| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2007 Apple Inc. All rights reserved. | 2 * Copyright (C) 2007 Apple Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * | 7 * |
| 8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
| (...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 68 | 68 |
| 69 // In general, extracting the inner URL varies by scheme. It just so happens | 69 // In general, extracting the inner URL varies by scheme. It just so happens |
| 70 // that all the URL schemes we currently support that use inner URLs for their | 70 // that all the URL schemes we currently support that use inner URLs for their |
| 71 // security origin can be parsed using this algorithm. | 71 // security origin can be parsed using this algorithm. |
| 72 KURL SecurityOrigin::extractInnerURL(const KURL& url) | 72 KURL SecurityOrigin::extractInnerURL(const KURL& url) |
| 73 { | 73 { |
| 74 if (url.innerURL()) | 74 if (url.innerURL()) |
| 75 return *url.innerURL(); | 75 return *url.innerURL(); |
| 76 // FIXME: Update this callsite to use the innerURL member function when | 76 // FIXME: Update this callsite to use the innerURL member function when |
| 77 // we finish implementing it. | 77 // we finish implementing it. |
| 78 return KURL(ParsedURLString, decodeURLEscapeSequences(url.path())); | 78 return KURL(ParsedURLString, url.path()); |
| 79 } | 79 } |
| 80 | 80 |
| 81 void SecurityOrigin::setCache(SecurityOriginCache* originCache) | 81 void SecurityOrigin::setCache(SecurityOriginCache* originCache) |
| 82 { | 82 { |
| 83 s_originCache = originCache; | 83 s_originCache = originCache; |
| 84 } | 84 } |
| 85 | 85 |
| 86 static bool shouldTreatAsUniqueOrigin(const KURL& url) | 86 static bool shouldTreatAsUniqueOrigin(const KURL& url) |
| 87 { | 87 { |
| 88 if (!url.isValid()) | 88 if (!url.isValid()) |
| (...skipping 486 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc
alOrigin; | 575 m_blockLocalAccessFromLocalOrigin = privilegeData->m_blockLocalAccessFromLoc
alOrigin; |
| 576 } | 576 } |
| 577 | 577 |
| 578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin
PotentiallyTrustworthy) | 578 void SecurityOrigin::setUniqueOriginIsPotentiallyTrustworthy(bool isUniqueOrigin
PotentiallyTrustworthy) |
| 579 { | 579 { |
| 580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique()); | 580 ASSERT(!isUniqueOriginPotentiallyTrustworthy || isUnique()); |
| 581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth
y; | 581 m_isUniqueOriginPotentiallyTrustworthy = isUniqueOriginPotentiallyTrustworth
y; |
| 582 } | 582 } |
| 583 | 583 |
| 584 } // namespace blink | 584 } // namespace blink |
| OLD | NEW |