| Index: chrome/browser/certificate_manager_model.cc
|
| ===================================================================
|
| --- chrome/browser/certificate_manager_model.cc (revision 75626)
|
| +++ chrome/browser/certificate_manager_model.cc (working copy)
|
| @@ -1,116 +0,0 @@
|
| -// Copyright (c) 2010 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/certificate_manager_model.h"
|
| -
|
| -#include "base/i18n/time_formatting.h"
|
| -#include "base/logging.h"
|
| -#include "base/utf_string_conversions.h"
|
| -#include "chrome/common/net/x509_certificate_model.h"
|
| -#include "net/base/net_errors.h"
|
| -#include "net/base/x509_certificate.h"
|
| -
|
| -CertificateManagerModel::CertificateManagerModel(Observer* observer)
|
| - : observer_(observer) {
|
| -}
|
| -
|
| -CertificateManagerModel::~CertificateManagerModel() {
|
| -}
|
| -
|
| -void CertificateManagerModel::Refresh() {
|
| - VLOG(1) << "refresh started";
|
| - cert_db_.ListCerts(&cert_list_);
|
| - observer_->CertificatesRefreshed();
|
| - VLOG(1) << "refresh finished";
|
| -}
|
| -
|
| -void CertificateManagerModel::FilterAndBuildOrgGroupingMap(
|
| - net::CertType filter_type,
|
| - CertificateManagerModel::OrgGroupingMap* map) const {
|
| - for (net::CertificateList::const_iterator i = cert_list_.begin();
|
| - i != cert_list_.end(); ++i) {
|
| - net::X509Certificate* cert = i->get();
|
| - net::CertType type =
|
| - x509_certificate_model::GetType(cert->os_cert_handle());
|
| - if (type != filter_type)
|
| - continue;
|
| -
|
| - std::string org;
|
| - if (!cert->subject().organization_names.empty())
|
| - org = cert->subject().organization_names[0];
|
| - if (org.empty())
|
| - org = cert->subject().GetDisplayName();
|
| -
|
| - (*map)[org].push_back(cert);
|
| - }
|
| -}
|
| -
|
| -string16 CertificateManagerModel::GetColumnText(
|
| - const net::X509Certificate& cert,
|
| - Column column) const {
|
| - string16 rv;
|
| - switch (column) {
|
| - case COL_SUBJECT_NAME:
|
| - rv = UTF8ToUTF16(
|
| - x509_certificate_model::GetCertNameOrNickname(cert.os_cert_handle()));
|
| - break;
|
| - case COL_CERTIFICATE_STORE:
|
| - rv = UTF8ToUTF16(
|
| - x509_certificate_model::GetTokenName(cert.os_cert_handle()));
|
| - break;
|
| - case COL_SERIAL_NUMBER:
|
| - rv = ASCIIToUTF16(
|
| - x509_certificate_model::GetSerialNumberHexified(
|
| - cert.os_cert_handle(), ""));
|
| - break;
|
| - case COL_EXPIRES_ON:
|
| - if (!cert.valid_expiry().is_null())
|
| - rv = base::TimeFormatShortDateNumeric(cert.valid_expiry());
|
| - break;
|
| - default:
|
| - NOTREACHED();
|
| - }
|
| - return rv;
|
| -}
|
| -
|
| -int CertificateManagerModel::ImportFromPKCS12(net::CryptoModule* module,
|
| - const std::string& data,
|
| - const string16& password) {
|
| - int result = cert_db_.ImportFromPKCS12(module, data, password);
|
| - if (result == net::OK)
|
| - Refresh();
|
| - return result;
|
| -}
|
| -
|
| -bool CertificateManagerModel::ImportCACerts(
|
| - const net::CertificateList& certificates,
|
| - unsigned int trust_bits,
|
| - net::CertDatabase::ImportCertFailureList* not_imported) {
|
| - bool result = cert_db_.ImportCACerts(certificates, trust_bits, not_imported);
|
| - if (result && not_imported->size() != certificates.size())
|
| - Refresh();
|
| - return result;
|
| -}
|
| -
|
| -bool CertificateManagerModel::ImportServerCert(
|
| - const net::CertificateList& certificates,
|
| - net::CertDatabase::ImportCertFailureList* not_imported) {
|
| - bool result = cert_db_.ImportServerCert(certificates, not_imported);
|
| - if (result && not_imported->size() != certificates.size())
|
| - Refresh();
|
| - return result;
|
| -}
|
| -
|
| -bool CertificateManagerModel::SetCertTrust(const net::X509Certificate* cert,
|
| - net::CertType type,
|
| - unsigned int trust_bits) {
|
| - return cert_db_.SetCertTrust(cert, type, trust_bits);
|
| -}
|
| -
|
| -bool CertificateManagerModel::Delete(net::X509Certificate* cert) {
|
| - bool result = cert_db_.DeleteCertAndKey(cert);
|
| - if (result)
|
| - Refresh();
|
| - return result;
|
| -}
|
|
|