| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2006, 2007, 2008, 2009, 2011 Apple Inc. All rights reserved. | 2 * Copyright (C) 2006, 2007, 2008, 2009, 2011 Apple Inc. All rights reserved. |
| 3 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) | 3 * Copyright (C) 2008, 2009 Torch Mobile Inc. All rights reserved. (http://www.t
orchmobile.com/) |
| 4 * Copyright (C) Research In Motion Limited 2009. All rights reserved. | 4 * Copyright (C) Research In Motion Limited 2009. All rights reserved. |
| 5 * Copyright (C) 2011 Google Inc. All rights reserved. | 5 * Copyright (C) 2011 Google Inc. All rights reserved. |
| 6 * | 6 * |
| 7 * Redistribution and use in source and binary forms, with or without | 7 * Redistribution and use in source and binary forms, with or without |
| 8 * modification, are permitted provided that the following conditions | 8 * modification, are permitted provided that the following conditions |
| 9 * are met: | 9 * are met: |
| 10 * | 10 * |
| (...skipping 129 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 140 void dispatchDocumentElementAvailable(); | 140 void dispatchDocumentElementAvailable(); |
| 141 void runScriptsAtDocumentElementAvailable(); | 141 void runScriptsAtDocumentElementAvailable(); |
| 142 | 142 |
| 143 // The following sandbox flags will be forced, regardless of changes to | 143 // The following sandbox flags will be forced, regardless of changes to |
| 144 // the sandbox attribute of any parent frames. | 144 // the sandbox attribute of any parent frames. |
| 145 void forceSandboxFlags(SandboxFlags flags) { m_forcedSandboxFlags |= flags;
} | 145 void forceSandboxFlags(SandboxFlags flags) { m_forcedSandboxFlags |= flags;
} |
| 146 SandboxFlags effectiveSandboxFlags() const; | 146 SandboxFlags effectiveSandboxFlags() const; |
| 147 | 147 |
| 148 WebInsecureRequestPolicy getInsecureRequestPolicy() const; | 148 WebInsecureRequestPolicy getInsecureRequestPolicy() const; |
| 149 SecurityContext::InsecureNavigationsSet* insecureNavigationsToUpgrade() cons
t; | 149 SecurityContext::InsecureNavigationsSet* insecureNavigationsToUpgrade() cons
t; |
| 150 void upgradeInsecureRequest(ResourceRequest&, Document*) const; |
| 150 | 151 |
| 151 Frame* opener(); | 152 Frame* opener(); |
| 152 void setOpener(LocalFrame*); | 153 void setOpener(LocalFrame*); |
| 153 | 154 |
| 154 void detach(); | 155 void detach(); |
| 155 | 156 |
| 156 void finishedParsing(); | 157 void finishedParsing(); |
| 157 void checkCompleted(); | 158 void checkCompleted(); |
| 158 | 159 |
| 159 void receivedMainResourceRedirect(const KURL& newURL); | 160 void receivedMainResourceRedirect(const KURL& newURL); |
| (...skipping 123 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 283 | 284 |
| 284 SandboxFlags m_forcedSandboxFlags; | 285 SandboxFlags m_forcedSandboxFlags; |
| 285 | 286 |
| 286 bool m_dispatchingDidClearWindowObjectInMainWorld; | 287 bool m_dispatchingDidClearWindowObjectInMainWorld; |
| 287 bool m_protectProvisionalLoader; | 288 bool m_protectProvisionalLoader; |
| 288 }; | 289 }; |
| 289 | 290 |
| 290 } // namespace blink | 291 } // namespace blink |
| 291 | 292 |
| 292 #endif // FrameLoader_h | 293 #endif // FrameLoader_h |
| OLD | NEW |