targetOrigin      281 Source/bindings/v8/custom/V8WindowCustom.cpp     V8TRYCATCH_FOR_V8STRINGRESOURCE_VOID(V8StringResource<WithUndefinedOrNullCheck>, targetOrigin, info[targetOriginArgIndex]);
targetOrigin      287 Source/bindings/v8/custom/V8WindowCustom.cpp     window->postMessage(message.release(), &portArray, targetOrigin, source, exceptionState);
targetOrigin      114 Source/core/frame/DOMWindow.cpp     PostMessageTimer(DOMWindow& window, PassRefPtr<SerializedScriptValue> message, const String& sourceOrigin, PassRefPtrWillBeRawPtr<DOMWindow> source, PassOwnPtr<MessagePortChannelArray> channels, SecurityOrigin* targetOrigin, PassRefPtr<ScriptCallStack> stackTrace, UserGestureToken* userGestureToken)
targetOrigin      121 Source/core/frame/DOMWindow.cpp         , m_targetOrigin(targetOrigin)
targetOrigin      817 Source/core/frame/DOMWindow.cpp void DOMWindow::postMessage(PassRefPtr<SerializedScriptValue> message, const MessagePortArray* ports, const String& targetOrigin, DOMWindow* source, ExceptionState& exceptionState)
targetOrigin      827 Source/core/frame/DOMWindow.cpp     if (targetOrigin == "/") {
targetOrigin      831 Source/core/frame/DOMWindow.cpp     } else if (targetOrigin != "*") {
targetOrigin      832 Source/core/frame/DOMWindow.cpp         target = SecurityOrigin::createFromString(targetOrigin);
targetOrigin      836 Source/core/frame/DOMWindow.cpp             exceptionState.throwDOMException(SyntaxError, "Invalid target origin '" + targetOrigin + "' in a call to 'postMessage'.");
targetOrigin      874 Source/core/frame/DOMWindow.cpp     if (m_frame->loader().client()->willCheckAndDispatchMessageEvent(timer->targetOrigin(), event.get()))
targetOrigin      880 Source/core/frame/DOMWindow.cpp     dispatchMessageEventWithOriginCheck(timer->targetOrigin(), event, timer->stackTrace());
targetOrigin     1712 Source/core/frame/DOMWindow.cpp     SecurityOrigin* targetOrigin = document()->securityOrigin();
targetOrigin     1713 Source/core/frame/DOMWindow.cpp     String message = "Blocked a frame with origin \"" + activeOrigin->toString() + "\" from accessing a frame with origin \"" + targetOrigin->toString() + "\". ";
targetOrigin     1728 Source/core/frame/DOMWindow.cpp     if (targetOrigin->protocol() != activeOrigin->protocol())
targetOrigin     1732 Source/core/frame/DOMWindow.cpp     if (targetOrigin->domainWasSetInDOM() && activeOrigin->domainWasSetInDOM())
targetOrigin     1733 Source/core/frame/DOMWindow.cpp         return message + "The frame requesting access set \"document.domain\" to \"" + activeOrigin->domain() + "\", the frame being accessed set it to \"" + targetOrigin->domain() + "\". Both must set \"document.domain\" to the same value to allow access.";
targetOrigin     1736 Source/core/frame/DOMWindow.cpp     if (targetOrigin->domainWasSetInDOM())
targetOrigin     1737 Source/core/frame/DOMWindow.cpp         return message + "The frame being accessed set \"document.domain\" to \"" + targetOrigin->domain() + "\", but the frame requesting access did not. Both must set \"document.domain\" to the same value to allow access.";
targetOrigin      232 Source/core/frame/DOMWindow.h         void postMessage(PassRefPtr<SerializedScriptValue> message, const MessagePortArray*, const String& targetOrigin, DOMWindow* source, ExceptionState&);
targetOrigin      295 Source/platform/weborigin/SecurityOrigin.cpp     RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);
targetOrigin      297 Source/platform/weborigin/SecurityOrigin.cpp     if (targetOrigin->isUnique())
targetOrigin      302 Source/platform/weborigin/SecurityOrigin.cpp     if (isSameSchemeHostPort(targetOrigin.get()))
targetOrigin      305 Source/platform/weborigin/SecurityOrigin.cpp     if (SecurityPolicy::isAccessWhiteListed(this, targetOrigin.get()))
targetOrigin       96 Source/platform/weborigin/SecurityPolicy.cpp bool SecurityPolicy::isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* targetOrigin)
targetOrigin      100 Source/platform/weborigin/SecurityPolicy.cpp             if (list->at(i).matchesOrigin(*targetOrigin) != OriginAccessEntry::DoesNotMatchOrigin)
targetOrigin      109 Source/platform/weborigin/SecurityPolicy.cpp     RefPtr<SecurityOrigin> targetOrigin = SecurityOrigin::create(url);
targetOrigin      110 Source/platform/weborigin/SecurityPolicy.cpp     return isAccessWhiteListed(activeOrigin, targetOrigin.get());
targetOrigin       57 Source/platform/weborigin/SecurityPolicy.h     static bool isAccessWhiteListed(const SecurityOrigin* activeOrigin, const SecurityOrigin* targetOrigin);