Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(324)

Side by Side Diff: content/browser/ssl/ssl_policy_backend.cc

Issue 1058003004: Forget SSL error exceptions when good certs seen for regular requests. (Closed) Base URL: https://chromium.googlesource.com/chromium/src@master
Patch Set: Rebase on ToT Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/browser/ssl/ssl_policy_backend.h" 5 #include "content/browser/ssl/ssl_policy_backend.h"
6 6
7 #include "content/browser/frame_host/navigation_controller_impl.h" 7 #include "content/browser/frame_host/navigation_controller_impl.h"
8 #include "content/public/browser/browser_context.h" 8 #include "content/public/browser/browser_context.h"
9 #include "content/public/browser/ssl_host_state_delegate.h" 9 #include "content/public/browser/ssl_host_state_delegate.h"
10 10
(...skipping 13 matching lines...) Expand all
24 } 24 }
25 25
26 bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host, 26 bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host,
27 int pid) const { 27 int pid) const {
28 if (!ssl_host_state_delegate_) 28 if (!ssl_host_state_delegate_)
29 return false; 29 return false;
30 30
31 return ssl_host_state_delegate_->DidHostRunInsecureContent(host, pid); 31 return ssl_host_state_delegate_->DidHostRunInsecureContent(host, pid);
32 } 32 }
33 33
34 void SSLPolicyBackend::RevokeUserAllowExceptions(const std::string& host) {
35 if (!ssl_host_state_delegate_)
36 return;
37
38 ssl_host_state_delegate_->RevokeUserAllowExceptions(host);
39 }
40
41 bool SSLPolicyBackend::HasAllowException(const std::string& host) {
davidben 2015/04/21 18:09:00 Should this account for a NULL delegate? The other
jww 2015/04/21 18:18:15 Yikes! Yup.
42 return ssl_host_state_delegate_->HasAllowException(host);
43 }
44
34 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, 45 void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert,
35 const std::string& host, 46 const std::string& host,
36 net::CertStatus error) { 47 net::CertStatus error) {
37 if (ssl_host_state_delegate_) 48 if (ssl_host_state_delegate_)
38 ssl_host_state_delegate_->AllowCert(host, cert, error); 49 ssl_host_state_delegate_->AllowCert(host, cert, error);
39 } 50 }
40 51
41 SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy( 52 SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy(
42 const net::X509Certificate& cert, 53 const net::X509Certificate& cert,
43 const std::string& host, 54 const std::string& host,
44 net::CertStatus error, 55 net::CertStatus error,
45 bool* expired_previous_decision) { 56 bool* expired_previous_decision) {
46 return ssl_host_state_delegate_ ? 57 return ssl_host_state_delegate_ ?
47 ssl_host_state_delegate_->QueryPolicy( 58 ssl_host_state_delegate_->QueryPolicy(
48 host, cert, error, expired_previous_decision) : 59 host, cert, error, expired_previous_decision) :
49 SSLHostStateDelegate::DENIED; 60 SSLHostStateDelegate::DENIED;
50 } 61 }
51 62
52 } // namespace content 63 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698