| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2007, 2008 Apple Inc. All rights reserved. |
| 3 * | 3 * |
| 4 * Redistribution and use in source and binary forms, with or without | 4 * Redistribution and use in source and binary forms, with or without |
| 5 * modification, are permitted provided that the following conditions | 5 * modification, are permitted provided that the following conditions |
| 6 * are met: | 6 * are met: |
| 7 * | 7 * |
| 8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
| (...skipping 247 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 258 bool m_universalAccess; | 258 bool m_universalAccess; |
| 259 bool m_canLoadLocalResources; | 259 bool m_canLoadLocalResources; |
| 260 bool m_blockLocalAccessFromLocalOrigin; | 260 bool m_blockLocalAccessFromLocalOrigin; |
| 261 }; | 261 }; |
| 262 std::unique_ptr<PrivilegeData> createPrivilegeData() const; | 262 std::unique_ptr<PrivilegeData> createPrivilegeData() const; |
| 263 void transferPrivilegesFrom(std::unique_ptr<PrivilegeData>); | 263 void transferPrivilegesFrom(std::unique_ptr<PrivilegeData>); |
| 264 | 264 |
| 265 void setUniqueOriginIsPotentiallyTrustworthy( | 265 void setUniqueOriginIsPotentiallyTrustworthy( |
| 266 bool isUniqueOriginPotentiallyTrustworthy); | 266 bool isUniqueOriginPotentiallyTrustworthy); |
| 267 | 267 |
| 268 // Only used for document.domain setting. The method should probably be moved |
| 269 // if we need it for something more general. |
| 270 static String canonicalizeHost(const String& host, bool* success); |
| 271 |
| 268 private: | 272 private: |
| 269 friend class SecurityOriginTest; | 273 friend class SecurityOriginTest; |
| 270 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, Suborigins); | 274 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, Suborigins); |
| 271 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, SuboriginsParsing); | 275 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, SuboriginsParsing); |
| 272 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, | 276 FRIEND_TEST_ALL_PREFIXES(SecurityOriginTest, |
| 273 SuboriginsIsSameSchemeHostPortAndSuborigin); | 277 SuboriginsIsSameSchemeHostPortAndSuborigin); |
| 274 | 278 |
| 275 SecurityOrigin(); | 279 SecurityOrigin(); |
| 276 explicit SecurityOrigin(const KURL&); | 280 explicit SecurityOrigin(const KURL&); |
| 277 explicit SecurityOrigin(const SecurityOrigin*); | 281 explicit SecurityOrigin(const SecurityOrigin*); |
| (...skipping 19 matching lines...) Expand all Loading... |
| 297 bool m_universalAccess; | 301 bool m_universalAccess; |
| 298 bool m_domainWasSetInDOM; | 302 bool m_domainWasSetInDOM; |
| 299 bool m_canLoadLocalResources; | 303 bool m_canLoadLocalResources; |
| 300 bool m_blockLocalAccessFromLocalOrigin; | 304 bool m_blockLocalAccessFromLocalOrigin; |
| 301 bool m_isUniqueOriginPotentiallyTrustworthy; | 305 bool m_isUniqueOriginPotentiallyTrustworthy; |
| 302 }; | 306 }; |
| 303 | 307 |
| 304 } // namespace blink | 308 } // namespace blink |
| 305 | 309 |
| 306 #endif // SecurityOrigin_h | 310 #endif // SecurityOrigin_h |
| OLD | NEW |