contentSecurityPolicy 521 Source/bindings/v8/ScriptController.cpp || !m_frame->document()->contentSecurityPolicy()->allowJavaScriptURLs(m_frame->document()->url(), eventHandlerPosition().m_line)) contentSecurityPolicy 152 Source/bindings/v8/V8Initializer.cpp if (ContentSecurityPolicy* policy = toDocument(executionContext)->contentSecurityPolicy()) contentSecurityPolicy 228 Source/bindings/v8/V8WindowShell.cpp ContentSecurityPolicy* csp = m_frame->document()->contentSecurityPolicy(); contentSecurityPolicy 131 Source/bindings/v8/custom/V8WindowCustom.cpp if (impl->document() && !impl->document()->contentSecurityPolicy()->allowEval()) { contentSecurityPolicy 67 Source/bindings/v8/custom/V8WorkerGlobalScopeCustom.cpp if (ContentSecurityPolicy* policy = workerGlobalScope->contentSecurityPolicy()) { contentSecurityPolicy 2779 Source/core/dom/Document.cpp if (contentSecurityPolicy()->isActive()) contentSecurityPolicy 2790 Source/core/dom/Document.cpp if (m_baseElementURL != baseElementURL && contentSecurityPolicy()->allowBaseURI(baseElementURL)) { contentSecurityPolicy 2955 Source/core/dom/Document.cpp contentSecurityPolicy()->reportMetaOutsideHead(content); contentSecurityPolicy 2964 Source/core/dom/Document.cpp contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceMeta); contentSecurityPolicy 2966 Source/core/dom/Document.cpp contentSecurityPolicy()->didReceiveHeader(content, ContentSecurityPolicyHeaderTypeReport, ContentSecurityPolicyHeaderSourceMeta); contentSecurityPolicy 4583 Source/core/dom/Document.cpp return document->import()->master()->contentSecurityPolicy(); contentSecurityPolicy 4663 Source/core/dom/Document.cpp contentSecurityPolicy()->copyStateFrom(m_frame->tree().parent()->document()->contentSecurityPolicy()); contentSecurityPolicy 4664 Source/core/dom/Document.cpp contentSecurityPolicy()->didReceiveHeaders(headers); contentSecurityPolicy 4669 Source/core/dom/Document.cpp if (!contentSecurityPolicy()->allowInlineEventHandlers(contextURL, contextLine)) contentSecurityPolicy 249 Source/core/dom/Document.h using SecurityContext::contentSecurityPolicy; contentSecurityPolicy 3218 Source/core/dom/Element.cpp } else if (modificationReason == ModifiedByCloning || document().contentSecurityPolicy()->allowInlineStyle(document().url(), startLineNumber)) { contentSecurityPolicy 243 Source/core/dom/ExecutionContext.cpp return m_client->securityContext().contentSecurityPolicy(); contentSecurityPolicy 73 Source/core/dom/ExecutionContext.h ContentSecurityPolicy* contentSecurityPolicy() const; contentSecurityPolicy 265 Source/core/dom/ScriptLoader.cpp bool isValidScriptNonce = elementDocument->contentSecurityPolicy()->allowScriptNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)); contentSecurityPolicy 306 Source/core/dom/ScriptLoader.cpp bool shouldBypassMainWorldContentSecurityPolicy = (frame && frame->script().shouldBypassMainWorldContentSecurityPolicy()) || elementDocument->contentSecurityPolicy()->allowScriptNonce(m_element->fastGetAttribute(HTMLNames::nonceAttr)) || elementDocument->contentSecurityPolicy()->allowScriptHash(sourceCode.source()); contentSecurityPolicy 308 Source/core/dom/ScriptLoader.cpp if (!m_isExternalScript && (!shouldBypassMainWorldContentSecurityPolicy && !elementDocument->contentSecurityPolicy()->allowInlineScript(elementDocument->url(), m_startLineNumber))) contentSecurityPolicy 50 Source/core/dom/SecurityContext.cpp void SecurityContext::setContentSecurityPolicy(PassRefPtr<ContentSecurityPolicy> contentSecurityPolicy) contentSecurityPolicy 52 Source/core/dom/SecurityContext.cpp m_contentSecurityPolicy = contentSecurityPolicy; contentSecurityPolicy 43 Source/core/dom/SecurityContext.h ContentSecurityPolicy* contentSecurityPolicy() { return m_contentSecurityPolicy.get(); } contentSecurityPolicy 150 Source/core/dom/StyleElement.cpp bool passesContentSecurityPolicyChecks = document.contentSecurityPolicy()->allowStyleHash(text) || document.contentSecurityPolicy()->allowStyleNonce(e->fastGetAttribute(HTMLNames::nonceAttr)) || document.contentSecurityPolicy()->allowInlineStyle(e->document().url(), m_startPosition.m_line); contentSecurityPolicy 498 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowScriptFromSource(url)) contentSecurityPolicy 503 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowScriptFromSource(url)) contentSecurityPolicy 517 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowStyleFromSource(url)) contentSecurityPolicy 522 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowImageFromSource(url)) contentSecurityPolicy 526 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowFontFromSource(url)) contentSecurityPolicy 536 Source/core/fetch/ResourceFetcher.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !m_document->contentSecurityPolicy()->allowMediaFromSource(url)) contentSecurityPolicy 154 Source/core/frame/csp/ContentSecurityPolicy.cpp if (!headers.contentSecurityPolicy().isEmpty()) contentSecurityPolicy 155 Source/core/frame/csp/ContentSecurityPolicy.cpp didReceiveHeader(headers.contentSecurityPolicy(), ContentSecurityPolicyHeaderTypeEnforce, ContentSecurityPolicyHeaderSourceHTTP); contentSecurityPolicy 220 Source/core/html/HTMLAppletElement.cpp if (!document().contentSecurityPolicy()->allowObjectFromSource(url) contentSecurityPolicy 221 Source/core/html/HTMLAppletElement.cpp || !document().contentSecurityPolicy()->allowPluginType(appletMimeType, appletMimeType, url)) { contentSecurityPolicy 383 Source/core/html/HTMLFormElement.cpp if (!document().contentSecurityPolicy()->allowFormAction(KURL(submission->action()))) contentSecurityPolicy 628 Source/core/html/HTMLLinkElement.cpp if (!document().contentSecurityPolicy()->allowImageFromSource(builder.url())) contentSecurityPolicy 1317 Source/core/html/HTMLMediaElement.cpp if (!document().contentSecurityPolicy()->allowMediaFromSource(url)) { contentSecurityPolicy 546 Source/core/html/HTMLPlugInElement.cpp if (!document().contentSecurityPolicy()->allowObjectFromSource(url) contentSecurityPolicy 547 Source/core/html/HTMLPlugInElement.cpp || !document().contentSecurityPolicy()->allowPluginType(mimeType, declaredMimeType, url)) { contentSecurityPolicy 205 Source/core/html/HTMLTrackElement.cpp if (!document().contentSecurityPolicy()->allowMediaFromSource(url)) { contentSecurityPolicy 299 Source/core/html/parser/XSSAuditor.cpp ReflectedXSSDisposition cspHeader = document->contentSecurityPolicy()->reflectedXSSDisposition(); contentSecurityPolicy 84 Source/core/inspector/InspectorCSSAgent.h : m_contentSecurityPolicy(context->contentSecurityPolicy()) contentSecurityPolicy 301 Source/core/loader/DocumentLoader.cpp if (m_frame->ownerElement() && !m_frame->ownerElement()->document().contentSecurityPolicy()->allowChildFrameFromSource(request.url())) { contentSecurityPolicy 346 Source/core/loader/DocumentLoader.cpp if (isFormSubmission(m_triggeringAction.type()) && !m_frame->document()->contentSecurityPolicy()->allowFormAction(newRequest.url())) { contentSecurityPolicy 445 Source/core/loader/DocumentThreadableLoader.cpp return m_document->contentSecurityPolicy()->allowConnectToSource(url); contentSecurityPolicy 355 Source/core/loader/FrameLoader.cpp if (!m_frame->document()->contentSecurityPolicy()->allowAncestors(m_frame)) { contentSecurityPolicy 94 Source/core/page/EventSource.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !context->contentSecurityPolicy()->allowConnectToSource(fullURL)) { contentSecurityPolicy 66 Source/core/workers/AbstractWorker.cpp if (executionContext()->contentSecurityPolicy() && !executionContext()->contentSecurityPolicy()->allowWorkerContextFromSource(scriptURL)) { contentSecurityPolicy 104 Source/core/workers/WorkerGlobalScope.cpp contentSecurityPolicy()->didReceiveHeader(policy, contentSecurityPolicyType, ContentSecurityPolicyHeaderSourceHTTP); contentSecurityPolicy 213 Source/core/workers/WorkerGlobalScope.cpp ASSERT(contentSecurityPolicy()); contentSecurityPolicy 128 Source/core/workers/WorkerGlobalScope.h using SecurityContext::contentSecurityPolicy; contentSecurityPolicy 134 Source/core/workers/WorkerGlobalScope.h void applyContentSecurityPolicyFromString(const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType); contentSecurityPolicy 114 Source/core/workers/WorkerMessagingProxy.cpp OwnPtrWillBeRawPtr<WorkerThreadStartupData> startupData = WorkerThreadStartupData::create(scriptURL, userAgent, sourceCode, startMode, document->contentSecurityPolicy()->deprecatedHeader(), document->contentSecurityPolicy()->deprecatedHeaderType(), m_workerClients.release()); contentSecurityPolicy 38 Source/core/workers/WorkerThreadStartupData.cpp WorkerThreadStartupData::WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients) contentSecurityPolicy 43 Source/core/workers/WorkerThreadStartupData.cpp , m_contentSecurityPolicy(contentSecurityPolicy.isolatedCopy()) contentSecurityPolicy 50 Source/core/workers/WorkerThreadStartupData.h static PassOwnPtrWillBeRawPtr<WorkerThreadStartupData> create(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode startMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients> workerClients) contentSecurityPolicy 52 Source/core/workers/WorkerThreadStartupData.h return adoptPtrWillBeNoop(new WorkerThreadStartupData(scriptURL, userAgent, sourceCode, startMode, contentSecurityPolicy, contentSecurityPolicyType, workerClients)); contentSecurityPolicy 68 Source/core/workers/WorkerThreadStartupData.h WorkerThreadStartupData(const KURL& scriptURL, const String& userAgent, const String& sourceCode, WorkerThreadStartMode, const String& contentSecurityPolicy, ContentSecurityPolicyHeaderType contentSecurityPolicyType, PassOwnPtr<WorkerClients>); contentSecurityPolicy 546 Source/core/xml/XMLHttpRequest.cpp if (!ContentSecurityPolicy::shouldBypassMainWorld(executionContext()) && !executionContext()->contentSecurityPolicy()->allowConnectToSource(url)) { contentSecurityPolicy 90 Source/core/xml/XSLTProcessor.cpp result->contentSecurityPolicy()->copyStateFrom(oldDocument->contentSecurityPolicy()); contentSecurityPolicy 325 Source/modules/websockets/WebSocket.cpp if (!shouldBypassMainWorldContentSecurityPolicy && !executionContext()->contentSecurityPolicy()->allowConnectToSource(m_url)) { contentSecurityPolicy 41 Source/platform/network/ContentSecurityPolicyResponseHeaders.h const String& contentSecurityPolicy() const { return m_contentSecurityPolicy; } contentSecurityPolicy 120 Source/web/SharedWorkerRepositoryClientImpl.cpp OwnPtr<WebSharedWorkerConnector> webWorkerConnector = adoptPtr(m_client->createSharedWorkerConnector(url, name, getId(document), worker->executionContext()->contentSecurityPolicy()->deprecatedHeader(), static_cast<blink::WebContentSecurityPolicyType>(worker->executionContext()->contentSecurityPolicy()->deprecatedHeaderType()))); contentSecurityPolicy 317 Source/web/WebSharedWorkerImpl.cpp void WebSharedWorkerImpl::startWorkerContext(const WebURL& url, const WebString& name, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType policyType) contentSecurityPolicy 321 Source/web/WebSharedWorkerImpl.cpp m_contentSecurityPolicy = contentSecurityPolicy; contentSecurityPolicy 96 Source/web/WebSharedWorkerImpl.h virtual void startWorkerContext(const WebURL&, const WebString& name, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType) OVERRIDE; contentSecurityPolicy 57 public/web/WebSharedWorker.h const WebString& contentSecurityPolicy, contentSecurityPolicy 48 public/web/WebSharedWorkerRepositoryClient.h virtual WebSharedWorkerConnector* createSharedWorkerConnector(const WebURL& url, const WebString& name, DocumentID id, const WebString& contentSecurityPolicy, WebContentSecurityPolicyType) { return 0; }