OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2011 Google, Inc. All rights reserved. | 2 * Copyright (C) 2011 Google, Inc. All rights reserved. |
3 * | 3 * |
4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
6 * are met: | 6 * are met: |
7 * 1. Redistributions of source code must retain the above copyright | 7 * 1. Redistributions of source code must retain the above copyright |
8 * notice, this list of conditions and the following disclaimer. | 8 * notice, this list of conditions and the following disclaimer. |
9 * 2. Redistributions in binary form must reproduce the above copyright | 9 * 2. Redistributions in binary form must reproduce the above copyright |
10 * notice, this list of conditions and the following disclaimer in the | 10 * notice, this list of conditions and the following disclaimer in the |
(...skipping 309 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
320 if (hashAlgorithmsUsed == ContentSecurityPolicyHashAlgorithmNone) | 320 if (hashAlgorithmsUsed == ContentSecurityPolicyHashAlgorithmNone) |
321 return false; | 321 return false; |
322 | 322 |
323 StringUTF8Adaptor normalizedSource(source, StringUTF8Adaptor::Normalize, WTF
::EntitiesForUnencodables); | 323 StringUTF8Adaptor normalizedSource(source, StringUTF8Adaptor::Normalize, WTF
::EntitiesForUnencodables); |
324 | 324 |
325 // See comment in CSPSourceList::parseHash about why we are using this sizeo
f | 325 // See comment in CSPSourceList::parseHash about why we are using this sizeo
f |
326 // calculation instead of WTF_ARRAY_LENGTH. | 326 // calculation instead of WTF_ARRAY_LENGTH. |
327 for (size_t i = 0; i < (sizeof(kAlgorithmMap) / sizeof(kAlgorithmMap[0])); i
++) { | 327 for (size_t i = 0; i < (sizeof(kAlgorithmMap) / sizeof(kAlgorithmMap[0])); i
++) { |
328 DigestValue digest; | 328 DigestValue digest; |
329 if (kAlgorithmMap[i].cspHashAlgorithm & hashAlgorithmsUsed) { | 329 if (kAlgorithmMap[i].cspHashAlgorithm & hashAlgorithmsUsed) { |
330 computeDigest(kAlgorithmMap[i].algorithm, normalizedSource.data(), n
ormalizedSource.length(), digest); | 330 bool digestSuccess = computeDigest(kAlgorithmMap[i].algorithm, norma
lizedSource.data(), normalizedSource.length(), digest); |
331 if (isAllowedByAllWithHash<allowed>(policies, CSPHashValue(kAlgorith
mMap[i].cspHashAlgorithm, digest))) | 331 if (digestSuccess && isAllowedByAllWithHash<allowed>(policies, CSPHa
shValue(kAlgorithmMap[i].cspHashAlgorithm, digest))) |
332 return true; | 332 return true; |
333 } | 333 } |
334 } | 334 } |
335 | 335 |
336 return false; | 336 return false; |
337 } | 337 } |
338 | 338 |
339 bool ContentSecurityPolicy::allowJavaScriptURLs(const String& contextURL, const
WTF::OrdinalNumber& contextLine, ContentSecurityPolicy::ReportingStatus reportin
gStatus) const | 339 bool ContentSecurityPolicy::allowJavaScriptURLs(const String& contextURL, const
WTF::OrdinalNumber& contextLine, ContentSecurityPolicy::ReportingStatus reportin
gStatus) const |
340 { | 340 { |
341 return isAllowedByAllWithContext<&CSPDirectiveList::allowJavaScriptURLs>(m_p
olicies, contextURL, contextLine, reportingStatus); | 341 return isAllowedByAllWithContext<&CSPDirectiveList::allowJavaScriptURLs>(m_p
olicies, contextURL, contextLine, reportingStatus); |
(...skipping 435 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
777 // Collisions have no security impact, so we can save space by storing only
the string's hash rather than the whole report. | 777 // Collisions have no security impact, so we can save space by storing only
the string's hash rather than the whole report. |
778 return !m_violationReportsSent.contains(report.impl()->hash()); | 778 return !m_violationReportsSent.contains(report.impl()->hash()); |
779 } | 779 } |
780 | 780 |
781 void ContentSecurityPolicy::didSendViolationReport(const String& report) | 781 void ContentSecurityPolicy::didSendViolationReport(const String& report) |
782 { | 782 { |
783 m_violationReportsSent.add(report.impl()->hash()); | 783 m_violationReportsSent.add(report.impl()->hash()); |
784 } | 784 } |
785 | 785 |
786 } // namespace WebCore | 786 } // namespace WebCore |
OLD | NEW |