1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
// Copyright 2014 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_
#define CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_
#include "base/memory/ref_counted.h"
#include "base/memory/scoped_ptr.h"
#include "base/threading/non_thread_safe.h"
#include "content/common/content_export.h"
#include "net/cert/x509_certificate.h"
namespace content {
// The SSLHostStateDelegate encapulates the host-specific state for SSL errors.
// For example, SSLHostStateDelegate remembers whether the user has whitelisted
// a particular broken cert for use with particular host. We separate this
// state from the SSLManager because this state is shared across many navigation
// controllers.
//
// SSLHostStateDelegate may be implemented by the embedder to provide a storage
// strategy for certificate decisions or it may be left unimplemented to use a
// default strategy of not remembering decisions at all.
class SSLHostStateDelegate {
public:
// The judgements that can be reached by a user for invalid certificates.
enum CertJudgment {
DENIED,
ALLOWED
};
// Records that |cert| is permitted to be used for |host| in the future, for
// a specified |error| type.
virtual void AllowCert(const std::string&,
const net::X509Certificate& cert,
net::CertStatus error) = 0;
// Clear all allow preferences.
virtual void Clear() = 0;
// Queries whether |cert| is allowed for |host| and |error|. Returns true in
// |expired_previous_decision| if a previous user decision expired immediately
// prior to this query, otherwise false.
virtual CertJudgment QueryPolicy(const std::string& host,
const net::X509Certificate& cert,
net::CertStatus error,
bool* expired_previous_decision) = 0;
// Records that a host has run insecure content.
virtual void HostRanInsecureContent(const std::string& host, int pid) = 0;
// Returns whether the specified host ran insecure content.
virtual bool DidHostRunInsecureContent(const std::string& host,
int pid) const = 0;
// Revokes all SSL certificate error allow exceptions made by the user for
// |host|.
virtual void RevokeUserAllowExceptions(const std::string& host) = 0;
// Returns whether the user has allowed a certificate error exception for
// |host|. This does not mean that *all* certificate errors are allowed, just
// that there exists an exception. To see if a particular certificate and
// error combination exception is allowed, use QueryPolicy().
virtual bool HasAllowException(const std::string& host) const = 0;
protected:
virtual ~SSLHostStateDelegate() {}
};
} // namespace content
#endif // CONTENT_PUBLIC_BROWSER_SSL_HOST_STATE_DELEGATE_H_
|