/external/chromium_org/third_party/WebKit/Source/core/page/ |
DOMSecurityPolicy.cpp | 32 #include "core/page/ContentSecurityPolicy.h" 46 return context->contentSecurityPolicy()->isActive(); 49 template<bool (ContentSecurityPolicy::*allowWithType)(const String&, const String&, const KURL&, ContentSecurityPolicy::ReportingStatus) const> 55 return (context->contentSecurityPolicy()->*allowWithType)(type, type, KURL(), ContentSecurityPolicy::SuppressReport); 58 template<bool (ContentSecurityPolicy::*allowWithURL)(const KURL&, ContentSecurityPolicy::ReportingStatus) const> 68 return (context->contentSecurityPolicy()->*allowWithURL)(parsedURL, ContentSecurityPolicy::SuppressReport) [all...] |
ContentSecurityPolicy.cpp | 27 #include "core/page/ContentSecurityPolicy.h" 150 UseCounter::Feature getUseCounterType(ContentSecurityPolicy::HeaderType type) 153 case ContentSecurityPolicy::PrefixedEnforce: 155 case ContentSecurityPolicy::Enforce: 156 return UseCounter::ContentSecurityPolicy; 157 case ContentSecurityPolicy::PrefixedReport: 159 case ContentSecurityPolicy::Report: 218 CSPSource(ContentSecurityPolicy* policy, const String& scheme, const String& host, int port, const String& path, bool hostHasWildcard, bool portHasWildcard) 293 ContentSecurityPolicy* m_policy; 305 CSPSourceList(ContentSecurityPolicy*, const String& directiveName) [all...] |
ContentSecurityPolicy.h | 54 class ContentSecurityPolicy { 57 static PassOwnPtr<ContentSecurityPolicy> create(ScriptExecutionContext* scriptExecutionContext) 59 return adoptPtr(new ContentSecurityPolicy(scriptExecutionContext)); 61 ~ContentSecurityPolicy(); 63 void copyStateFrom(const ContentSecurityPolicy*); 146 explicit ContentSecurityPolicy(ScriptExecutionContext*);
|
DOMSecurityPolicy.h | 36 class ContentSecurityPolicy;
|
UseCounter.h | 77 ContentSecurityPolicy,
|
EventSource.cpp | 47 #include "core/page/ContentSecurityPolicy.h" 94 if (!shouldBypassMainWorldContentSecurityPolicy && !context->contentSecurityPolicy()->allowConnectToSource(fullURL)) { 137 options.contentSecurityPolicyEnforcement = ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) ? DoNotEnforceContentSecurityPolicy : EnforceConnectSrcDirective;
|
/external/chromium_org/chrome/browser/extensions/ |
content_security_policy_apitest.cc | 9 IN_PROC_BROWSER_TEST_F(ExtensionApiTest, ContentSecurityPolicy) {
|
/external/chromium_org/third_party/WebKit/Source/core/dom/ |
SecurityContext.h | 37 class ContentSecurityPolicy; 62 ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); } 82 void setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy>); 95 OwnPtr<ContentSecurityPolicy> m_contentSecurityPolicy;
|
SecurityContext.cpp | 31 #include "core/page/ContentSecurityPolicy.h" 54 void SecurityContext::setContentSecurityPolicy(PassOwnPtr<ContentSecurityPolicy> contentSecurityPolicy) 56 m_contentSecurityPolicy = contentSecurityPolicy;
|
Document.cpp | 133 #include "core/page/ContentSecurityPolicy.h" [all...] |
/external/chromium_org/third_party/WebKit/Source/core/workers/ |
WorkerThreadStartupData.h | 34 #include "core/page/ContentSecurityPolicy.h" 48 static PassOwnPtr<WorkerThreadStartupData> create(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients) 50 return adoptPtr(new WorkerThreadStartupData(scriptURL, userAgent, sourceCode, startMode, contentSecurityPolicy, contentSecurityPolicyType, workerClients)); 60 ContentSecurityPolicy::HeaderType m_contentSecurityPolicyType; 64 WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients>);
|
WorkerThreadStartupData.cpp | 38 WorkerThreadStartupData::WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients) 43 , m_contentSecurityPolicy(contentSecurityPolicy.isolatedCopy())
|
DefaultSharedWorkerRepository.h | 34 #include "core/page/ContentSecurityPolicy.h" 59 void workerScriptLoaded(SharedWorkerProxy&, const String& userAgent, const String& workerScript, PassOwnPtr<MessagePortChannel>, const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType);
|
WorkerGlobalScope.cpp | 46 #include "core/page/ContentSecurityPolicy.h" 112 void WorkerGlobalScope::applyContentSecurityPolicyFromString(const String& policy, ContentSecurityPolicy::HeaderType contentSecurityPolicyType) 114 setContentSecurityPolicy(ContentSecurityPolicy::create(this)); 115 contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType); 191 ASSERT(contentSecurityPolicy());
|
WorkerGlobalScope.h | 36 #include "core/page/ContentSecurityPolicy.h" 136 void applyContentSecurityPolicyFromString(const String& contentSecurityPolicy, ContentSecurityPolicy::HeaderType);
|
/external/chromium_org/third_party/WebKit/Source/core/html/parser/ |
XSSAuditor.cpp | 40 #include "core/page/ContentSecurityPolicy.h" 173 static ContentSecurityPolicy::ReflectedXSSDisposition combineXSSProtectionHeaderAndCSP(ContentSecurityPolicy::ReflectedXSSDisposition xssProtection, ContentSecurityPolicy::ReflectedXSSDisposition reflectedXSS) 175 ContentSecurityPolicy::ReflectedXSSDisposition result = std::max(xssProtection, reflectedXSS); 177 if (result == ContentSecurityPolicy::ReflectedXSSInvalid || result == ContentSecurityPolicy::FilterReflectedXSS || result == ContentSecurityPolicy::ReflectedXSSUnset) 178 return ContentSecurityPolicy::FilterReflectedXSS; 201 , m_xssProtection(ContentSecurityPolicy::FilterReflectedXSS [all...] |
XSSAuditor.h | 110 ContentSecurityPolicy::ReflectedXSSDisposition m_xssProtection;
|
/external/chromium_org/third_party/WebKit/Source/core/platform/network/ |
HTTPParsers.h | 34 #include "core/page/ContentSecurityPolicy.h" 73 ContentSecurityPolicy::ReflectedXSSDisposition parseXSSProtectionHeader(const String& header, String& failureReason, unsigned& failurePosition, String& reportURL);
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/custom/ |
V8WorkerGlobalScopeCustom.cpp | 41 #include "core/page/ContentSecurityPolicy.h" 67 if (ContentSecurityPolicy* policy = workerGlobalScope->contentSecurityPolicy()) {
|
/external/chromium_org/third_party/WebKit/Source/bindings/v8/ |
V8WindowShell.cpp | 54 #include "core/page/ContentSecurityPolicy.h" 232 ContentSecurityPolicy* csp = m_frame->document()->contentSecurityPolicy(); 233 context->AllowCodeGenerationFromStrings(csp->allowEval(0, ContentSecurityPolicy::SuppressReport));
|
V8Initializer.cpp | 45 #include "core/page/ContentSecurityPolicy.h" 132 if (ContentSecurityPolicy* policy = toDocument(scriptExecutionContext)->contentSecurityPolicy())
|
/external/chromium_org/third_party/WebKit/Source/core/inspector/ |
InspectorCSSAgent.h | 33 #include "core/page/ContentSecurityPolicy.h" 80 : m_contentSecurityPolicy(context->contentSecurityPolicy()) 91 ContentSecurityPolicy* m_contentSecurityPolicy;
|
/external/chromium_org/third_party/WebKit/Source/web/ |
AssertMatchingEnums.cpp | 98 #include "core/page/ContentSecurityPolicy.h" [all...] |
WebSharedWorkerImpl.cpp | 369 void WebSharedWorkerImpl::startWorkerContext(const WebURL& url, const WebString& name, const WebString& userAgent, const WebString& sourceCode, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType policyType, long long) 376 OwnPtr<WorkerThreadStartupData> startupData = WorkerThreadStartupData::create(url, userAgent, sourceCode, startMode, contentSecurityPolicy, static_cast<WebCore::ContentSecurityPolicy::HeaderType>(policyType), workerClients.release());
|
/external/chromium_org/third_party/WebKit/Source/core/xml/ |
XMLHttpRequest.cpp | 43 #include "core/page/ContentSecurityPolicy.h" 477 if (!ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) && !scriptExecutionContext()->contentSecurityPolicy()->allowConnectToSource(url)) { 747 options.contentSecurityPolicyEnforcement = ContentSecurityPolicy::shouldBypassMainWorld(scriptExecutionContext()) ? DoNotEnforceContentSecurityPolicy : EnforceConnectSrcDirective; [all...] |