contentSecurityPolicy  521 Source/bindings/v8/ScriptController.cpp         || !m_frame->document()->contentSecurityPolicy()->allowJavaScriptURLs(m_frame->document()->url(), eventHandlerPosition().m_line))
contentSecurityPolicy  152 Source/bindings/v8/V8Initializer.cpp         if (ContentSecurityPolicy* policy = toDocument(executionContext)->contentSecurityPolicy())
contentSecurityPolicy  228 Source/bindings/v8/V8WindowShell.cpp             ContentSecurityPolicy* csp = m_frame->document()->contentSecurityPolicy();
contentSecurityPolicy  131 Source/bindings/v8/custom/V8WindowCustom.cpp         if (impl->document() && !impl->document()->contentSecurityPolicy()->allowEval()) {
contentSecurityPolicy   67 Source/bindings/v8/custom/V8WorkerGlobalScopeCustom.cpp         if (ContentSecurityPolicy* policy = workerGlobalScope->contentSecurityPolicy()) {
contentSecurityPolicy 2779 Source/core/dom/Document.cpp         if (contentSecurityPolicy()->isActive())
contentSecurityPolicy 2790 Source/core/dom/Document.cpp     if (m_baseElementURL != baseElementURL && contentSecurityPolicy()->allowBaseURI(baseElementURL)) {
contentSecurityPolicy 2955 Source/core/dom/Document.cpp             contentSecurityPolicy()->reportMetaOutsideHead(content);
contentSecurityPolicy 2964 Source/core/dom/Document.cpp         contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceMeta);
contentSecurityPolicy 2966 Source/core/dom/Document.cpp         contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceMeta);
contentSecurityPolicy 4583 Source/core/dom/Document.cpp         return document->import()->master()->contentSecurityPolicy();
contentSecurityPolicy 4663 Source/core/dom/Document.cpp         contentSecurityPolicy()->copyStateFrom(m_frame->tree().parent()->document()->contentSecurityPolicy());
contentSecurityPolicy 4664 Source/core/dom/Document.cpp     contentSecurityPolicy()->didReceiveHeaders(headers);
contentSecurityPolicy 4669 Source/core/dom/Document.cpp     if (!contentSecurityPolicy()->allowInlineEventHandlers(contextURL, contextLine))
contentSecurityPolicy  249 Source/core/dom/Document.h     using SecurityContext::contentSecurityPolicy;
contentSecurityPolicy 3218 Source/core/dom/Element.cpp     } else if (modificationReason == ModifiedByCloning || document().contentSecurityPolicy()->allowInlineStyle(document().url(), startLineNumber)) {
contentSecurityPolicy  243 Source/core/dom/ExecutionContext.cpp     return m_client->securityContext().contentSecurityPolicy();
contentSecurityPolicy   73 Source/core/dom/ExecutionContext.h     ContentSecurityPolicy* contentSecurityPolicy() const;
contentSecurityPolicy  265 Source/core/dom/ScriptLoader.cpp         bool isValidScriptNonce = elementDocument->contentSecurityPolicy()->allowScriptNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr));
contentSecurityPolicy  306 Source/core/dom/ScriptLoader.cpp     bool shouldBypassMainWorldContentSecurityPolicy = (frame && frame->script().shouldBypassMainWorldContentSecurityPolicy()) || elementDocument->contentSecurityPolicy()->allowScriptNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)) || elementDocument->contentSecurityPolicy()->allowScriptHash(sourceCode.source());
contentSecurityPolicy  308 Source/core/dom/ScriptLoader.cpp     if (!m_isExternalScript && (!shouldBypassMainWorldContentSecurityPolicy && !elementDocument->contentSecurityPolicy()->allowInlineScript(elementDocument->url(), m_startLineNumber)))
contentSecurityPolicy   50 Source/core/dom/SecurityContext.cpp void SecurityContext::setContentSecurityPolicy(PassRefPtr<ContentSecurityPolicy> contentSecurityPolicy)
contentSecurityPolicy   52 Source/core/dom/SecurityContext.cpp     m_contentSecurityPolicy = contentSecurityPolicy;
contentSecurityPolicy   43 Source/core/dom/SecurityContext.h     ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); }
contentSecurityPolicy  150 Source/core/dom/StyleElement.cpp     bool passesContentSecurityPolicyChecks = document.contentSecurityPolicy()->allowStyleHash(text) || document.contentSecurityPolicy()->allowStyleNonce(e->fastGetAttribute(HTMLNames::nonceAttr)) || document.contentSecurityPolicy()->allowInlineStyle(e->document().url(), m_startPosition.m_line);
contentSecurityPolicy  498 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowScriptFromSource(url))
contentSecurityPolicy  503 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowScriptFromSource(url))
contentSecurityPolicy  517 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowStyleFromSource(url))
contentSecurityPolicy  522 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowImageFromSource(url))
contentSecurityPolicy  526 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowFontFromSource(url))
contentSecurityPolicy  536 Source/core/fetch/ResourceFetcher.cpp         if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowMediaFromSource(url))
contentSecurityPolicy  154 Source/core/frame/csp/ContentSecurityPolicy.cpp     if (!headers.contentSecurityPolicy().isEmpty())
contentSecurityPolicy  155 Source/core/frame/csp/ContentSecurityPolicy.cpp         didReceiveHeader(headers.contentSecurityPolicy(), ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceHTTP);
contentSecurityPolicy  220 Source/core/html/HTMLAppletElement.cpp     if (!document().contentSecurityPolicy()->allowObjectFromSource(url)
contentSecurityPolicy  221 Source/core/html/HTMLAppletElement.cpp         || !document().contentSecurityPolicy()->allowPluginType(appletMimeType, appletMimeType, url)) {
contentSecurityPolicy  383 Source/core/html/HTMLFormElement.cpp         if (!document().contentSecurityPolicy()->allowFormAction(KURL(submission->action())))
contentSecurityPolicy  628 Source/core/html/HTMLLinkElement.cpp         if (!document().contentSecurityPolicy()->allowImageFromSource(builder.url()))
contentSecurityPolicy 1317 Source/core/html/HTMLMediaElement.cpp     if (!document().contentSecurityPolicy()->allowMediaFromSource(url)) {
contentSecurityPolicy  546 Source/core/html/HTMLPlugInElement.cpp     if (!document().contentSecurityPolicy()->allowObjectFromSource(url)
contentSecurityPolicy  547 Source/core/html/HTMLPlugInElement.cpp         || !document().contentSecurityPolicy()->allowPluginType(mimeType, declaredMimeType, url)) {
contentSecurityPolicy  205 Source/core/html/HTMLTrackElement.cpp     if (!document().contentSecurityPolicy()->allowMediaFromSource(url)) {
contentSecurityPolicy  299 Source/core/html/parser/XSSAuditor.cpp         ReflectedXSSDisposition cspHeader = document->contentSecurityPolicy()->reflectedXSSDisposition();
contentSecurityPolicy   84 Source/core/inspector/InspectorCSSAgent.h             : m_contentSecurityPolicy(context->contentSecurityPolicy())
contentSecurityPolicy  301 Source/core/loader/DocumentLoader.cpp     if (m_frame->ownerElement() && !m_frame->ownerElement()->document().contentSecurityPolicy()->allowChildFrameFromSource(request.url())) {
contentSecurityPolicy  346 Source/core/loader/DocumentLoader.cpp     if (isFormSubmission(m_triggeringAction.type()) && !m_frame->document()->contentSecurityPolicy()->allowFormAction(newRequest.url())) {
contentSecurityPolicy  445 Source/core/loader/DocumentThreadableLoader.cpp     return m_document->contentSecurityPolicy()->allowConnectToSource(url);
contentSecurityPolicy  355 Source/core/loader/FrameLoader.cpp     if (!m_frame->document()->contentSecurityPolicy()->allowAncestors(m_frame)) {
contentSecurityPolicy   94 Source/core/page/EventSource.cpp     if (!shouldBypassMainWorldContentSecurityPolicy && !context->contentSecurityPolicy()->allowConnectToSource(fullURL)) {
contentSecurityPolicy   66 Source/core/workers/AbstractWorker.cpp     if (executionContext()->contentSecurityPolicy() && !executionContext()->contentSecurityPolicy()->allowWorkerContextFromSource(scriptURL)) {
contentSecurityPolicy  104 Source/core/workers/WorkerGlobalScope.cpp     contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType, ContentSecurityPolicyHeaderSourceHTTP);
contentSecurityPolicy  213 Source/core/workers/WorkerGlobalScope.cpp     ASSERT(contentSecurityPolicy());
contentSecurityPolicy  128 Source/core/workers/WorkerGlobalScope.h         using SecurityContext::contentSecurityPolicy;
contentSecurityPolicy  134 Source/core/workers/WorkerGlobalScope.h         void applyContentSecurityPolicyFromString(const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType);
contentSecurityPolicy  114 Source/core/workers/WorkerMessagingProxy.cpp     OwnPtrWillBeRawPtr<WorkerThreadStartupData> startupData = WorkerThreadStartupData::create(scriptURL, userAgent, sourceCode, startMode, document->contentSecurityPolicy()->deprecatedHeader(), document->contentSecurityPolicy()->deprecatedHeaderType(), m_workerClients.release());
contentSecurityPolicy   38 Source/core/workers/WorkerThreadStartupData.cpp WorkerThreadStartupData::WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients)
contentSecurityPolicy   43 Source/core/workers/WorkerThreadStartupData.cpp     , m_contentSecurityPolicy(contentSecurityPolicy.isolatedCopy())
contentSecurityPolicy   50 Source/core/workers/WorkerThreadStartupData.h     static PassOwnPtrWillBeRawPtr<WorkerThreadStartupData> create(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients)
contentSecurityPolicy   52 Source/core/workers/WorkerThreadStartupData.h         return adoptPtrWillBeNoop(new WorkerThreadStartupData(scriptURL, userAgent, sourceCode, startMode, contentSecurityPolicy, contentSecurityPolicyType, workerClients));
contentSecurityPolicy   68 Source/core/workers/WorkerThreadStartupData.h     WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients>);
contentSecurityPolicy  546 Source/core/xml/XMLHttpRequest.cpp     if (!ContentSecurityPolicy::shouldBypassMainWorld(executionContext()) && !executionContext()->contentSecurityPolicy()->allowConnectToSource(url)) {
contentSecurityPolicy   90 Source/core/xml/XSLTProcessor.cpp             result->contentSecurityPolicy()->copyStateFrom(oldDocument->contentSecurityPolicy());
contentSecurityPolicy  325 Source/modules/websockets/WebSocket.cpp     if (!shouldBypassMainWorldContentSecurityPolicy && !executionContext()->contentSecurityPolicy()->allowConnectToSource(m_url)) {
contentSecurityPolicy   41 Source/platform/network/ContentSecurityPolicyResponseHeaders.h     const String& contentSecurityPolicy() const { return m_contentSecurityPolicy; }
contentSecurityPolicy  120 Source/web/SharedWorkerRepositoryClientImpl.cpp     OwnPtr<WebSharedWorkerConnector> webWorkerConnector = adoptPtr(m_client->createSharedWorkerConnector(url, name, getId(document), worker->executionContext()->contentSecurityPolicy()->deprecatedHeader(), static_cast<blink::WebContentSecurityPolicyType>(worker->executionContext()->contentSecurityPolicy()->deprecatedHeaderType())));
contentSecurityPolicy  317 Source/web/WebSharedWorkerImpl.cpp void WebSharedWorkerImpl::startWorkerContext(const WebURL& url, const WebString& name, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType policyType)
contentSecurityPolicy  321 Source/web/WebSharedWorkerImpl.cpp     m_contentSecurityPolicy = contentSecurityPolicy;
contentSecurityPolicy   96 Source/web/WebSharedWorkerImpl.h     virtual void startWorkerContext(const WebURL&, const WebString& name, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType) OVERRIDE;
contentSecurityPolicy   57 public/web/WebSharedWorker.h         const WebString& contentSecurityPolicy,
contentSecurityPolicy   48 public/web/WebSharedWorkerRepositoryClient.h     virtual WebSharedWorkerConnector* createSharedWorkerConnector(const WebURL& url, const WebString& name, DocumentID id, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType) { return 0; }