| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2011 Google Inc. All Rights Reserved. | 2 * Copyright (C) 2011 Google Inc. All Rights Reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
| 8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
| 9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
| 10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 47 DEFINE_TRACE(SecurityContext) | 47 DEFINE_TRACE(SecurityContext) |
| 48 { | 48 { |
| 49 visitor->trace(m_contentSecurityPolicy); | 49 visitor->trace(m_contentSecurityPolicy); |
| 50 } | 50 } |
| 51 | 51 |
| 52 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigi
n) | 52 void SecurityContext::setSecurityOrigin(PassRefPtr<SecurityOrigin> securityOrigi
n) |
| 53 { | 53 { |
| 54 m_securityOrigin = securityOrigin; | 54 m_securityOrigin = securityOrigin; |
| 55 } | 55 } |
| 56 | 56 |
| 57 void SecurityContext::setContentSecurityPolicy(PassRefPtrWillBeRawPtr<ContentSec
urityPolicy> contentSecurityPolicy) | 57 void SecurityContext::setContentSecurityPolicy(RawPtr<ContentSecurityPolicy> con
tentSecurityPolicy) |
| 58 { | 58 { |
| 59 m_contentSecurityPolicy = contentSecurityPolicy; | 59 m_contentSecurityPolicy = contentSecurityPolicy; |
| 60 } | 60 } |
| 61 | 61 |
| 62 void SecurityContext::enforceSandboxFlags(SandboxFlags mask) | 62 void SecurityContext::enforceSandboxFlags(SandboxFlags mask) |
| 63 { | 63 { |
| 64 applySandboxFlags(mask); | 64 applySandboxFlags(mask); |
| 65 } | 65 } |
| 66 | 66 |
| 67 void SecurityContext::applySandboxFlags(SandboxFlags mask) | 67 void SecurityContext::applySandboxFlags(SandboxFlags mask) |
| (...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 101 | 101 |
| 102 ASSERT(!suborigin.name().isEmpty()); | 102 ASSERT(!suborigin.name().isEmpty()); |
| 103 ASSERT(RuntimeEnabledFeatures::suboriginsEnabled()); | 103 ASSERT(RuntimeEnabledFeatures::suboriginsEnabled()); |
| 104 ASSERT(m_securityOrigin.get()); | 104 ASSERT(m_securityOrigin.get()); |
| 105 ASSERT(!m_securityOrigin->hasSuborigin() || m_securityOrigin->suborigin()->n
ame() == suborigin.name()); | 105 ASSERT(!m_securityOrigin->hasSuborigin() || m_securityOrigin->suborigin()->n
ame() == suborigin.name()); |
| 106 m_securityOrigin->addSuborigin(suborigin); | 106 m_securityOrigin->addSuborigin(suborigin); |
| 107 didUpdateSecurityOrigin(); | 107 didUpdateSecurityOrigin(); |
| 108 } | 108 } |
| 109 | 109 |
| 110 } // namespace blink | 110 } // namespace blink |
| OLD | NEW |