OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/ssl/ssl_policy_backend.h" | 5 #include "content/browser/ssl/ssl_policy_backend.h" |
6 | 6 |
7 #include "content/browser/frame_host/navigation_controller_impl.h" | 7 #include "content/browser/frame_host/navigation_controller_impl.h" |
8 #include "content/public/browser/browser_context.h" | 8 #include "content/public/browser/browser_context.h" |
9 #include "content/public/browser/ssl_host_state_delegate.h" | 9 #include "content/public/browser/ssl_host_state_delegate.h" |
10 | 10 |
(...skipping 13 matching lines...) Expand all Loading... | |
24 } | 24 } |
25 | 25 |
26 bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host, | 26 bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host, |
27 int pid) const { | 27 int pid) const { |
28 if (!ssl_host_state_delegate_) | 28 if (!ssl_host_state_delegate_) |
29 return false; | 29 return false; |
30 | 30 |
31 return ssl_host_state_delegate_->DidHostRunInsecureContent(host, pid); | 31 return ssl_host_state_delegate_->DidHostRunInsecureContent(host, pid); |
32 } | 32 } |
33 | 33 |
34 void SSLPolicyBackend::RevokeUserAllowExceptions(const std::string& host) { | |
35 if (!ssl_host_state_delegate_) | |
36 return; | |
37 | |
38 ssl_host_state_delegate_->RevokeUserAllowExceptions(host); | |
39 } | |
40 | |
41 bool SSLPolicyBackend::HasAllowException(const std::string& host) { | |
davidben
2015/04/21 18:09:00
Should this account for a NULL delegate? The other
jww
2015/04/21 18:18:15
Yikes! Yup.
| |
42 return ssl_host_state_delegate_->HasAllowException(host); | |
43 } | |
44 | |
34 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, | 45 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, |
35 const std::string& host, | 46 const std::string& host, |
36 net::CertStatus error) { | 47 net::CertStatus error) { |
37 if (ssl_host_state_delegate_) | 48 if (ssl_host_state_delegate_) |
38 ssl_host_state_delegate_->AllowCert(host, cert, error); | 49 ssl_host_state_delegate_->AllowCert(host, cert, error); |
39 } | 50 } |
40 | 51 |
41 SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy( | 52 SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy( |
42 const net::X509Certificate& cert, | 53 const net::X509Certificate& cert, |
43 const std::string& host, | 54 const std::string& host, |
44 net::CertStatus error, | 55 net::CertStatus error, |
45 bool* expired_previous_decision) { | 56 bool* expired_previous_decision) { |
46 return ssl_host_state_delegate_ ? | 57 return ssl_host_state_delegate_ ? |
47 ssl_host_state_delegate_->QueryPolicy( | 58 ssl_host_state_delegate_->QueryPolicy( |
48 host, cert, error, expired_previous_decision) : | 59 host, cert, error, expired_previous_decision) : |
49 SSLHostStateDelegate::DENIED; | 60 SSLHostStateDelegate::DENIED; |
50 } | 61 } |
51 | 62 |
52 } // namespace content | 63 } // namespace content |
OLD | NEW |