这篇教程C++ CSPUTILSLOG函数代码示例写得很实用,希望能帮到您。
本文整理汇总了C++中CSPUTILSLOG函数的典型用法代码示例。如果您正苦于以下问题:C++ CSPUTILSLOG函数的具体用法?C++ CSPUTILSLOG怎么用?C++ CSPUTILSLOG使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。 在下文中一共展示了CSPUTILSLOG函数的8个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的C++代码示例。 示例1: CSPUTILSLOGboolnsCSPKeywordSrc::allows(enum CSPKeyword aKeyword, const nsAString& aHashOrNonce) const{ CSPUTILSLOG(("nsCSPKeywordSrc::allows, aKeyWord: %s, a HashOrNonce: %s", CSP_EnumToKeyword(aKeyword), NS_ConvertUTF16toUTF8(aHashOrNonce).get())); return mKeyword == aKeyword;}
开发者ID:CodeSpeaker,项目名称:gecko-dev,代码行数:7,
示例2: CSPUTILSLOG// ::permits is only called for external load requests, therefore:// nsCSPKeywordSrc and nsCSPHashSource fall back to this base class// implementation which will never allow the load.boolnsCSPBaseSrc::permits(nsIURI* aUri, const nsAString& aNonce, bool aWasRedirected) const{ if (CSPUTILSLOGENABLED()) { nsAutoCString spec; aUri->GetSpec(spec); CSPUTILSLOG(("nsCSPBaseSrc::permits, aUri: %s", spec.get())); } return false;}
开发者ID:mtjvankuik,项目名称:gecko-dev,代码行数:13,
示例3: CSPUTILSLOGboolnsCSPSchemeSrc::permits(nsIURI* aUri, const nsAString& aNonce, bool aWasRedirected, bool aReportOnly, bool aUpgradeInsecure) const{ if (CSPUTILSLOGENABLED()) { nsAutoCString spec; aUri->GetSpec(spec); CSPUTILSLOG(("nsCSPSchemeSrc::permits, aUri: %s", spec.get())); } MOZ_ASSERT((!mScheme.EqualsASCII("")), "scheme can not be the empty string"); return permitsScheme(mScheme, aUri, aReportOnly, aUpgradeInsecure);}
开发者ID:brendandahl,项目名称:positron,代码行数:12,
示例4: CSPUTILSLOGboolnsCSPPolicy::permits(CSPDirective aDir, nsIURI* aUri, const nsAString& aNonce, bool aWasRedirected, bool aSpecific, nsAString& outViolatedDirective) const{#ifdef PR_LOGGING { nsAutoCString spec; aUri->GetSpec(spec); CSPUTILSLOG(("nsCSPPolicy::permits, aUri: %s, aDir: %d, aSpecific: %s", spec.get(), aDir, aSpecific ? "true" : "false")); }#endif NS_ASSERTION(aUri, "permits needs an uri to perform the check!"); nsCSPDirective* defaultDir = nullptr; // Try to find a relevant directive // These directive arrays are short (1-5 elements), not worth using a hashtable. for (uint32_t i = 0; i < mDirectives.Length(); i++) { if (mDirectives[i]->equals(aDir)) { if (!mDirectives[i]->permits(aUri, aNonce, aWasRedirected)) { mDirectives[i]->toString(outViolatedDirective); return false; } return true; } if (mDirectives[i]->isDefaultDirective()) { defaultDir = mDirectives[i]; } } // If the above loop runs through, we haven't found a matching directive. // Avoid relooping, just store the result of default-src while looping. if (!aSpecific && defaultDir) { if (!defaultDir->permits(aUri, aNonce, aWasRedirected)) { defaultDir->toString(outViolatedDirective); return false; } return true; } // Nothing restricts this, so we're allowing the load // See bug 764937 return true;}
开发者ID:LordJZ,项目名称:gecko-dev,代码行数:50,
示例5: CSP_AppendCSPFromHeadernsresultCSP_AppendCSPFromHeader(nsIContentSecurityPolicy* aCsp, const nsAString& aHeaderValue, bool aReportOnly){ NS_ENSURE_ARG(aCsp); // Need to tokenize the header value since multiple headers could be // concatenated into one comma-separated list of policies. // See RFC2616 section 4.2 (last paragraph) nsresult rv = NS_OK; nsCharSeparatedTokenizer tokenizer(aHeaderValue, ','); while (tokenizer.hasMoreTokens()) { const nsSubstring& policy = tokenizer.nextToken(); rv = aCsp->AppendPolicy(policy, aReportOnly, false); NS_ENSURE_SUCCESS(rv, rv); { CSPUTILSLOG(("CSP refined with policy: /"%s/"", NS_ConvertUTF16toUTF8(policy).get())); } } return NS_OK;}
开发者ID:brendandahl,项目名称:positron,代码行数:23,
示例6: CSPUTILSLOGboolnsCSPHostSrc::permits(nsIURI* aUri, const nsAString& aNonce, bool aWasRedirected) const{#ifdef PR_LOGGING { nsAutoCString spec; aUri->GetSpec(spec); CSPUTILSLOG(("nsCSPHostSrc::permits, aUri: %s", spec.get())); }#endif // we are following the enforcement rules from the spec, see: // http://www.w3.org/TR/CSP11/#match-source-expression // 4.3) scheme matching: Check if the scheme matches. nsAutoCString scheme; nsresult rv = aUri->GetScheme(scheme); NS_ENSURE_SUCCESS(rv, false); if (!mScheme.IsEmpty() && !mScheme.EqualsASCII(scheme.get())) { // We should not return false for scheme-less sources where the protected resource // is http and the load is https, see: // http://www.w3.org/TR/CSP2/#match-source-expression bool isHttpsScheme = (NS_SUCCEEDED(aUri->SchemeIs("https", &isHttpsScheme)) && isHttpsScheme); if (!(isHttpsScheme && mAllowHttps)) { return false; } } // The host in nsCSpHostSrc should never be empty. In case we are enforcing // just a specific scheme, the parser should generate a nsCSPSchemeSource. NS_ASSERTION((!mHost.IsEmpty()), "host can not be the empty string"); // 2) host matching: Enforce a single * if (mHost.EqualsASCII("*")) { return true; } // Before we can check if the host matches, we have to // extract the host part from aUri. nsAutoCString uriHost; rv = aUri->GetHost(uriHost); NS_ENSURE_SUCCESS(rv, false); // 4.5) host matching: Check if the allowed host starts with a wilcard. if (mHost.First() == '*') { NS_ASSERTION(mHost[1] == '.', "Second character needs to be '.' whenever host starts with '*'"); // Eliminate leading "*", but keeping the FULL STOP (.) thereafter before checking // if the remaining characters match nsString wildCardHost = mHost; wildCardHost = Substring(wildCardHost, 1, wildCardHost.Length() - 1); if (!StringEndsWith(NS_ConvertUTF8toUTF16(uriHost), wildCardHost)) { return false; } } // 4.6) host matching: Check if hosts match. else if (!mHost.Equals(NS_ConvertUTF8toUTF16(uriHost))) { return false; } // 4.9) Path matching: If there is a path, we have to enforce // path-level matching, unless the channel got redirected, see: // http://www.w3.org/TR/CSP11/#source-list-paths-and-redirects if (!aWasRedirected && !mPath.IsEmpty()) { // cloning uri so we can ignore the ref nsCOMPtr<nsIURI> uri; aUri->CloneIgnoringRef(getter_AddRefs(uri)); nsAutoCString uriPath; rv = uri->GetPath(uriPath); NS_ENSURE_SUCCESS(rv, false); // check if the last character of mPath is '/'; if so // we just have to check loading resource is within // the allowed path. if (mPath.Last() == '/') { if (!StringBeginsWith(NS_ConvertUTF8toUTF16(uriPath), mPath)) { return false; } } // otherwise mPath whitelists a specific file, and we have to // check if the loading resource matches that whitelisted file. else { if (!mPath.Equals(NS_ConvertUTF8toUTF16(uriPath))) { return false; } } } // 4.8) Port matching: If port uses wildcard, allow the load. if (mPort.EqualsASCII("*")) { return true; } // Before we can check if the port matches, we have to // query the port from aUri. int32_t uriPort;//.........这里部分代码省略.........
开发者ID:arroway,项目名称:gecko-dev,代码行数:101,
示例7: mReportOnlynsCSPPolicy::nsCSPPolicy() : mReportOnly(false){ CSPUTILSLOG(("nsCSPPolicy::nsCSPPolicy"));}
开发者ID:CodeSpeaker,项目名称:gecko-dev,代码行数:5,
示例8: mUpgradeInsecDirnsCSPPolicy::nsCSPPolicy() : mUpgradeInsecDir(nullptr) , mReportOnly(false){ CSPUTILSLOG(("nsCSPPolicy::nsCSPPolicy"));}
开发者ID:brendandahl,项目名称:positron,代码行数:6,
注:本文中的CSPUTILSLOG函数示例整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。 C++ CSR_READ_4函数代码示例 C++ CSLTokenizeStringComplex函数代码示例 |