HomeSort by relevance Sort by last modified time
    Searched refs:ContentSecurityPolicy (Results 1 - 25 of 31) sorted by null

1 2

  /external/chromium_org/third_party/WebKit/Source/core/page/
DOMSecurityPolicy.cpp 32 #include "core/page/ContentSecurityPolicy.h"
46 return context->contentSecurityPolicy()->isActive();
49 template<bool (ContentSecurityPolicy::*allowWithType)(const String&, const String&, const KURL&, ContentSecurityPolicy::ReportingStatus) const>
55 return (context->contentSecurityPolicy()->*allowWithType)(type, type, KURL(), ContentSecurityPolicy::SuppressReport);
58 template<bool (ContentSecurityPolicy::*allowWithURL)(const KURL&, ContentSecurityPolicy::ReportingStatus) const>
68 return (context->contentSecurityPolicy()->*allowWithURL)(parsedURL, ContentSecurityPolicy::SuppressReport)
    [all...]
ContentSecurityPolicy.cpp 27 #include "core/page/ContentSecurityPolicy.h"
150 UseCounter::Feature getUseCounterType(ContentSecurityPolicy::HeaderType type)
153 case ContentSecurityPolicy::PrefixedEnforce:
155 case ContentSecurityPolicy::Enforce:
156 return UseCounter::ContentSecurityPolicy;
157 case ContentSecurityPolicy::PrefixedReport:
159 case ContentSecurityPolicy::Report:
218 CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, bool hostHasWildcard, bool portHasWildcard)
293 ContentSecurityPolicy* m_policy;
305 CSPSourceList(ContentSecurityPolicy*, const String& directiveName)
    [all...]
ContentSecurityPolicy.h 54 class ContentSecurityPolicy {
57 static PassOwnPtr<ContentSecurityPolicy> create(ScriptExecutionContext* scriptExecutionContext)
59 return adoptPtr(new ContentSecurityPolicy(scriptExecutionContext));
61 ~ContentSecurityPolicy();
63 void copyStateFrom(const ContentSecurityPolicy*);
146 explicit ContentSecurityPolicy(ScriptExecutionContext*);
DOMSecurityPolicy.h 36 class ContentSecurityPolicy;
UseCounter.h 77 ContentSecurityPolicy,
EventSource.cpp 47 #include "core/page/ContentSecurityPolicy.h"
94 if (!shouldBypassMainWorldContentSecurityPolicy && !context->contentSecurityPolicy()->allowConnectToSource(fullURL)) {
137 options.contentSecurityPolicyEnforcement = ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) ? DoNotEnforceContentSecurityPolicy : EnforceConnectSrcDirective;
  /external/chromium_org/chrome/browser/extensions/
content_security_policy_apitest.cc 9 IN_PROC_BROWSER_TEST_F(ExtensionApiTest, ContentSecurityPolicy) {
  /external/chromium_org/third_party/WebKit/Source/core/dom/
SecurityContext.h 37 class ContentSecurityPolicy;
62 ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); }
82 void setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy>);
95 OwnPtr<ContentSecurityPolicy> m_contentSecurityPolicy;
SecurityContext.cpp 31 #include "core/page/ContentSecurityPolicy.h"
54 void SecurityContext::setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy> contentSecurityPolicy)
56 m_contentSecurityPolicy = contentSecurityPolicy;
Document.cpp 133 #include "core/page/ContentSecurityPolicy.h"
    [all...]
  /external/chromium_org/third_party/WebKit/Source/core/workers/
WorkerThreadStartupData.h 34 #include "core/page/ContentSecurityPolicy.h"
48 static PassOwnPtr<WorkerThreadStartupData> create(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients)
50 return adoptPtr(new WorkerThreadStartupData(scriptURL, userAgent, sourceCode, startMode, contentSecurityPolicy, contentSecurityPolicyType, workerClients));
60 ContentSecurityPolicy::HeaderType m_contentSecurityPolicyType;
64 WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients>);
WorkerThreadStartupData.cpp 38 WorkerThreadStartupData::WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients)
43 , m_contentSecurityPolicy(contentSecurityPolicy.isolatedCopy())
DefaultSharedWorkerRepository.h 34 #include "core/page/ContentSecurityPolicy.h"
59 void workerScriptLoaded(SharedWorkerProxy&, const String& userAgent, const String& workerScript, PassOwnPtr<MessagePortChannel>, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType);
WorkerGlobalScope.cpp 46 #include "core/page/ContentSecurityPolicy.h"
112 void WorkerGlobalScope::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType)
114 setContentSecurityPolicy(ContentSecurityPolicy::create(this));
115 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType);
191 ASSERT(contentSecurityPolicy());
WorkerGlobalScope.h 36 #include "core/page/ContentSecurityPolicy.h"
136 void applyContentSecurityPolicyFromString(const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType);
  /external/chromium_org/third_party/WebKit/Source/core/html/parser/
XSSAuditor.cpp 40 #include "core/page/ContentSecurityPolicy.h"
173 static ContentSecurityPolicy::ReflectedXSSDisposition combineXSSProtectionHeaderAndCSP(ContentSecurityPolicy::ReflectedXSSDisposition xssProtection, ContentSecurityPolicy::ReflectedXSSDisposition reflectedXSS)
175 ContentSecurityPolicy::ReflectedXSSDisposition result = std::max(xssProtection, reflectedXSS);
177 if (result == ContentSecurityPolicy::ReflectedXSSInvalid || result == ContentSecurityPolicy::FilterReflectedXSS || result == ContentSecurityPolicy::ReflectedXSSUnset)
178 return ContentSecurityPolicy::FilterReflectedXSS;
201 , m_xssProtection(ContentSecurityPolicy::FilterReflectedXSS
    [all...]
XSSAuditor.h 110 ContentSecurityPolicy::ReflectedXSSDisposition m_xssProtection;
  /external/chromium_org/third_party/WebKit/Source/core/platform/network/
HTTPParsers.h 34 #include "core/page/ContentSecurityPolicy.h"
73 ContentSecurityPolicy::ReflectedXSSDisposition parseXSSProtectionHeader(const String& header, String& failureReason, unsigned& failurePosition, String& reportURL);
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/
V8WorkerGlobalScopeCustom.cpp 41 #include "core/page/ContentSecurityPolicy.h"
67 if (ContentSecurityPolicy* policy = workerGlobalScope->contentSecurityPolicy()) {
  /external/chromium_org/third_party/WebKit/Source/bindings/v8/
V8WindowShell.cpp 54 #include "core/page/ContentSecurityPolicy.h"
232 ContentSecurityPolicy* csp = m_frame->document()->contentSecurityPolicy();
233 context->AllowCodeGenerationFromStrings(csp->allowEval(0, ContentSecurityPolicy::SuppressReport));
V8Initializer.cpp 45 #include "core/page/ContentSecurityPolicy.h"
132 if (ContentSecurityPolicy* policy = toDocument(scriptExecutionContext)->contentSecurityPolicy())
  /external/chromium_org/third_party/WebKit/Source/core/inspector/
InspectorCSSAgent.h 33 #include "core/page/ContentSecurityPolicy.h"
80 : m_contentSecurityPolicy(context->contentSecurityPolicy())
91 ContentSecurityPolicy* m_contentSecurityPolicy;
  /external/chromium_org/third_party/WebKit/Source/web/
AssertMatchingEnums.cpp 98 #include "core/page/ContentSecurityPolicy.h"
    [all...]
WebSharedWorkerImpl.cpp 369 void WebSharedWorkerImpl::startWorkerContext(const WebURL& url, const WebString& name, const WebString& userAgent, const WebString& sourceCode, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType policyType, long long)
376 OwnPtr<WorkerThreadStartupData> startupData = WorkerThreadStartupData::create(url, userAgent, sourceCode, startMode, contentSecurityPolicy, static_cast<WebCore::ContentSecurityPolicy::HeaderType>(policyType), workerClients.release());
  /external/chromium_org/third_party/WebKit/Source/core/xml/
XMLHttpRequest.cpp 43 #include "core/page/ContentSecurityPolicy.h"
477 if (!ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) && !scriptExecutionContext()->contentSecurityPolicy()->allowConnectToSource(url)) {
747 options.contentSecurityPolicyEnforcement = ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) ? DoNotEnforceContentSecurityPolicy : EnforceConnectSrcDirective;
    [all...]

Completed in 319 milliseconds

1 2