader.cpp         if (!top->loader().mixedContentChecker()->canRunInsecureContent(top->document()->securityOrigin(), newRequest.url())) {
securityOrigin    804 Source/core/loader/DocumentLoader.cpp         document->setSecurityOrigin(ownerDocument->securityOrigin());
securityOrigin     74 Source/core/loader/DocumentThreadableLoader.cpp     , m_sameOriginRequest(securityOrigin()->canRequest(request.url()))
securityOrigin    109 Source/core/loader/DocumentThreadableLoader.cpp         updateRequestForAccessControl(crossOriginRequest, securityOrigin(), m_options.allowCredentials);
securityOrigin    119 Source/core/loader/DocumentThreadableLoader.cpp         if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) {
securityOrigin    122 Source/core/loader/DocumentThreadableLoader.cpp             ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin());
securityOrigin    192 Source/core/loader/DocumentThreadableLoader.cpp                             && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription));
securityOrigin    208 Source/core/loader/DocumentThreadableLoader.cpp                 m_options.securityOrigin = SecurityOrigin::createUnique();
securityOrigin    270 Source/core/loader/DocumentThreadableLoader.cpp         if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) {
securityOrigin    288 Source/core/loader/DocumentThreadableLoader.cpp         CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest->url(), preflightResult.release());
securityOrigin    291 Source/core/loader/DocumentThreadableLoader.cpp             if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) {
securityOrigin    355 Source/core/loader/DocumentThreadableLoader.cpp     actualRequest->setHTTPOrigin(securityOrigin()->toAtomicString());
securityOrigin    438 Source/core/loader/DocumentThreadableLoader.cpp     return m_sameOriginRequest && securityOrigin()->canRequest(url);
securityOrigin    450 Source/core/loader/DocumentThreadableLoader.cpp     return m_options.securityOrigin ? m_options.securityOrigin.get() : m_document->securityOrigin();
securityOrigin    100 Source/core/loader/DocumentThreadableLoader.h         SecurityOrigin* securityOrigin() const;
securityOrigin    671 Source/core/loader/FrameLoader.cpp     if (!request.originDocument()->securityOrigin()->canDisplay(url)) {
securityOrigin    767 Source/core/loader/FrameLoader.cpp         RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString(item->referrer().referrer);
securityOrigin    768 Source/core/loader/FrameLoader.cpp         FrameLoader::addHTTPOriginIfNeeded(request, securityOrigin->toAtomicString());
securityOrigin    863 Source/core/loader/FrameLoader.cpp         RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(pdl->request().url());
securityOrigin    864 Source/core/loader/FrameLoader.cpp         pdl->timing()->setHasSameOriginAsPreviousDocument(securityOrigin->canRequest(m_frame->document()->url()));
securityOrigin   1320 Source/core/loader/FrameLoader.cpp         if (!origin->isSameSchemeHostPort(topFrame->document()->securityOrigin()))
securityOrigin   1323 Source/core/loader/FrameLoader.cpp             if (!origin->isSameSchemeHostPort(frame->document()->securityOrigin())) {
securityOrigin    146 Source/core/loader/ImageLoader.cpp             request.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode);
securityOrigin    130 Source/core/loader/LinkLoader.cpp             linkRequest.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode);
securityOrigin     52 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url)
securityOrigin     54 Source/core/loader/MixedContentChecker.cpp     if (securityOrigin->protocol() != "https")
securityOrigin     61 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
securityOrigin     63 Source/core/loader/MixedContentChecker.cpp     if (!isMixedContent(securityOrigin, url))
securityOrigin     67 Source/core/loader/MixedContentChecker.cpp     bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url);
securityOrigin     76 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const
securityOrigin     78 Source/core/loader/MixedContentChecker.cpp     if (!isMixedContent(securityOrigin, url))
securityOrigin     82 Source/core/loader/MixedContentChecker.cpp     bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url);
securityOrigin     86 Source/core/loader/MixedContentChecker.cpp         client()->didRunInsecureContent(securityOrigin, url);
securityOrigin    308 Source/core/loader/NavigationScheduler.cpp     if (originDocument->securityOrigin()->canAccess(m_frame->document()->securityOrigin())) {
securityOrigin     60 Source/core/loader/PingLoader.cpp     if (!frame->document()->securityOrigin()->canDisplay(url)) {
securityOrigin     89 Source/core/loader/PingLoader.cpp     if (frame->document()->securityOrigin()->isSameSchemeHostPort(pingOrigin.get()))
securityOrigin    115 Source/core/loader/PingLoader.cpp     PingLoader::start(frame, request, initiatorInfo, SecurityOrigin::create(reportURL)->isSameSchemeHostPort(frame->document()->securityOrigin()) ? AllowStoredCredentials : DoNotAllowStoredCredentials);
securityOrigin     43 Source/core/loader/TextResourceDecoderBuilder.cpp     return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin());
securityOrigin     85 Source/core/loader/TextTrackLoader.cpp void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url)
securityOrigin     87 Source/core/loader/TextTrackLoader.cpp     String consoleMessage("Text track from origin '" + SecurityOrigin::create(url)->toString() + "' has been blocked from loading: Not at same origin as the document, and parent of track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + "' is therefore not allowed access.");
securityOrigin    114 Source/core/loader/TextTrackLoader.cpp         cueRequest.setCrossOriginAccessControl(m_document.securityOrigin(), crossOriginMode);
securityOrigin    115 Source/core/loader/TextTrackLoader.cpp     } else if (!m_document.securityOrigin()->canRequest(url)) {
securityOrigin    117 Source/core/loader/TextTrackLoader.cpp         corsPolicyPreventedLoad(m_document.securityOrigin(), url);
securityOrigin    220 Source/core/page/DragController.cpp         ClipboardAccessPolicy policy = (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal()) ? ClipboardReadable : ClipboardTypesReadable;
securityOrigin    339 Source/core/page/DragController.cpp     if (m_dragInitiator && !m_documentUnderMouse->securityOrigin()->canReceiveDragData(m_dragInitiator->securityOrigin()))
securityOrigin    598 Source/core/page/DragController.cpp     ClipboardAccessPolicy policy = m_documentUnderMouse->securityOrigin()->isLocal() ? ClipboardReadable : ClipboardTypesReadable;
securityOrigin    135 Source/core/page/EventSource.cpp     SecurityOrigin* origin = executionContext()->securityOrigin();
securityOrigin    144 Source/core/page/EventSource.cpp     options.securityOrigin = origin;
securityOrigin     76 Source/core/rendering/shapes/ShapeInfo.cpp     if (imageResource.isAccessAllowed(document.securityOrigin()))
securityOrigin    143 Source/core/storage/StorageArea.cpp void StorageArea::dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
securityOrigin    150 Source/core/storage/StorageArea.cpp             if (storage && frame->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
securityOrigin    153 Source/core/storage/StorageArea.cpp         InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin);
securityOrigin    170 Source/core/storage/StorageArea.cpp void StorageArea::dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess)
securityOrigin    178 Source/core/storage/StorageArea.cpp         if (storage && frame->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance))
securityOrigin    181 Source/core/storage/StorageArea.cpp     InspectorInstrumentation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin);
securityOrigin    165 Source/core/timing/Performance.cpp     if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin()))
securityOrigin    175 Source/core/timing/Performance.cpp     const String& securityOrigin = requestingDocument->securityOrigin()->toString();
securityOrigin    179 Source/core/timing/Performance.cpp         if (timingAllowOrigins[i] == securityOrigin)
securityOrigin     61 Source/core/workers/AbstractWorker.cpp     if (!executionContext()->securityOrigin()->canRequest(scriptURL)) {
securityOrigin     62 Source/core/workers/AbstractWorker.cpp         exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'.");
securityOrigin     75 Source/core/workers/SharedWorker.cpp     if (!document->securityOrigin()->canAccessSharedWorkers()) {
securityOrigin     76 Source/core/workers/SharedWorker.cpp         exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->securityOrigin()->toString() + "'.");
securityOrigin    127 Source/core/workers/WorkerGlobalScope.h         using SecurityContext::securityOrigin;
securityOrigin    157 Source/core/xml/XMLHttpRequest.cpp PassRefPtrWillBeRawPtr<XMLHttpRequest> XMLHttpRequest::create(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin)
securityOrigin    159 Source/core/xml/XMLHttpRequest.cpp     RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = adoptRefWillBeRefCountedGarbageCollected(new XMLHttpRequest(context, securityOrigin));
securityOrigin    165 Source/core/xml/XMLHttpRequest.cpp XMLHttpRequest::XMLHttpRequest(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin)
securityOrigin    182 Source/core/xml/XMLHttpRequest.cpp     , m_securityOrigin(securityOrigin)
securityOrigin    206 Source/core/xml/XMLHttpRequest.cpp     return m_securityOrigin ? m_securityOrigin.get() : executionContext()->securityOrigin();
securityOrigin    262 Source/core/xml/XMLHttpRequest.cpp             m_responseDocument->setSecurityOrigin(securityOrigin());
securityOrigin    791 Source/core/xml/XMLHttpRequest.cpp     m_sameOriginRequest = securityOrigin()->canRequest(m_url);
securityOrigin    818 Source/core/xml/XMLHttpRequest.cpp     options.securityOrigin = securityOrigin();
securityOrigin   1120 Source/core/xml/XMLHttpRequest.cpp         if (isSetCookieHeader(it->key) && !securityOrigin()->canLoadLocalResources())
securityOrigin   1143 Source/core/xml/XMLHttpRequest.cpp     if (isSetCookieHeader(name) && !securityOrigin()->canLoadLocalResources()) {
securityOrigin    152 Source/core/xml/XMLHttpRequest.h     SecurityOrigin* securityOrigin() const;
securityOrigin     88 Source/core/xml/XSLTProcessor.cpp             result->updateSecurityOrigin(oldDocument->securityOrigin());
securityOrigin    599 Source/core/xml/parser/XMLDocumentParser.cpp     if (!XMLDocumentParserScope::currentFetcher->document()->securityOrigin()->canRequest(url)) {
securityOrigin     70 Source/modules/filesystem/DOMFileSystem.cpp     filesystemName.append(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()));
securityOrigin     78 Source/modules/filesystem/DOMFileSystem.cpp     rootURL.append(context->securityOrigin()->toString());
securityOrigin     81 Source/modules/filesystem/DOMFileSystemBase.cpp     return m_context->securityOrigin();
securityOrigin    140 Source/modules/filesystem/DOMFileSystemBase.cpp         result.append(securityOrigin()->toString());
securityOrigin     90 Source/modules/filesystem/DOMFileSystemBase.h     SecurityOrigin* securityOrigin() const;
securityOrigin     60 Source/modules/filesystem/DOMWindowFileSystem.cpp     if (!document->securityOrigin()->canAccessFileSystem()) {
securityOrigin     83 Source/modules/filesystem/DOMWindowFileSystem.cpp     SecurityOrigin* securityOrigin = document->securityOrigin();
securityOrigin     85 Source/modules/filesystem/DOMWindowFileSystem.cpp     if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) {
securityOrigin    160 Source/modules/filesystem/InspectorFileSystemAgent.cpp     KURL rootURL = DOMFileSystemBase::createFileSystemRootURL(executionContext->securityOrigin()->toString(), type);
securityOrigin    719 Source/modules/filesystem/InspectorFileSystemAgent.cpp         if (frame->document() && frame->document()->securityOrigin()->isSameSchemeHostPort(origin))
securityOrigin     82 Source/modules/filesystem/LocalFileSystem.cpp     KURL storagePartition = KURL(KURL(), context->securityOrigin()->toString());
securityOrigin     95 Source/modules/filesystem/LocalFileSystem.cpp     KURL storagePartition = KURL(KURL(), context->securityOrigin()->toString());
securityOrigin     51 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp     if (!secureContext->securityOrigin()->canAccessFileSystem()) {
securityOrigin     68 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp     if (!secureContext->securityOrigin()->canAccessFileSystem()) {
securityOrigin     91 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp     if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
securityOrigin    108 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp     if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) {
securityOrigin    109 Source/modules/imagebitmap/ImageBitmapFactories.cpp     if (!image->cachedImage()->passesAccessControlCheck(eventTarget.toDOMWindow()->document()->securityOrigin()) && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(image->src())) {
securityOrigin    152 Source/modules/imagebitmap/ImageBitmapFactories.cpp     if (!video->player()->didPassCORSAccessCheck() && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(video->currentSrc())) {
securityOrigin     80 Source/modules/indexeddb/IDBFactory.cpp     if (!context->securityOrigin()->canAccessDatabase()) {
securityOrigin     92 Source/modules/indexeddb/IDBFactory.cpp     blink::Platform::current()->idbFactory()->getDatabaseNames(WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()));
securityOrigin    116 Source/modules/indexeddb/IDBFactory.cpp     if (!context->securityOrigin()->canAccessDatabase()) {
securityOrigin    130 Source/modules/indexeddb/IDBFactory.cpp     blink::Platform::current()->idbFactory()->open(name, version, transactionId, WebIDBCallbacksImpl::create(request).leakPtr(), WebIDBDatabaseCallbacksImpl::create(databaseCallbacks.release()).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()));
securityOrigin    150 Source/modules/indexeddb/IDBFactory.cpp     if (!context->securityOrigin()->canAccessDatabase()) {
securityOrigin    162 Source/modules/indexeddb/IDBFactory.cpp     blink::Platform::current()->idbFactory()->deleteDatabase(name, WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()));
securityOrigin     92 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     static PassRefPtr<GetDatabaseNamesCallback> create(PassRefPtr<RequestDatabaseNamesCallback> requestCallback, const String& securityOrigin)
securityOrigin     94 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp         return adoptRef(new GetDatabaseNamesCallback(requestCallback, securityOrigin));
securityOrigin    128 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     GetDatabaseNamesCallback(PassRefPtr<RequestDatabaseNamesCallback> requestCallback, const String& securityOrigin)
securityOrigin    131 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp         , m_securityOrigin(securityOrigin) { }
securityOrigin    539 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* findFrameWithSecurityOrigin(Page* page, const String& securityOrigin)
securityOrigin    542 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp         RefPtr<SecurityOrigin> documentOrigin = frame->document()->securityOrigin();
securityOrigin    543 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp         if (documentOrigin->toRawString() == securityOrigin)
securityOrigin    615 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestDatabaseNames(ErrorString* errorString, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback> requestCallback)
securityOrigin    617 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin);
securityOrigin    638 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     idbRequest->addEventListener(EventTypeNames::success, GetDatabaseNamesCallback::create(requestCallback, document->securityOrigin()->toRawString()), false);
securityOrigin    641 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestDatabase(ErrorString* errorString, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback> requestCallback)
securityOrigin    643 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin);
securityOrigin    659 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     databaseLoader->start(idbFactory, document->securityOrigin(), databaseName);
securityOrigin    662 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestData(ErrorString* errorString, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback> requestCallback)
securityOrigin    664 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin);
securityOrigin    686 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     dataLoader->start(idbFactory, document->securityOrigin(), databaseName);
securityOrigin    773 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::clearObjectStore(ErrorString* errorString, const String& securityOrigin, const String& databaseName, const String& objectStoreName, PassRefPtr<ClearObjectStoreCallback> requestCallback)
securityOrigin    775 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin);
securityOrigin    791 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp     clearObjectStore->start(idbFactory, document->securityOrigin(), databaseName);
securityOrigin     56 Source/modules/indexeddb/InspectorIndexedDBAgent.h     virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) OVERRIDE;
securityOrigin     57 Source/modules/indexeddb/InspectorIndexedDBAgent.h     virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) OVERRIDE;
securityOrigin     58 Source/modules/indexeddb/InspectorIndexedDBAgent.h     virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>) OVERRIDE;
securityOrigin    126 Source/modules/mediastream/MediaStreamTrack.cpp     RefPtr<MediaStreamTrackSourcesRequest> request = MediaStreamTrackSourcesRequestImpl::create(context->securityOrigin()->toString(), callback);
securityOrigin     66 Source/modules/quota/DeprecatedStorageQuota.cpp     SecurityOrigin* securityOrigin = executionContext->securityOrigin();
securityOrigin     67 Source/modules/quota/DeprecatedStorageQuota.cpp     if (securityOrigin->isUnique()) {
securityOrigin     72 Source/modules/quota/DeprecatedStorageQuota.cpp     KURL storagePartition = KURL(KURL(), securityOrigin->toString());
securityOrigin     93 Source/modules/quota/StorageQuota.cpp     SecurityOrigin* securityOrigin = executionContext->securityOrigin();
securityOrigin     94 Source/modules/quota/StorageQuota.cpp     if (securityOrigin->isUnique()) {
securityOrigin     99 Source/modules/quota/StorageQuota.cpp     KURL storagePartition = KURL(KURL(), securityOrigin->toString());
securityOrigin     78 Source/modules/serviceworkers/ServiceWorkerContainer.cpp     RefPtr<SecurityOrigin> documentOrigin = executionContext->securityOrigin();
securityOrigin    106 Source/modules/serviceworkers/ServiceWorkerContainer.cpp     RefPtr<SecurityOrigin> documentOrigin = executionContext->securityOrigin();
securityOrigin     51 Source/modules/webdatabase/DOMWindowWebDatabase.cpp     if (RuntimeEnabledFeatures::databaseEnabled() && window.document()->securityOrigin()->canAccessDatabase()) {
securityOrigin     68 Source/modules/webdatabase/Database.h     virtual SecurityOrigin* securityOrigin() const OVERRIDE;
securityOrigin    215 Source/modules/webdatabase/DatabaseBackendBase.cpp     m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy();
securityOrigin    224 Source/modules/webdatabase/DatabaseBackendBase.cpp         m_guid = guidForOriginAndName(securityOrigin()->toString(), name);
securityOrigin    234 Source/modules/webdatabase/DatabaseBackendBase.cpp     m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name);
securityOrigin    610 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin    620 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin    630 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin    640 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin    650 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin    660 Source/modules/webdatabase/DatabaseBackendBase.cpp             createDatabaseIdentifierFromSecurityOrigin(securityOrigin()),
securityOrigin     65 Source/modules/webdatabase/DatabaseBackendBase.h     virtual SecurityOrigin* securityOrigin() const;
securityOrigin    255 Source/modules/webdatabase/DatabaseContext.cpp     return executionContext()->securityOrigin();
securityOrigin     71 Source/modules/webdatabase/DatabaseContext.h     SecurityOrigin* securityOrigin() const;
securityOrigin    182 Source/modules/webdatabase/DatabaseManager.cpp         context->securityOrigin()->toString().ascii().data());
securityOrigin    231 Source/modules/webdatabase/DatabaseManager.cpp     DatabaseClient::from(context)->didOpenDatabase(database, context->securityOrigin()->host(), name, expectedVersion);
securityOrigin     55 Source/modules/webdatabase/DatabaseTracker.cpp             createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()),
securityOrigin     91 Source/modules/webdatabase/DatabaseTracker.cpp     String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin());
securityOrigin    136 Source/modules/webdatabase/DatabaseTracker.cpp     String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin());
securityOrigin    174 Source/modules/webdatabase/DatabaseTracker.cpp             createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()),
securityOrigin    195 Source/modules/webdatabase/DatabaseTracker.cpp         createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()),
securityOrigin    207 Source/modules/webdatabase/DatabaseTracker.cpp     DatabaseNameMap* nameMap = m_openDatabaseMap->get(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin()));
securityOrigin     49 Source/modules/webdatabase/SQLTransactionClient.cpp             createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()),
securityOrigin     50 Source/modules/webdatabase/WorkerGlobalScopeWebDatabase.cpp     if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) {
securityOrigin     68 Source/modules/webdatabase/WorkerGlobalScopeWebDatabase.cpp     if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) {
securityOrigin    140 Source/modules/websockets/NewWebSocketChannelImpl.cpp     m_handle->connect(url, webProtocols, *executionContext()->securityOrigin(), this);
securityOrigin    303 Source/modules/websockets/WebSocket.cpp     if (MixedContentChecker::isMixedContent(executionContext()->securityOrigin(), m_url)) {
securityOrigin    180 Source/modules/websockets/WebSocketHandshake.cpp     return m_document->securityOrigin()->toString();
securityOrigin     43 Source/platform/blob/BlobURL.cpp KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin)
securityOrigin     45 Source/platform/blob/BlobURL.cpp     ASSERT(securityOrigin);
securityOrigin     46 Source/platform/blob/BlobURL.cpp     return createBlobURL(securityOrigin->toString());
securityOrigin     90 Source/platform/weborigin/DatabaseIdentifier.cpp String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin)
securityOrigin     97 Source/platform/weborigin/DatabaseIdentifier.cpp     if (securityOrigin->needsDatabaseIdentifierQuirkForFiles())
securityOrigin    102 Source/platform/weborigin/DatabaseIdentifier.cpp     return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port());
securityOrigin    116 Source/web/ContextFeaturesClientImpl.cpp     String currentDomain = document->securityOrigin()->domain();
securityOrigin     57 Source/web/IDBFactoryBackendProxy.cpp         WebSecurityOrigin origin(context->securityOrigin());
securityOrigin     26 Source/web/MediaKeysClientImpl.cpp     WebSecurityOrigin securityOrigin(executionContext->securityOrigin());
securityOrigin     27 Source/web/MediaKeysClientImpl.cpp     return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem));
securityOrigin     48 Source/web/NotificationPresenterImpl.cpp     NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback)
securityOrigin     50 Source/web/NotificationPresenterImpl.cpp         , m_securityOrigin(securityOrigin)
securityOrigin    100 Source/web/NotificationPresenterImpl.cpp     int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin()));
securityOrigin    106 Source/web/NotificationPresenterImpl.cpp     m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback));
securityOrigin     63 Source/web/SpeechRecognitionClientProxy.cpp     WebSpeechRecognitionParams params(webSpeechGrammars, lang, continuous, interimResults, maxAlternatives, WebSecurityOrigin(recognition->executionContext()->securityOrigin()));
securityOrigin     67 Source/web/WebDatabase.cpp     return WebSecurityOrigin(m_database->securityOrigin());
securityOrigin     82 Source/web/WebDocument.cpp     return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin());
securityOrigin    784 Source/web/WebFrameImpl.cpp void WebFrameImpl::setIsolatedWorldSecurityOrigin(int worldID, const WebSecurityOrigin& securityOrigin)
securityOrigin    787 Source/web/WebFrameImpl.cpp     DOMWrapperWorld::setIsolatedWorldSecurityOrigin(worldID, securityOrigin.get());
securityOrigin    834 Source/web/WebFrameImpl.cpp     return frame()->loader().mixedContentChecker()->canRunInsecureContent(frame()->document()->securityOrigin(), url);
securityOrigin     41 Source/web/WebGeolocationPermissionRequest.cpp     return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
securityOrigin     65 Source/web/WebMIDIPermissionRequest.cpp     return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
securityOrigin     62 Source/web/WebMediaDevicesRequest.cpp     return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
securityOrigin    352 Source/web/WebSharedWorkerImpl.cpp     WebSecurityOrigin webSecurityOrigin(m_loadingDocument->securityOrigin());
securityOrigin     49 Source/web/WebStorageEventDispatcherImpl.cpp     RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
securityOrigin     51 Source/web/WebStorageEventDispatcherImpl.cpp             key, oldValue, newValue, securityOrigin.get(), pageURL,
securityOrigin     61 Source/web/WebStorageEventDispatcherImpl.cpp     RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin);
securityOrigin     63 Source/web/WebStorageEventDispatcherImpl.cpp             key, oldValue, newValue, securityOrigin.get(), pageURL,
securityOrigin     95 Source/web/WebUserMediaRequest.cpp     return WebSecurityOrigin(m_private->executionContext()->securityOrigin());
securityOrigin    117 Source/web/tests/MHTMLTest.cpp     WebCore::SecurityOrigin* origin = document->securityOrigin();
securityOrigin     48 public/web/WebDatabase.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
securityOrigin     80 public/web/WebDocument.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
securityOrigin     46 public/web/WebGeolocationPermissionRequest.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
securityOrigin     55 public/web/WebMIDIPermissionRequest.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
securityOrigin     60 public/web/WebMediaDevicesRequest.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;
securityOrigin     72 public/web/WebUserMediaRequest.h     BLINK_EXPORT WebSecurityOrigin securityOrigin() const;