securityOrigin 52 Source/bindings/v8/BindingSecurity.cpp if (callingWindow->document()->securityOrigin()->canAccess(targetDocument->securityOrigin())) securityOrigin 158 Source/bindings/v8/DOMWrapperWorld.cpp void DOMWrapperWorld::setIsolatedWorldSecurityOrigin(int worldId, PassRefPtr<SecurityOrigin> securityOrigin) securityOrigin 161 Source/bindings/v8/DOMWrapperWorld.cpp if (securityOrigin) securityOrigin 162 Source/bindings/v8/DOMWrapperWorld.cpp isolatedWorldSecurityOrigins().set(worldId, securityOrigin); securityOrigin 504 Source/bindings/v8/ScriptController.cpp ASSERT(m_frame->document()->securityOrigin()->isUnique()); securityOrigin 227 Source/bindings/v8/V8WindowShell.cpp setSecurityToken(m_frame->document()->securityOrigin()); securityOrigin 421 Source/bindings/v8/V8WindowShell.cpp updateSecurityOrigin(m_frame->document()->securityOrigin()); securityOrigin 58 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp RefPtr<SecurityOrigin> securityOrigin; securityOrigin 62 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp securityOrigin = world.isolatedWorldSecurityOrigin(); securityOrigin 65 Source/bindings/v8/custom/V8XMLHttpRequestCustom.cpp RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = XMLHttpRequest::create(context, securityOrigin); securityOrigin 109 Source/core/css/CSSImageSetValue.cpp request.setCrossOriginAccessControl(loader->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested); securityOrigin 67 Source/core/css/CSSImageValue.cpp request.setCrossOriginAccessControl(fetcher->document()->securityOrigin(), options.allowCredentials, options.credentialsRequested); securityOrigin 277 Source/core/css/CSSStyleSheet.cpp if (document->securityOrigin()->canRequest(baseURL)) securityOrigin 83 Source/core/css/StyleRuleImport.cpp m_styleSheet->parseAuthorStyleSheet(cachedStyleSheet, document ? document->securityOrigin() : 0); securityOrigin 319 Source/core/css/StyleSheetContents.cpp void StyleSheetContents::parseAuthorStyleSheet(const CSSStyleSheetResource* cachedStyleSheet, const SecurityOrigin* securityOrigin) securityOrigin 337 Source/core/css/StyleSheetContents.cpp bool isCrossOriginCSS = !securityOrigin || !securityOrigin->canRequest(baseURL()); securityOrigin 75 Source/core/css/resolver/ScopedStyleResolver.cpp AddRuleFlags addRuleFlags = resolver->document().securityOrigin()->canRequest(sheet->baseURL()) ? RuleHasDocumentSecurityOrigin : RuleHasNoSpecialState; securityOrigin 221 Source/core/dom/DOMImplementation.cpp doc->setSecurityOrigin(m_document.securityOrigin()->isolatedCopy()); securityOrigin 347 Source/core/dom/DOMImplementation.cpp d->setSecurityOrigin(m_document.securityOrigin()->isolatedCopy()); securityOrigin 79 Source/core/dom/DOMURL.cpp KURL publicURL = BlobURL::createPublicURL(executionContext->securityOrigin()); securityOrigin 83 Source/core/dom/DOMURL.cpp executionContext->publicURLManager().registerURL(executionContext->securityOrigin(), publicURL, registrable, uuid); securityOrigin 325 Source/core/dom/Document.cpp const SecurityOrigin* ancestorSecurityOrigin = ancestorDocument->securityOrigin(); securityOrigin 2262 Source/core/dom/Document.cpp setSecurityOrigin(ownerDocument->securityOrigin()); securityOrigin 2838 Source/core/dom/Document.cpp ASSERT(securityOrigin()); securityOrigin 2839 Source/core/dom/Document.cpp SecurityOrigin& origin = *securityOrigin(); securityOrigin 2880 Source/core/dom/Document.cpp if (!ancestorFrame->document()->securityOrigin()->canAccess(securityOrigin())) securityOrigin 3137 Source/core/dom/Document.cpp return securityOrigin()->toString(); securityOrigin 3285 Source/core/dom/Document.cpp setSecurityOrigin(other.securityOrigin()->isolatedCopy()); securityOrigin 3861 Source/core/dom/Document.cpp if (!securityOrigin()->canAccessCookies()) { securityOrigin 3887 Source/core/dom/Document.cpp if (!securityOrigin()->canAccessCookies()) { securityOrigin 3913 Source/core/dom/Document.cpp return securityOrigin()->domain(); securityOrigin 3923 Source/core/dom/Document.cpp if (SchemeRegistry::isDomainRelaxationForbiddenForURLScheme(securityOrigin()->protocol())) { securityOrigin 3924 Source/core/dom/Document.cpp exceptionState.throwSecurityError("Assignment is forbidden for the '" + securityOrigin()->protocol() + "' scheme."); securityOrigin 3934 Source/core/dom/Document.cpp OriginAccessEntry accessEntry(securityOrigin()->protocol(), newDomain, OriginAccessEntry::AllowSubdomains, ipAddressSetting); securityOrigin 3935 Source/core/dom/Document.cpp OriginAccessEntry::MatchResult result = accessEntry.matchesOrigin(*securityOrigin()); securityOrigin 3946 Source/core/dom/Document.cpp securityOrigin()->setDomainFromDOM(newDomain); securityOrigin 3948 Source/core/dom/Document.cpp m_frame->script().updateSecurityOrigin(securityOrigin()); securityOrigin 4590 Source/core/dom/Document.cpp ASSERT(securityOrigin()); securityOrigin 4614 Source/core/dom/Document.cpp securityOrigin()->grantUniversalAccess(); securityOrigin 4615 Source/core/dom/Document.cpp } else if (securityOrigin()->isLocal()) { securityOrigin 4618 Source/core/dom/Document.cpp securityOrigin()->grantUniversalAccess(); securityOrigin 4623 Source/core/dom/Document.cpp securityOrigin()->enforceFilePathSeparation(); securityOrigin 4649 Source/core/dom/Document.cpp if (initializer.owner()->securityOrigin()->canLoadLocalResources()) securityOrigin 4650 Source/core/dom/Document.cpp securityOrigin()->grantLoadLocalResources(); securityOrigin 4657 Source/core/dom/Document.cpp setSecurityOrigin(initializer.owner()->securityOrigin()); securityOrigin 4712 Source/core/dom/Document.cpp m_frame->script().updateSecurityOrigin(securityOrigin()); securityOrigin 4787 Source/core/dom/Document.cpp m_isDNSPrefetchEnabled = settings && settings->dnsPrefetchingEnabled() && securityOrigin()->protocol() == "http"; securityOrigin 248 Source/core/dom/Document.h using SecurityContext::securityOrigin; securityOrigin 128 Source/core/dom/ExecutionContext.cpp return !(securityOrigin()->canRequest(completeURL(sourceURL)) || corsStatus == SharableCrossOrigin); securityOrigin 237 Source/core/dom/ExecutionContext.cpp return m_client->securityContext().securityOrigin(); securityOrigin 329 Source/core/dom/ExecutionContext.cpp if (isSandboxed(SandboxOrigin) && m_client->securityContext().securityOrigin() && !m_client->securityContext().securityOrigin()->isUnique()) { securityOrigin 72 Source/core/dom/ExecutionContext.h SecurityOrigin* securityOrigin() const; securityOrigin 262 Source/core/dom/ScriptLoader.cpp request.setCrossOriginAccessControl(elementDocument->securityOrigin(), crossOriginMode); securityOrigin 329 Source/core/dom/ScriptLoader.cpp if (!m_isExternalScript || (sourceCode.resource() && sourceCode.resource()->passesAccessControlCheck(m_element->document().securityOrigin()))) securityOrigin 44 Source/core/dom/SecurityContext.cpp void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigin) securityOrigin 46 Source/core/dom/SecurityContext.cpp m_securityOrigin = securityOrigin; securityOrigin 64 Source/core/dom/SecurityContext.cpp return securityOrigin()->canAccess(other.get()); securityOrigin 42 Source/core/dom/SecurityContext.h SecurityOrigin* securityOrigin() const { return m_securityOrigin.get(); } securityOrigin 103 Source/core/fetch/CrossOriginAccessControl.cpp void updateRequestForAccessControl(ResourceRequest& request, SecurityOrigin* securityOrigin, StoredCredentials allowCredentials) securityOrigin 108 Source/core/fetch/CrossOriginAccessControl.cpp if (securityOrigin) securityOrigin 109 Source/core/fetch/CrossOriginAccessControl.cpp request.setHTTPOrigin(securityOrigin->toAtomicString()); securityOrigin 112 Source/core/fetch/CrossOriginAccessControl.cpp ResourceRequest createAccessControlPreflightRequest(const ResourceRequest& request, SecurityOrigin* securityOrigin) securityOrigin 115 Source/core/fetch/CrossOriginAccessControl.cpp updateRequestForAccessControl(preflightRequest, securityOrigin, DoNotAllowStoredCredentials); securityOrigin 145 Source/core/fetch/CrossOriginAccessControl.cpp bool passesAccessControlCheck(const ResourceResponse& response, StoredCredentials includeCredentials, SecurityOrigin* securityOrigin, String& errorDescription) securityOrigin 151 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "Received an invalid response. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 162 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "A wildcard '*' cannot be used in the 'Access-Control-Allow-Origin' header when the credentials flag is true. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 165 Source/core/fetch/CrossOriginAccessControl.cpp } else if (accessControlOriginString != securityOrigin->toAtomicString()) { securityOrigin 167 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "No 'Access-Control-Allow-Origin' header is present on the requested resource. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 169 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "The 'Access-Control-Allow-Origin' header contains multiple values '" + accessControlOriginString + "', but only one is allowed. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 173 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "The 'Access-Control-Allow-Origin' header contains the invalid value '" + accessControlOriginString + "'. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 175 Source/core/fetch/CrossOriginAccessControl.cpp errorDescription = "The 'Access-Control-Allow-Origin' header has a value '" + accessControlOriginString + "' that is not equal to the supplied origin. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."; securityOrigin 228 Source/core/fetch/CrossOriginAccessControl.cpp bool CrossOriginAccessControl::handleRedirect(Resource* resource, SecurityOrigin* securityOrigin, ResourceRequest& request, const ResourceResponse& redirectResponse, ResourceLoaderOptions& options, String& errorMessage) securityOrigin 234 Source/core/fetch/CrossOriginAccessControl.cpp bool redirectCrossOrigin = !securityOrigin->canRequest(requestURL); securityOrigin 237 Source/core/fetch/CrossOriginAccessControl.cpp if (!securityOrigin->canRequest(originalURL)) { securityOrigin 246 Source/core/fetch/CrossOriginAccessControl.cpp allowRedirect = passesAccessControlCheck(redirectResponse, withCredentials, securityOrigin, errorDescription); securityOrigin 252 Source/core/fetch/CrossOriginAccessControl.cpp options.securityOrigin = SecurityOrigin::createUnique(); securityOrigin 253 Source/core/fetch/CrossOriginAccessControl.cpp securityOrigin = options.securityOrigin.get(); securityOrigin 266 Source/core/fetch/CrossOriginAccessControl.cpp request.setHTTPOrigin(securityOrigin->toAtomicString()); securityOrigin 77 Source/core/fetch/FetchRequest.cpp m_options.securityOrigin = origin; securityOrigin 472 Source/core/fetch/ImageResource.cpp bool ImageResource::isAccessAllowed(SecurityOrigin* securityOrigin) securityOrigin 476 Source/core/fetch/ImageResource.cpp if (passesAccessControlCheck(securityOrigin)) securityOrigin 478 Source/core/fetch/ImageResource.cpp return !securityOrigin->taintsCanvas(response().url()); securityOrigin 264 Source/core/fetch/Resource.cpp bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin) securityOrigin 267 Source/core/fetch/Resource.cpp return passesAccessControlCheck(securityOrigin, ignoredErrorDescription); securityOrigin 270 Source/core/fetch/Resource.cpp bool Resource::passesAccessControlCheck(SecurityOrigin* securityOrigin, String& errorDescription) securityOrigin 272 Source/core/fetch/Resource.cpp return WebCore::passesAccessControlCheck(m_response, resourceRequest().allowStoredCredentials() ? AllowStoredCredentials : DoNotAllowStoredCredentials, securityOrigin, errorDescription); securityOrigin 429 Source/core/fetch/ResourceFetcher.cpp if (!f->loader().mixedContentChecker()->canRunInsecureContent(m_document->securityOrigin(), url)) securityOrigin 432 Source/core/fetch/ResourceFetcher.cpp if (top != f && !top->loader().mixedContentChecker()->canRunInsecureContent(top->document()->securityOrigin(), url)) securityOrigin 438 Source/core/fetch/ResourceFetcher.cpp if (!top->loader().mixedContentChecker()->canDisplayInsecureContent(top->document()->securityOrigin(), url)) securityOrigin 449 Source/core/fetch/ResourceFetcher.cpp SecurityOrigin* securityOrigin = options.securityOrigin.get(); securityOrigin 450 Source/core/fetch/ResourceFetcher.cpp if (!securityOrigin && document()) securityOrigin 451 Source/core/fetch/ResourceFetcher.cpp securityOrigin = document()->securityOrigin(); securityOrigin 453 Source/core/fetch/ResourceFetcher.cpp if (securityOrigin && !securityOrigin->canDisplay(url)) { securityOrigin 480 Source/core/fetch/ResourceFetcher.cpp if (originRestriction == FetchRequest::RestrictToSameOrigin && !securityOrigin->canRequest(url)) { securityOrigin 488 Source/core/fetch/ResourceFetcher.cpp if (!securityOrigin->canRequest(url)) { securityOrigin 559 Source/core/fetch/ResourceFetcher.cpp sourceOrigin = document()->securityOrigin(); securityOrigin 1289 Source/core/fetch/ResourceFetcher.cpp SecurityOrigin* sourceOrigin = options.securityOrigin.get(); securityOrigin 1291 Source/core/fetch/ResourceFetcher.cpp sourceOrigin = document()->securityOrigin(); securityOrigin 342 Source/core/fetch/ResourceLoader.cpp if (!m_host->canAccessResource(resource, m_options.securityOrigin.get(), response.url())) { securityOrigin 135 Source/core/fetch/ResourceLoaderOptions.h RefPtr<SecurityOrigin> securityOrigin; securityOrigin 87 Source/core/fileapi/FileReaderLoader.cpp m_urlForReading = BlobURL::createPublicURL(executionContext->securityOrigin()); securityOrigin 95 Source/core/fileapi/FileReaderLoader.cpp BlobRegistry::registerPublicBlobURL(executionContext->securityOrigin(), m_urlForReading, blobData); securityOrigin 98 Source/core/fileapi/FileReaderLoader.cpp BlobRegistry::registerStreamURL(executionContext->securityOrigin(), m_urlForReading, stream->url()); securityOrigin 742 Source/core/frame/DOMWindow.cpp if (!document->securityOrigin()->canAccessLocalStorage()) { securityOrigin 764 Source/core/frame/DOMWindow.cpp OwnPtrWillBeRawPtr<StorageArea> storageArea = page->sessionStorage()->storageArea(document->securityOrigin()); securityOrigin 784 Source/core/frame/DOMWindow.cpp if (!document->securityOrigin()->canAccessLocalStorage()) { securityOrigin 807 Source/core/frame/DOMWindow.cpp OwnPtrWillBeRawPtr<StorageArea> storageArea = StorageNamespace::localStorageArea(document->securityOrigin()); securityOrigin 830 Source/core/frame/DOMWindow.cpp target = sourceDocument->securityOrigin(); securityOrigin 849 Source/core/frame/DOMWindow.cpp String sourceOrigin = sourceDocument->securityOrigin()->toString(); securityOrigin 887 Source/core/frame/DOMWindow.cpp if (!intendedTargetOrigin->isSameSchemeHostPort(document()->securityOrigin())) { securityOrigin 888 Source/core/frame/DOMWindow.cpp String message = ExceptionMessages::failedToExecute("postMessage", "DOMWindow", "The target origin provided ('" + intendedTargetOrigin->toString() + "') does not match the recipient window's origin ('" + document()->securityOrigin()->toString() + "')."); securityOrigin 1689 Source/core/frame/DOMWindow.cpp ASSERT(!callingWindow->document()->securityOrigin()->canAccess(document()->securityOrigin())); securityOrigin 1691 Source/core/frame/DOMWindow.cpp SecurityOrigin* activeOrigin = callingWindow->document()->securityOrigin(); securityOrigin 1708 Source/core/frame/DOMWindow.cpp ASSERT(!callingWindow->document()->securityOrigin()->canAccess(document()->securityOrigin())); securityOrigin 1711 Source/core/frame/DOMWindow.cpp SecurityOrigin* activeOrigin = callingWindow->document()->securityOrigin(); securityOrigin 1712 Source/core/frame/DOMWindow.cpp SecurityOrigin* targetOrigin = document()->securityOrigin(); securityOrigin 1759 Source/core/frame/DOMWindow.cpp if (callingWindow.document()->securityOrigin()->canAccess(document()->securityOrigin())) securityOrigin 132 Source/core/frame/History.cpp if (!fullURL.isValid() || !m_frame->document()->securityOrigin()->canRequest(fullURL)) { securityOrigin 134 Source/core/frame/History.cpp exceptionState.throwSecurityError("A history state object with URL '" + fullURL.elidedString() + "' cannot be created in a document with origin '" + m_frame->document()->securityOrigin()->toString() + "'."); securityOrigin 124 Source/core/frame/Location.cpp origins->append(frame->document()->securityOrigin()->toString()); securityOrigin 39 Source/core/frame/csp/CSPSource.cpp String protectedResourceScheme(m_policy->securityOrigin()->protocol()); securityOrigin 484 Source/core/frame/csp/CSPSourceList.cpp m_list.append(CSPSource(m_policy, m_policy->securityOrigin()->protocol(), m_policy->securityOrigin()->host(), m_policy->securityOrigin()->port(), String(), false, false)); securityOrigin 544 Source/core/frame/csp/ContentSecurityPolicy.cpp return m_client->securityContext().securityOrigin(); securityOrigin 569 Source/core/frame/csp/ContentSecurityPolicy.cpp return document->securityOrigin()->canRequest(url) ? url.strippedForUseAsReferrer() : SecurityOrigin::create(url)->toString(); securityOrigin 166 Source/core/frame/csp/ContentSecurityPolicy.h SecurityOrigin* securityOrigin() const; securityOrigin 669 Source/core/html/HTMLAnchorElement.cpp if (!document.securityOrigin()->canDisplay(url)) securityOrigin 215 Source/core/html/HTMLAppletElement.cpp if (!document().securityOrigin()->canDisplay(url)) { securityOrigin 413 Source/core/html/HTMLCanvasElement.cpp return document().securityOrigin(); securityOrigin 121 Source/core/html/HTMLCanvasElement.h SecurityOrigin* securityOrigin() const; securityOrigin 224 Source/core/html/HTMLFrameOwnerElement.cpp if (!document().securityOrigin()->canDisplay(url)) { securityOrigin 489 Source/core/html/HTMLLinkElement.cpp styleSheet->parseAuthorStyleSheet(cachedStyleSheet, m_owner->document().securityOrigin()); securityOrigin 626 Source/core/html/HTMLLinkElement.cpp if (!document().securityOrigin()->canDisplay(builder.url())) securityOrigin 670 Source/core/html/HTMLLinkElement.cpp request.setCrossOriginAccessControl(document().securityOrigin(), crossOriginMode); securityOrigin 1310 Source/core/html/HTMLMediaElement.cpp if (!frame || !document().securityOrigin()->canDisplay(url)) { securityOrigin 414 Source/core/html/HTMLPlugInElement.cpp && !document().securityOrigin()->canAccess(contentDocument()->securityOrigin())) securityOrigin 538 Source/core/html/HTMLPlugInElement.cpp if (!document().securityOrigin()->canDisplay(url)) { securityOrigin 552 Source/core/html/HTMLPlugInElement.cpp return frame->loader().mixedContentChecker()->canRunInsecureContent(document().securityOrigin(), url); securityOrigin 1582 Source/core/html/canvas/CanvasRenderingContext2D.cpp if (canvas()->originClean() && imageSource->wouldTaintOrigin(canvas()->securityOrigin())) securityOrigin 1757 Source/core/html/canvas/CanvasRenderingContext2D.cpp return CanvasPattern::create(imageForRendering.release(), repeatX, repeatY, !imageSource->wouldTaintOrigin(canvas()->securityOrigin())); securityOrigin 5129 Source/core/html/canvas/WebGLRenderingContextBase.cpp if (image->wouldTaintOrigin(canvas()->securityOrigin())) { securityOrigin 5142 Source/core/html/canvas/WebGLRenderingContextBase.cpp if (canvas->wouldTaintOrigin(this->canvas()->securityOrigin())) { securityOrigin 5155 Source/core/html/canvas/WebGLRenderingContextBase.cpp if (video->wouldTaintOrigin(canvas()->securityOrigin())) { securityOrigin 91 Source/core/html/imports/HTMLImportsController.cpp bool sameOriginRequest = securityOrigin()->canRequest(request.url()); securityOrigin 93 Source/core/html/imports/HTMLImportsController.cpp securityOrigin(), sameOriginRequest ? AllowStoredCredentials : DoNotAllowStoredCredentials, securityOrigin 125 Source/core/html/imports/HTMLImportsController.cpp return m_master->securityOrigin(); securityOrigin 75 Source/core/html/imports/HTMLImportsController.h SecurityOrigin* securityOrigin() const; securityOrigin 60 Source/core/html/parser/HTMLResourcePreloader.cpp request.setCrossOriginAccessControl(document->securityOrigin(), m_allowCredentials); securityOrigin 290 Source/core/html/parser/XSSAuditor.cpp if (MixedContentChecker::isMixedContent(document->securityOrigin(), xssProtectionReportURL)) { securityOrigin 440 Source/core/html/shadow/TextControlInnerElements.cpp if (speechInput()->startRecognition(m_listenerId, rect, language, grammar, document().securityOrigin())) securityOrigin 169 Source/core/inspector/InspectorDOMStorageAgent.cpp PassRefPtr<TypeBuilder::DOMStorage::StorageId> InspectorDOMStorageAgent::storageId(SecurityOrigin* securityOrigin, bool isLocalStorage) securityOrigin 172 Source/core/inspector/InspectorDOMStorageAgent.cpp .setSecurityOrigin(securityOrigin->toRawString()) securityOrigin 176 Source/core/inspector/InspectorDOMStorageAgent.cpp void InspectorDOMStorageAgent::didDispatchDOMStorageEvent(const String& key, const String& oldValue, const String& newValue, StorageType storageType, SecurityOrigin* securityOrigin) securityOrigin 181 Source/core/inspector/InspectorDOMStorageAgent.cpp RefPtr<TypeBuilder::DOMStorage::StorageId> id = storageId(securityOrigin, storageType == LocalStorage); securityOrigin 195 Source/core/inspector/InspectorDOMStorageAgent.cpp String securityOrigin; securityOrigin 197 Source/core/inspector/InspectorDOMStorageAgent.cpp bool success = storageId->getString("securityOrigin", &securityOrigin); securityOrigin 206 Source/core/inspector/InspectorDOMStorageAgent.cpp LocalFrame* frame = m_pageAgent->findFrameWithSecurityOrigin(securityOrigin); securityOrigin 215 Source/core/inspector/InspectorDOMStorageAgent.cpp return StorageNamespace::localStorageArea(frame->document()->securityOrigin()); securityOrigin 216 Source/core/inspector/InspectorDOMStorageAgent.cpp return m_pageAgent->page()->sessionStorage()->storageArea(frame->document()->securityOrigin()); securityOrigin 74 Source/core/inspector/InspectorInspectorAgent.cpp String origin = frame->document()->securityOrigin()->toRawString(); securityOrigin 930 Source/core/inspector/InspectorPageAgent.cpp RefPtr<SecurityOrigin> documentOrigin = frame->document()->securityOrigin(); securityOrigin 1076 Source/core/inspector/InspectorPageAgent.cpp .setSecurityOrigin(frame->document()->securityOrigin()->toRawString()); securityOrigin 181 Source/core/inspector/PageRuntimeAgent.cpp void PageRuntimeAgent::notifyContextCreated(const String& frameId, ScriptState* scriptState, SecurityOrigin* securityOrigin, bool isPageContext) securityOrigin 183 Source/core/inspector/PageRuntimeAgent.cpp ASSERT(securityOrigin || isPageContext); securityOrigin 185 Source/core/inspector/PageRuntimeAgent.cpp String name = securityOrigin ? securityOrigin->toRawString() : ""; securityOrigin 378 Source/core/loader/DocumentLoader.cpp if (!top->loader().mixedContentChecker()->canRunInsecureContent(top->document()->securityOrigin(), newRequest.url())) { securityOrigin 804 Source/core/loader/DocumentLoader.cpp document->setSecurityOrigin(ownerDocument->securityOrigin()); securityOrigin 74 Source/core/loader/DocumentThreadableLoader.cpp , m_sameOriginRequest(securityOrigin()->canRequest(request.url())) securityOrigin 109 Source/core/loader/DocumentThreadableLoader.cpp updateRequestForAccessControl(crossOriginRequest, securityOrigin(), m_options.allowCredentials); securityOrigin 119 Source/core/loader/DocumentThreadableLoader.cpp if (CrossOriginPreflightResultCache::shared().canSkipPreflight(securityOrigin()->toString(), m_actualRequest->url(), m_options.allowCredentials, m_actualRequest->httpMethod(), m_actualRequest->httpHeaderFields())) { securityOrigin 122 Source/core/loader/DocumentThreadableLoader.cpp ResourceRequest preflightRequest = createAccessControlPreflightRequest(*m_actualRequest, securityOrigin()); securityOrigin 192 Source/core/loader/DocumentThreadableLoader.cpp && (m_sameOriginRequest || passesAccessControlCheck(redirectResponse, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)); securityOrigin 208 Source/core/loader/DocumentThreadableLoader.cpp m_options.securityOrigin = SecurityOrigin::createUnique(); securityOrigin 270 Source/core/loader/DocumentThreadableLoader.cpp if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) { securityOrigin 288 Source/core/loader/DocumentThreadableLoader.cpp CrossOriginPreflightResultCache::shared().appendEntry(securityOrigin()->toString(), m_actualRequest->url(), preflightResult.release()); securityOrigin 291 Source/core/loader/DocumentThreadableLoader.cpp if (!passesAccessControlCheck(response, m_options.allowCredentials, securityOrigin(), accessControlErrorDescription)) { securityOrigin 355 Source/core/loader/DocumentThreadableLoader.cpp actualRequest->setHTTPOrigin(securityOrigin()->toAtomicString()); securityOrigin 438 Source/core/loader/DocumentThreadableLoader.cpp return m_sameOriginRequest && securityOrigin()->canRequest(url); securityOrigin 450 Source/core/loader/DocumentThreadableLoader.cpp return m_options.securityOrigin ? m_options.securityOrigin.get() : m_document->securityOrigin(); securityOrigin 100 Source/core/loader/DocumentThreadableLoader.h SecurityOrigin* securityOrigin() const; securityOrigin 671 Source/core/loader/FrameLoader.cpp if (!request.originDocument()->securityOrigin()->canDisplay(url)) { securityOrigin 767 Source/core/loader/FrameLoader.cpp RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::createFromString(item->referrer().referrer); securityOrigin 768 Source/core/loader/FrameLoader.cpp FrameLoader::addHTTPOriginIfNeeded(request, securityOrigin->toAtomicString()); securityOrigin 863 Source/core/loader/FrameLoader.cpp RefPtr<SecurityOrigin> securityOrigin = SecurityOrigin::create(pdl->request().url()); securityOrigin 864 Source/core/loader/FrameLoader.cpp pdl->timing()->setHasSameOriginAsPreviousDocument(securityOrigin->canRequest(m_frame->document()->url())); securityOrigin 1320 Source/core/loader/FrameLoader.cpp if (!origin->isSameSchemeHostPort(topFrame->document()->securityOrigin())) securityOrigin 1323 Source/core/loader/FrameLoader.cpp if (!origin->isSameSchemeHostPort(frame->document()->securityOrigin())) { securityOrigin 146 Source/core/loader/ImageLoader.cpp request.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode); securityOrigin 130 Source/core/loader/LinkLoader.cpp linkRequest.setCrossOriginAccessControl(document.securityOrigin(), crossOriginMode); securityOrigin 52 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::isMixedContent(SecurityOrigin* securityOrigin, const KURL& url) securityOrigin 54 Source/core/loader/MixedContentChecker.cpp if (securityOrigin->protocol() != "https") securityOrigin 61 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::canDisplayInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const securityOrigin 63 Source/core/loader/MixedContentChecker.cpp if (!isMixedContent(securityOrigin, url)) securityOrigin 67 Source/core/loader/MixedContentChecker.cpp bool allowed = client()->allowDisplayingInsecureContent(settings && settings->allowDisplayOfInsecureContent(), securityOrigin, url); securityOrigin 76 Source/core/loader/MixedContentChecker.cpp bool MixedContentChecker::canRunInsecureContent(SecurityOrigin* securityOrigin, const KURL& url) const securityOrigin 78 Source/core/loader/MixedContentChecker.cpp if (!isMixedContent(securityOrigin, url)) securityOrigin 82 Source/core/loader/MixedContentChecker.cpp bool allowed = client()->allowRunningInsecureContent(settings && settings->allowRunningOfInsecureContent(), securityOrigin, url); securityOrigin 86 Source/core/loader/MixedContentChecker.cpp client()->didRunInsecureContent(securityOrigin, url); securityOrigin 308 Source/core/loader/NavigationScheduler.cpp if (originDocument->securityOrigin()->canAccess(m_frame->document()->securityOrigin())) { securityOrigin 60 Source/core/loader/PingLoader.cpp if (!frame->document()->securityOrigin()->canDisplay(url)) { securityOrigin 89 Source/core/loader/PingLoader.cpp if (frame->document()->securityOrigin()->isSameSchemeHostPort(pingOrigin.get())) securityOrigin 115 Source/core/loader/PingLoader.cpp PingLoader::start(frame, request, initiatorInfo, SecurityOrigin::create(reportURL)->isSameSchemeHostPort(frame->document()->securityOrigin()) ? AllowStoredCredentials : DoNotAllowStoredCredentials); securityOrigin 43 Source/core/loader/TextResourceDecoderBuilder.cpp return parentFrame && parentFrame->document()->securityOrigin()->canAccess(frame->document()->securityOrigin()); securityOrigin 85 Source/core/loader/TextTrackLoader.cpp void TextTrackLoader::corsPolicyPreventedLoad(SecurityOrigin* securityOrigin, const KURL& url) securityOrigin 87 Source/core/loader/TextTrackLoader.cpp String consoleMessage("Text track from origin '" + SecurityOrigin::create(url)->toString() + "' has been blocked from loading: Not at same origin as the document, and parent of track element does not have a 'crossorigin' attribute. Origin '" + securityOrigin->toString() + "' is therefore not allowed access."); securityOrigin 114 Source/core/loader/TextTrackLoader.cpp cueRequest.setCrossOriginAccessControl(m_document.securityOrigin(), crossOriginMode); securityOrigin 115 Source/core/loader/TextTrackLoader.cpp } else if (!m_document.securityOrigin()->canRequest(url)) { securityOrigin 117 Source/core/loader/TextTrackLoader.cpp corsPolicyPreventedLoad(m_document.securityOrigin(), url); securityOrigin 220 Source/core/page/DragController.cpp ClipboardAccessPolicy policy = (!m_documentUnderMouse || m_documentUnderMouse->securityOrigin()->isLocal()) ? ClipboardReadable : ClipboardTypesReadable; securityOrigin 339 Source/core/page/DragController.cpp if (m_dragInitiator && !m_documentUnderMouse->securityOrigin()->canReceiveDragData(m_dragInitiator->securityOrigin())) securityOrigin 598 Source/core/page/DragController.cpp ClipboardAccessPolicy policy = m_documentUnderMouse->securityOrigin()->isLocal() ? ClipboardReadable : ClipboardTypesReadable; securityOrigin 135 Source/core/page/EventSource.cpp SecurityOrigin* origin = executionContext()->securityOrigin(); securityOrigin 144 Source/core/page/EventSource.cpp options.securityOrigin = origin; securityOrigin 76 Source/core/rendering/shapes/ShapeInfo.cpp if (imageResource.isAccessAllowed(document.securityOrigin())) securityOrigin 143 Source/core/storage/StorageArea.cpp void StorageArea::dispatchLocalStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) securityOrigin 150 Source/core/storage/StorageArea.cpp if (storage && frame->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance)) securityOrigin 153 Source/core/storage/StorageArea.cpp InspectorInstrumentation::didDispatchDOMStorageEvent(*it, key, oldValue, newValue, LocalStorage, securityOrigin); securityOrigin 170 Source/core/storage/StorageArea.cpp void StorageArea::dispatchSessionStorageEvent(const String& key, const String& oldValue, const String& newValue, SecurityOrigin* securityOrigin, const KURL& pageURL, const blink::WebStorageNamespace& sessionNamespace, blink::WebStorageArea* sourceAreaInstance, bool originatedInProcess) securityOrigin 178 Source/core/storage/StorageArea.cpp if (storage && frame->document()->securityOrigin()->canAccess(securityOrigin) && !isEventSource(storage, sourceAreaInstance)) securityOrigin 181 Source/core/storage/StorageArea.cpp InspectorInstrumentation::didDispatchDOMStorageEvent(page, key, oldValue, newValue, SessionStorage, securityOrigin); securityOrigin 165 Source/core/timing/Performance.cpp if (resourceOrigin->isSameSchemeHostPort(requestingDocument->securityOrigin())) securityOrigin 175 Source/core/timing/Performance.cpp const String& securityOrigin = requestingDocument->securityOrigin()->toString(); securityOrigin 179 Source/core/timing/Performance.cpp if (timingAllowOrigins[i] == securityOrigin) securityOrigin 61 Source/core/workers/AbstractWorker.cpp if (!executionContext()->securityOrigin()->canRequest(scriptURL)) { securityOrigin 62 Source/core/workers/AbstractWorker.cpp exceptionState.throwSecurityError("Script at '" + scriptURL.elidedString() + "' cannot be accessed from origin '" + executionContext()->securityOrigin()->toString() + "'."); securityOrigin 75 Source/core/workers/SharedWorker.cpp if (!document->securityOrigin()->canAccessSharedWorkers()) { securityOrigin 76 Source/core/workers/SharedWorker.cpp exceptionState.throwSecurityError("Access to shared workers is denied to origin '" + document->securityOrigin()->toString() + "'."); securityOrigin 127 Source/core/workers/WorkerGlobalScope.h using SecurityContext::securityOrigin; securityOrigin 157 Source/core/xml/XMLHttpRequest.cpp PassRefPtrWillBeRawPtr<XMLHttpRequest> XMLHttpRequest::create(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin) securityOrigin 159 Source/core/xml/XMLHttpRequest.cpp RefPtrWillBeRawPtr<XMLHttpRequest> xmlHttpRequest = adoptRefWillBeRefCountedGarbageCollected(new XMLHttpRequest(context, securityOrigin)); securityOrigin 165 Source/core/xml/XMLHttpRequest.cpp XMLHttpRequest::XMLHttpRequest(ExecutionContext* context, PassRefPtr<SecurityOrigin> securityOrigin) securityOrigin 182 Source/core/xml/XMLHttpRequest.cpp , m_securityOrigin(securityOrigin) securityOrigin 206 Source/core/xml/XMLHttpRequest.cpp return m_securityOrigin ? m_securityOrigin.get() : executionContext()->securityOrigin(); securityOrigin 262 Source/core/xml/XMLHttpRequest.cpp m_responseDocument->setSecurityOrigin(securityOrigin()); securityOrigin 791 Source/core/xml/XMLHttpRequest.cpp m_sameOriginRequest = securityOrigin()->canRequest(m_url); securityOrigin 818 Source/core/xml/XMLHttpRequest.cpp options.securityOrigin = securityOrigin(); securityOrigin 1120 Source/core/xml/XMLHttpRequest.cpp if (isSetCookieHeader(it->key) && !securityOrigin()->canLoadLocalResources()) securityOrigin 1143 Source/core/xml/XMLHttpRequest.cpp if (isSetCookieHeader(name) && !securityOrigin()->canLoadLocalResources()) { securityOrigin 152 Source/core/xml/XMLHttpRequest.h SecurityOrigin* securityOrigin() const; securityOrigin 88 Source/core/xml/XSLTProcessor.cpp result->updateSecurityOrigin(oldDocument->securityOrigin()); securityOrigin 599 Source/core/xml/parser/XMLDocumentParser.cpp if (!XMLDocumentParserScope::currentFetcher->document()->securityOrigin()->canRequest(url)) { securityOrigin 70 Source/modules/filesystem/DOMFileSystem.cpp filesystemName.append(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); securityOrigin 78 Source/modules/filesystem/DOMFileSystem.cpp rootURL.append(context->securityOrigin()->toString()); securityOrigin 81 Source/modules/filesystem/DOMFileSystemBase.cpp return m_context->securityOrigin(); securityOrigin 140 Source/modules/filesystem/DOMFileSystemBase.cpp result.append(securityOrigin()->toString()); securityOrigin 90 Source/modules/filesystem/DOMFileSystemBase.h SecurityOrigin* securityOrigin() const; securityOrigin 60 Source/modules/filesystem/DOMWindowFileSystem.cpp if (!document->securityOrigin()->canAccessFileSystem()) { securityOrigin 83 Source/modules/filesystem/DOMWindowFileSystem.cpp SecurityOrigin* securityOrigin = document->securityOrigin(); securityOrigin 85 Source/modules/filesystem/DOMWindowFileSystem.cpp if (!securityOrigin->canAccessFileSystem() || !securityOrigin->canRequest(completedURL)) { securityOrigin 160 Source/modules/filesystem/InspectorFileSystemAgent.cpp KURL rootURL = DOMFileSystemBase::createFileSystemRootURL(executionContext->securityOrigin()->toString(), type); securityOrigin 719 Source/modules/filesystem/InspectorFileSystemAgent.cpp if (frame->document() && frame->document()->securityOrigin()->isSameSchemeHostPort(origin)) securityOrigin 82 Source/modules/filesystem/LocalFileSystem.cpp KURL storagePartition = KURL(KURL(), context->securityOrigin()->toString()); securityOrigin 95 Source/modules/filesystem/LocalFileSystem.cpp KURL storagePartition = KURL(KURL(), context->securityOrigin()->toString()); securityOrigin 51 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp if (!secureContext->securityOrigin()->canAccessFileSystem()) { securityOrigin 68 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp if (!secureContext->securityOrigin()->canAccessFileSystem()) { securityOrigin 91 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) { securityOrigin 108 Source/modules/filesystem/WorkerGlobalScopeFileSystem.cpp if (!secureContext->securityOrigin()->canAccessFileSystem() || !secureContext->securityOrigin()->canRequest(completedURL)) { securityOrigin 109 Source/modules/imagebitmap/ImageBitmapFactories.cpp if (!image->cachedImage()->passesAccessControlCheck(eventTarget.toDOMWindow()->document()->securityOrigin()) && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(image->src())) { securityOrigin 152 Source/modules/imagebitmap/ImageBitmapFactories.cpp if (!video->player()->didPassCORSAccessCheck() && eventTarget.toDOMWindow()->document()->securityOrigin()->taintsCanvas(video->currentSrc())) { securityOrigin 80 Source/modules/indexeddb/IDBFactory.cpp if (!context->securityOrigin()->canAccessDatabase()) { securityOrigin 92 Source/modules/indexeddb/IDBFactory.cpp blink::Platform::current()->idbFactory()->getDatabaseNames(WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); securityOrigin 116 Source/modules/indexeddb/IDBFactory.cpp if (!context->securityOrigin()->canAccessDatabase()) { securityOrigin 130 Source/modules/indexeddb/IDBFactory.cpp blink::Platform::current()->idbFactory()->open(name, version, transactionId, WebIDBCallbacksImpl::create(request).leakPtr(), WebIDBDatabaseCallbacksImpl::create(databaseCallbacks.release()).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); securityOrigin 150 Source/modules/indexeddb/IDBFactory.cpp if (!context->securityOrigin()->canAccessDatabase()) { securityOrigin 162 Source/modules/indexeddb/IDBFactory.cpp blink::Platform::current()->idbFactory()->deleteDatabase(name, WebIDBCallbacksImpl::create(request).leakPtr(), createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); securityOrigin 92 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp static PassRefPtr<GetDatabaseNamesCallback> create(PassRefPtr<RequestDatabaseNamesCallback> requestCallback, const String& securityOrigin) securityOrigin 94 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp return adoptRef(new GetDatabaseNamesCallback(requestCallback, securityOrigin)); securityOrigin 128 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp GetDatabaseNamesCallback(PassRefPtr<RequestDatabaseNamesCallback> requestCallback, const String& securityOrigin) securityOrigin 131 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp , m_securityOrigin(securityOrigin) { } securityOrigin 539 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* findFrameWithSecurityOrigin(Page* page, const String& securityOrigin) securityOrigin 542 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp RefPtr<SecurityOrigin> documentOrigin = frame->document()->securityOrigin(); securityOrigin 543 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp if (documentOrigin->toRawString() == securityOrigin) securityOrigin 615 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestDatabaseNames(ErrorString* errorString, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback> requestCallback) securityOrigin 617 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin); securityOrigin 638 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp idbRequest->addEventListener(EventTypeNames::success, GetDatabaseNamesCallback::create(requestCallback, document->securityOrigin()->toRawString()), false); securityOrigin 641 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestDatabase(ErrorString* errorString, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback> requestCallback) securityOrigin 643 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin); securityOrigin 659 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp databaseLoader->start(idbFactory, document->securityOrigin(), databaseName); securityOrigin 662 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::requestData(ErrorString* errorString, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback> requestCallback) securityOrigin 664 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin); securityOrigin 686 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp dataLoader->start(idbFactory, document->securityOrigin(), databaseName); securityOrigin 773 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp void InspectorIndexedDBAgent::clearObjectStore(ErrorString* errorString, const String& securityOrigin, const String& databaseName, const String& objectStoreName, PassRefPtr<ClearObjectStoreCallback> requestCallback) securityOrigin 775 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp LocalFrame* frame = findFrameWithSecurityOrigin(m_page, securityOrigin); securityOrigin 791 Source/modules/indexeddb/InspectorIndexedDBAgent.cpp clearObjectStore->start(idbFactory, document->securityOrigin(), databaseName); securityOrigin 56 Source/modules/indexeddb/InspectorIndexedDBAgent.h virtual void requestDatabaseNames(ErrorString*, const String& securityOrigin, PassRefPtr<RequestDatabaseNamesCallback>) OVERRIDE; securityOrigin 57 Source/modules/indexeddb/InspectorIndexedDBAgent.h virtual void requestDatabase(ErrorString*, const String& securityOrigin, const String& databaseName, PassRefPtr<RequestDatabaseCallback>) OVERRIDE; securityOrigin 58 Source/modules/indexeddb/InspectorIndexedDBAgent.h virtual void requestData(ErrorString*, const String& securityOrigin, const String& databaseName, const String& objectStoreName, const String& indexName, int skipCount, int pageSize, const RefPtr<JSONObject>* keyRange, PassRefPtr<RequestDataCallback>) OVERRIDE; securityOrigin 126 Source/modules/mediastream/MediaStreamTrack.cpp RefPtr<MediaStreamTrackSourcesRequest> request = MediaStreamTrackSourcesRequestImpl::create(context->securityOrigin()->toString(), callback); securityOrigin 66 Source/modules/quota/DeprecatedStorageQuota.cpp SecurityOrigin* securityOrigin = executionContext->securityOrigin(); securityOrigin 67 Source/modules/quota/DeprecatedStorageQuota.cpp if (securityOrigin->isUnique()) { securityOrigin 72 Source/modules/quota/DeprecatedStorageQuota.cpp KURL storagePartition = KURL(KURL(), securityOrigin->toString()); securityOrigin 93 Source/modules/quota/StorageQuota.cpp SecurityOrigin* securityOrigin = executionContext->securityOrigin(); securityOrigin 94 Source/modules/quota/StorageQuota.cpp if (securityOrigin->isUnique()) { securityOrigin 99 Source/modules/quota/StorageQuota.cpp KURL storagePartition = KURL(KURL(), securityOrigin->toString()); securityOrigin 78 Source/modules/serviceworkers/ServiceWorkerContainer.cpp RefPtr<SecurityOrigin> documentOrigin = executionContext->securityOrigin(); securityOrigin 106 Source/modules/serviceworkers/ServiceWorkerContainer.cpp RefPtr<SecurityOrigin> documentOrigin = executionContext->securityOrigin(); securityOrigin 51 Source/modules/webdatabase/DOMWindowWebDatabase.cpp if (RuntimeEnabledFeatures::databaseEnabled() && window.document()->securityOrigin()->canAccessDatabase()) { securityOrigin 68 Source/modules/webdatabase/Database.h virtual SecurityOrigin* securityOrigin() const OVERRIDE; securityOrigin 215 Source/modules/webdatabase/DatabaseBackendBase.cpp m_contextThreadSecurityOrigin = m_databaseContext->securityOrigin()->isolatedCopy(); securityOrigin 224 Source/modules/webdatabase/DatabaseBackendBase.cpp m_guid = guidForOriginAndName(securityOrigin()->toString(), name); securityOrigin 234 Source/modules/webdatabase/DatabaseBackendBase.cpp m_filename = DatabaseManager::manager().fullPathForDatabase(securityOrigin(), m_name); securityOrigin 610 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 620 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 630 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 640 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 650 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 660 Source/modules/webdatabase/DatabaseBackendBase.cpp createDatabaseIdentifierFromSecurityOrigin(securityOrigin()), securityOrigin 65 Source/modules/webdatabase/DatabaseBackendBase.h virtual SecurityOrigin* securityOrigin() const; securityOrigin 255 Source/modules/webdatabase/DatabaseContext.cpp return executionContext()->securityOrigin(); securityOrigin 71 Source/modules/webdatabase/DatabaseContext.h SecurityOrigin* securityOrigin() const; securityOrigin 182 Source/modules/webdatabase/DatabaseManager.cpp context->securityOrigin()->toString().ascii().data()); securityOrigin 231 Source/modules/webdatabase/DatabaseManager.cpp DatabaseClient::from(context)->didOpenDatabase(database, context->securityOrigin()->host(), name, expectedVersion); securityOrigin 55 Source/modules/webdatabase/DatabaseTracker.cpp createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), securityOrigin 91 Source/modules/webdatabase/DatabaseTracker.cpp String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); securityOrigin 136 Source/modules/webdatabase/DatabaseTracker.cpp String originIdentifier = createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()); securityOrigin 174 Source/modules/webdatabase/DatabaseTracker.cpp createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), securityOrigin 195 Source/modules/webdatabase/DatabaseTracker.cpp createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), securityOrigin 207 Source/modules/webdatabase/DatabaseTracker.cpp DatabaseNameMap* nameMap = m_openDatabaseMap->get(createDatabaseIdentifierFromSecurityOrigin(context->securityOrigin())); securityOrigin 49 Source/modules/webdatabase/SQLTransactionClient.cpp createDatabaseIdentifierFromSecurityOrigin(database->securityOrigin()), securityOrigin 50 Source/modules/webdatabase/WorkerGlobalScopeWebDatabase.cpp if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) { securityOrigin 68 Source/modules/webdatabase/WorkerGlobalScopeWebDatabase.cpp if (RuntimeEnabledFeatures::databaseEnabled() && context.securityOrigin()->canAccessDatabase()) { securityOrigin 140 Source/modules/websockets/NewWebSocketChannelImpl.cpp m_handle->connect(url, webProtocols, *executionContext()->securityOrigin(), this); securityOrigin 303 Source/modules/websockets/WebSocket.cpp if (MixedContentChecker::isMixedContent(executionContext()->securityOrigin(), m_url)) { securityOrigin 180 Source/modules/websockets/WebSocketHandshake.cpp return m_document->securityOrigin()->toString(); securityOrigin 43 Source/platform/blob/BlobURL.cpp KURL BlobURL::createPublicURL(SecurityOrigin* securityOrigin) securityOrigin 45 Source/platform/blob/BlobURL.cpp ASSERT(securityOrigin); securityOrigin 46 Source/platform/blob/BlobURL.cpp return createBlobURL(securityOrigin->toString()); securityOrigin 90 Source/platform/weborigin/DatabaseIdentifier.cpp String createDatabaseIdentifierFromSecurityOrigin(const SecurityOrigin* securityOrigin) securityOrigin 97 Source/platform/weborigin/DatabaseIdentifier.cpp if (securityOrigin->needsDatabaseIdentifierQuirkForFiles()) securityOrigin 102 Source/platform/weborigin/DatabaseIdentifier.cpp return securityOrigin->protocol() + separatorString + securityOrigin->host() + separatorString + String::number(securityOrigin->port()); securityOrigin 116 Source/web/ContextFeaturesClientImpl.cpp String currentDomain = document->securityOrigin()->domain(); securityOrigin 57 Source/web/IDBFactoryBackendProxy.cpp WebSecurityOrigin origin(context->securityOrigin()); securityOrigin 26 Source/web/MediaKeysClientImpl.cpp WebSecurityOrigin securityOrigin(executionContext->securityOrigin()); securityOrigin 27 Source/web/MediaKeysClientImpl.cpp return adoptPtr(webFrame->client()->createContentDecryptionModule(webFrame, securityOrigin, keySystem)); securityOrigin 48 Source/web/NotificationPresenterImpl.cpp NotificationPermissionCallbackClient(WebNotificationPresenter* presenter, PassRefPtr<SecurityOrigin> securityOrigin, PassOwnPtr<NotificationPermissionCallback> callback) securityOrigin 50 Source/web/NotificationPresenterImpl.cpp , m_securityOrigin(securityOrigin) securityOrigin 100 Source/web/NotificationPresenterImpl.cpp int result = m_presenter->checkPermission(WebSecurityOrigin(context->securityOrigin())); securityOrigin 106 Source/web/NotificationPresenterImpl.cpp m_presenter->requestPermission(WebSecurityOrigin(context->securityOrigin()), new NotificationPermissionCallbackClient(m_presenter, context->securityOrigin(), callback)); securityOrigin 63 Source/web/SpeechRecognitionClientProxy.cpp WebSpeechRecognitionParams params(webSpeechGrammars, lang, continuous, interimResults, maxAlternatives, WebSecurityOrigin(recognition->executionContext()->securityOrigin())); securityOrigin 67 Source/web/WebDatabase.cpp return WebSecurityOrigin(m_database->securityOrigin()); securityOrigin 82 Source/web/WebDocument.cpp return WebSecurityOrigin(constUnwrap<Document>()->securityOrigin()); securityOrigin 784 Source/web/WebFrameImpl.cpp void WebFrameImpl::setIsolatedWorldSecurityOrigin(int worldID, const WebSecurityOrigin& securityOrigin) securityOrigin 787 Source/web/WebFrameImpl.cpp DOMWrapperWorld::setIsolatedWorldSecurityOrigin(worldID, securityOrigin.get()); securityOrigin 834 Source/web/WebFrameImpl.cpp return frame()->loader().mixedContentChecker()->canRunInsecureContent(frame()->document()->securityOrigin(), url); securityOrigin 41 Source/web/WebGeolocationPermissionRequest.cpp return WebSecurityOrigin(m_private->executionContext()->securityOrigin()); securityOrigin 65 Source/web/WebMIDIPermissionRequest.cpp return WebSecurityOrigin(m_private->executionContext()->securityOrigin()); securityOrigin 62 Source/web/WebMediaDevicesRequest.cpp return WebSecurityOrigin(m_private->executionContext()->securityOrigin()); securityOrigin 352 Source/web/WebSharedWorkerImpl.cpp WebSecurityOrigin webSecurityOrigin(m_loadingDocument->securityOrigin()); securityOrigin 49 Source/web/WebStorageEventDispatcherImpl.cpp RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); securityOrigin 51 Source/web/WebStorageEventDispatcherImpl.cpp key, oldValue, newValue, securityOrigin.get(), pageURL, securityOrigin 61 Source/web/WebStorageEventDispatcherImpl.cpp RefPtr<WebCore::SecurityOrigin> securityOrigin = WebCore::SecurityOrigin::create(origin); securityOrigin 63 Source/web/WebStorageEventDispatcherImpl.cpp key, oldValue, newValue, securityOrigin.get(), pageURL, securityOrigin 95 Source/web/WebUserMediaRequest.cpp return WebSecurityOrigin(m_private->executionContext()->securityOrigin()); securityOrigin 117 Source/web/tests/MHTMLTest.cpp WebCore::SecurityOrigin* origin = document->securityOrigin(); securityOrigin 48 public/web/WebDatabase.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const; securityOrigin 80 public/web/WebDocument.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const; securityOrigin 46 public/web/WebGeolocationPermissionRequest.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const; securityOrigin 55 public/web/WebMIDIPermissionRequest.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const; securityOrigin 60 public/web/WebMediaDevicesRequest.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const; securityOrigin 72 public/web/WebUserMediaRequest.h BLINK_EXPORT WebSecurityOrigin securityOrigin() const;