Index: android_webview/browser/aw_ssl_host_state_delegate.h |
diff --git a/android_webview/browser/aw_ssl_host_state_delegate.h b/android_webview/browser/aw_ssl_host_state_delegate.h |
index bc3e1a8f28dd50b58a5a368cdf7124526f8ee4bb..b5a34f4aa1ebddcdce059ce990aa80a6bcc94f57 100644 |
--- a/android_webview/browser/aw_ssl_host_state_delegate.h |
+++ b/android_webview/browser/aw_ssl_host_state_delegate.h |
@@ -30,6 +30,10 @@ class CertPolicy { |
// remember the user's choice. |
void Allow(const net::X509Certificate& cert, net::CertStatus error); |
+ // Returns true if and only if there exists a user allow exception for some |
+ // certificate. |
+ bool HasAllowException() const { return allowed_.size() > 0; } |
+ |
private: |
// The set of fingerprints of allowed certificates. |
std::map<net::SHA256HashValue, net::CertStatus, net::SHA256HashValueLessThan> |
@@ -65,6 +69,16 @@ class AwSSLHostStateDelegate : public content::SSLHostStateDelegate { |
bool DidHostRunInsecureContent(const std::string& host, |
int pid) const override; |
+ // Revokes all SSL certificate error allow exceptions made by the user for |
+ // |host|. |
+ void RevokeUserAllowExceptions(const std::string& host) override; |
+ |
+ // Returns whether the user has allowed a certificate error exception for |
+ // |host|. This does not mean that *all* certificate errors are allowed, just |
+ // that there exists an exception. To see if a particular certificate and |
+ // error combination exception is allowed, use QueryPolicy(). |
+ bool HasAllowException(const std::string& host) const override; |
+ |
private: |
// Certificate policies for each host. |
std::map<std::string, internal::CertPolicy> cert_policy_for_host_; |