Coverage Report

Created: 2018-09-25 14:53

/work/obj-fuzz/dist/include/nsIScriptSecurityManager.h
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * DO NOT EDIT.  THIS FILE IS GENERATED FROM /src/mozilla-central/caps/nsIScriptSecurityManager.idl
3
 */
4
5
#ifndef __gen_nsIScriptSecurityManager_h__
6
#define __gen_nsIScriptSecurityManager_h__
7
8
9
#ifndef __gen_nsISupports_h__
10
#include "nsISupports.h"
11
#endif
12
13
#ifndef __gen_nsIPrincipal_h__
14
#include "nsIPrincipal.h"
15
#endif
16
17
#include "js/Value.h"
18
19
#include "js/GCAnnotations.h"
20
21
/* For IDL files that don't want to include root IDL files. */
22
#ifndef NS_NO_VTABLE
23
#define NS_NO_VTABLE
24
#endif
25
class nsIURI; /* forward declaration */
26
27
class nsIChannel; /* forward declaration */
28
29
class nsIClassInfo; /* forward declaration */
30
31
class nsIDocShell; /* forward declaration */
32
33
class nsIDomainPolicy; /* forward declaration */
34
35
class nsILoadContext; /* forward declaration */
36
37
#include "jspubtd.h"
38
namespace mozilla {
39
namespace dom {
40
class DomainPolicyClone;
41
}
42
}
43
44
/* starting interface:    nsIScriptSecurityManager */
45
#define NS_ISCRIPTSECURITYMANAGER_IID_STR "51daad87-3a0c-44cc-b620-7356801c9022"
46
47
#define NS_ISCRIPTSECURITYMANAGER_IID \
48
  {0x51daad87, 0x3a0c, 0x44cc, \
49
    { 0xb6, 0x20, 0x73, 0x56, 0x80, 0x1c, 0x90, 0x22 }}
50
51
class nsIScriptSecurityManager : public nsISupports {
52
 public:
53
54
  NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISCRIPTSECURITYMANAGER_IID)
55
56
  /* [noscript] void canCreateWrapper (in JSContextPtr aJSContext, in nsIIDRef aIID, in nsISupports aObj, in nsIClassInfo aClassInfo); */
57
  NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) = 0;
58
59
  /* [noscript] void canCreateInstance (in JSContextPtr aJSContext, in nsCIDRef aCID); */
60
  NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) = 0;
61
62
  /* [noscript] void canGetService (in JSContextPtr aJSContext, in nsCIDRef aCID); */
63
  NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) = 0;
64
65
  /* [noscript] void checkLoadURIFromScript (in JSContextPtr cx, in nsIURI uri); */
66
  NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) = 0;
67
68
  enum {
69
    STANDARD = 0U,
70
    LOAD_IS_AUTOMATIC_DOCUMENT_REPLACEMENT = 1U,
71
    ALLOW_CHROME = 2U,
72
    DISALLOW_INHERIT_PRINCIPAL = 4U,
73
    DISALLOW_SCRIPT_OR_DATA = 4U,
74
    DISALLOW_SCRIPT = 8U,
75
    DONT_REPORT_ERRORS = 16U
76
  };
77
78
  /* void checkLoadURIWithPrincipal (in nsIPrincipal aPrincipal, in nsIURI uri, in unsigned long flags); */
79
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) = 0;
80
81
  /* void checkLoadURIStrWithPrincipal (in nsIPrincipal aPrincipal, in AUTF8String uri, in unsigned long flags); */
82
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) = 0;
83
84
  /* bool inFileURIWhitelist (in nsIURI aUri); */
85
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) = 0;
86
87
  /* nsIPrincipal getSystemPrincipal (); */
88
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) = 0;
89
90
  /* nsIPrincipal getLoadContextCodebasePrincipal (in nsIURI uri, in nsILoadContext loadContext); */
91
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) = 0;
92
93
  /* nsIPrincipal getDocShellCodebasePrincipal (in nsIURI uri, in nsIDocShell docShell); */
94
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) = 0;
95
96
  /* [implicit_jscontext] nsIPrincipal createCodebasePrincipal (in nsIURI uri, in jsval originAttributes); */
97
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) = 0;
98
99
  /* nsIPrincipal createCodebasePrincipalFromOrigin (in ACString origin); */
100
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) = 0;
101
102
  /* [implicit_jscontext] nsIPrincipal createNullPrincipal (in jsval originAttributes); */
103
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) = 0;
104
105
  /* void checkSameOriginURI (in nsIURI aSourceURI, in nsIURI aTargetURI, in boolean reportError, in boolean fromPrivateWindow); */
106
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) = 0;
107
108
  /* nsIPrincipal getChannelResultPrincipal (in nsIChannel aChannel); */
109
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) = 0;
110
111
  /* [noscript,nostdcall] nsIPrincipal getChannelResultPrincipalIfNotSandboxed (in nsIChannel aChannel); */
112
  virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) = 0;
113
114
  /* nsIPrincipal getChannelURIPrincipal (in nsIChannel aChannel); */
115
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) = 0;
116
117
  /* boolean isSystemPrincipal (in nsIPrincipal aPrincipal); */
118
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) = 0;
119
120
9
     bool IsSystemPrincipal(nsIPrincipal* aPrincipal) {
121
9
      bool isSystem = false;
122
9
      IsSystemPrincipal(aPrincipal, &isSystem);
123
9
      return isSystem;
124
9
    }
125
  enum {
126
    NO_APP_ID = 0U,
127
    UNKNOWN_APP_ID = 4294967295U,
128
    DEFAULT_USER_CONTEXT_ID = 0U
129
  };
130
131
  /* nsIDomainPolicy activateDomainPolicy (); */
132
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) = 0;
133
134
  /* readonly attribute boolean domainPolicyActive; */
135
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) = 0;
136
137
  /* [noscript] nsIDomainPolicy activateDomainPolicyInternal (); */
138
  NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) = 0;
139
140
  /* [noscript,notxpcom] void cloneDomainPolicy (in DomainPolicyClonePtr aClone); */
141
  NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) = 0;
142
143
  /* bool policyAllowsScript (in nsIURI aDomain); */
144
  JS_HAZ_CAN_RUN_SCRIPT NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) = 0;
145
146
};
147
148
  NS_DEFINE_STATIC_IID_ACCESSOR(nsIScriptSecurityManager, NS_ISCRIPTSECURITYMANAGER_IID)
149
150
/* Use this macro when declaring classes that implement this interface. */
151
#define NS_DECL_NSISCRIPTSECURITYMANAGER \
152
  NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override; \
153
  NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override; \
154
  NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override; \
155
  NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override; \
156
  NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override; \
157
  NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override; \
158
  NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override; \
159
  NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override; \
160
  NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override; \
161
  NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override; \
162
  NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override; \
163
  NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override; \
164
  NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override; \
165
  NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override; \
166
  NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override; \
167
  virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override; \
168
  NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override; \
169
  NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override; \
170
  NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override; \
171
  NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override; \
172
  NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override; \
173
  NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override; \
174
  NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override; 
175
176
/* Use this macro when declaring the members of this interface when the
177
   class doesn't implement the interface. This is useful for forwarding. */
178
#define NS_DECL_NON_VIRTUAL_NSISCRIPTSECURITYMANAGER \
179
  nsresult CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo); \
180
  nsresult CanCreateInstance(JSContext * aJSContext, const nsCID & aCID); \
181
  nsresult CanGetService(JSContext * aJSContext, const nsCID & aCID); \
182
  nsresult CheckLoadURIFromScript(JSContext * cx, nsIURI *uri); \
183
  nsresult CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags); \
184
  nsresult CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags); \
185
  nsresult InFileURIWhitelist(nsIURI *aUri, bool *_retval); \
186
  nsresult GetSystemPrincipal(nsIPrincipal **_retval); \
187
  nsresult GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval); \
188
  nsresult GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval); \
189
  nsresult CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval); \
190
  nsresult CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval); \
191
  nsresult CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval); \
192
  nsresult CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow); \
193
  nsresult GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval); \
194
  nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval); \
195
  nsresult GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval); \
196
  nsresult IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval); \
197
  nsresult ActivateDomainPolicy(nsIDomainPolicy **_retval); \
198
  nsresult GetDomainPolicyActive(bool *aDomainPolicyActive); \
199
  nsresult ActivateDomainPolicyInternal(nsIDomainPolicy **_retval); \
200
  nsresult_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone); \
201
  nsresult PolicyAllowsScript(nsIURI *aDomain, bool *_retval); 
202
203
/* Use this macro to declare functions that forward the behavior of this interface to another object. */
204
#define NS_FORWARD_NSISCRIPTSECURITYMANAGER(_to) \
205
  NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return _to CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
206
  NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override { return _to CanCreateInstance(aJSContext, aCID); } \
207
  NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override { return _to CanGetService(aJSContext, aCID); } \
208
  NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override { return _to CheckLoadURIFromScript(cx, uri); } \
209
  NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return _to CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
210
  NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override { return _to CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
211
  NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override { return _to InFileURIWhitelist(aUri, _retval); } \
212
  NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override { return _to GetSystemPrincipal(_retval); } \
213
  NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override { return _to GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
214
  NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override { return _to GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
215
  NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return _to CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
216
  NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override { return _to CreateCodebasePrincipalFromOrigin(origin, _retval); } \
217
  NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return _to CreateNullPrincipal(originAttributes, cx, _retval); } \
218
  NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override { return _to CheckSameOriginURI(aSourceURI, aTargetURI, reportError, fromPrivateWindow); } \
219
  NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelResultPrincipal(aChannel, _retval); } \
220
  virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
221
  NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return _to GetChannelURIPrincipal(aChannel, _retval); } \
222
  NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return _to IsSystemPrincipal(aPrincipal, _retval); } \
223
  NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override { return _to ActivateDomainPolicy(_retval); } \
224
  NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return _to GetDomainPolicyActive(aDomainPolicyActive); } \
225
  NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override { return _to ActivateDomainPolicyInternal(_retval); } \
226
  NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override { return _to CloneDomainPolicy(aClone); } \
227
  NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return _to PolicyAllowsScript(aDomain, _retval); } 
228
229
/* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */
230
#define NS_FORWARD_SAFE_NSISCRIPTSECURITYMANAGER(_to) \
231
  NS_IMETHOD CanCreateWrapper(JSContext * aJSContext, const nsIID & aIID, nsISupports *aObj, nsIClassInfo *aClassInfo) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateWrapper(aJSContext, aIID, aObj, aClassInfo); } \
232
  NS_IMETHOD CanCreateInstance(JSContext * aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanCreateInstance(aJSContext, aCID); } \
233
  NS_IMETHOD CanGetService(JSContext * aJSContext, const nsCID & aCID) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CanGetService(aJSContext, aCID); } \
234
  NS_IMETHOD CheckLoadURIFromScript(JSContext * cx, nsIURI *uri) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIFromScript(cx, uri); } \
235
  NS_IMETHOD CheckLoadURIWithPrincipal(nsIPrincipal *aPrincipal, nsIURI *uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIWithPrincipal(aPrincipal, uri, flags); } \
236
  NS_IMETHOD CheckLoadURIStrWithPrincipal(nsIPrincipal *aPrincipal, const nsACString& uri, uint32_t flags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckLoadURIStrWithPrincipal(aPrincipal, uri, flags); } \
237
  NS_IMETHOD InFileURIWhitelist(nsIURI *aUri, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->InFileURIWhitelist(aUri, _retval); } \
238
  NS_IMETHOD GetSystemPrincipal(nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetSystemPrincipal(_retval); } \
239
  NS_IMETHOD GetLoadContextCodebasePrincipal(nsIURI *uri, nsILoadContext *loadContext, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetLoadContextCodebasePrincipal(uri, loadContext, _retval); } \
240
  NS_IMETHOD GetDocShellCodebasePrincipal(nsIURI *uri, nsIDocShell *docShell, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDocShellCodebasePrincipal(uri, docShell, _retval); } \
241
  NS_IMETHOD CreateCodebasePrincipal(nsIURI *uri, JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipal(uri, originAttributes, cx, _retval); } \
242
  NS_IMETHOD CreateCodebasePrincipalFromOrigin(const nsACString& origin, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateCodebasePrincipalFromOrigin(origin, _retval); } \
243
  NS_IMETHOD CreateNullPrincipal(JS::HandleValue originAttributes, JSContext* cx, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CreateNullPrincipal(originAttributes, cx, _retval); } \
244
  NS_IMETHOD CheckSameOriginURI(nsIURI *aSourceURI, nsIURI *aTargetURI, bool reportError, bool fromPrivateWindow) override { return !_to ? NS_ERROR_NULL_POINTER : _to->CheckSameOriginURI(aSourceURI, aTargetURI, reportError, fromPrivateWindow); } \
245
  NS_IMETHOD GetChannelResultPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipal(aChannel, _retval); } \
246
  virtual nsresult GetChannelResultPrincipalIfNotSandboxed(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelResultPrincipalIfNotSandboxed(aChannel, _retval); } \
247
  NS_IMETHOD GetChannelURIPrincipal(nsIChannel *aChannel, nsIPrincipal **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetChannelURIPrincipal(aChannel, _retval); } \
248
  NS_IMETHOD IsSystemPrincipal(nsIPrincipal *aPrincipal, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSystemPrincipal(aPrincipal, _retval); } \
249
  NS_IMETHOD ActivateDomainPolicy(nsIDomainPolicy **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicy(_retval); } \
250
  NS_IMETHOD GetDomainPolicyActive(bool *aDomainPolicyActive) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetDomainPolicyActive(aDomainPolicyActive); } \
251
  NS_IMETHOD ActivateDomainPolicyInternal(nsIDomainPolicy **_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ActivateDomainPolicyInternal(_retval); } \
252
  NS_IMETHOD_(void) CloneDomainPolicy(mozilla::dom::DomainPolicyClone * aClone) override; \
253
  NS_IMETHOD PolicyAllowsScript(nsIURI *aDomain, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->PolicyAllowsScript(aDomain, _retval); } 
254
255
0
#define NS_SCRIPTSECURITYMANAGER_CONTRACTID "@mozilla.org/scriptsecuritymanager;1"
256
257
#endif /* __gen_nsIScriptSecurityManager_h__ */