Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1178)

Unified Diff: ios/web/net/crw_cert_verification_controller.h

Issue 1357773002: WKWebView: Implemented recoverable SSL interstitials. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@lock_coloring
Patch Set: Addressed Joel's review comments Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: ios/web/net/crw_cert_verification_controller.h
diff --git a/ios/web/net/crw_cert_verification_controller.h b/ios/web/net/crw_cert_verification_controller.h
index 28a7a503d42557c8238e484efd8aaef8a7e925f3..d75488366557e139334e0342ab2aa29d87b1c19d 100644
--- a/ios/web/net/crw_cert_verification_controller.h
+++ b/ios/web/net/crw_cert_verification_controller.h
@@ -22,17 +22,20 @@ class BrowserState;
// Accept policy for valid or invalid SSL cert.
typedef NS_ENUM(NSInteger, CertAcceptPolicy) {
- // Cert status can't be determined due to an error. Caller should not proceed
- // with the load, but show net error page instead.
+ // Cert status can't be determined due to an error. Caller should reject the
+ // load and show net error page.
CERT_ACCEPT_POLICY_NON_RECOVERABLE_ERROR = 0,
// Cert is not valid. Caller may present SSL warning and ask user if they
- // want to proceed with the load.
- CERT_ACCEPT_POLICY_RECOVERABLE_ERROR,
+ // want to proceed or reject the load.
+ CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_UNDECIDED_BY_USER,
+ // Cert is not valid. However caller should proceed with the load because
+ // user has decided to proceed with this invalid cert.
+ CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_ACCEPTED_BY_USER,
// Cert is valid. Caller should proceed with the load.
CERT_ACCEPT_POLICY_ALLOW,
};
-// Completion handler called by decidePolicyForCert:host:completionHandler:.
+// Completion handler called by decideLoadPolicyForTrust:host:completionHandler.
typedef void (^PolicyDecisionHandler)(web::CertAcceptPolicy, net::CertStatus);
// Completion handler called by querySSLStatusForTrust:host:completionHandler:.
typedef void (^StatusQueryHandler)(web::SecurityStyle, net::CertStatus);
@@ -51,28 +54,34 @@ typedef void (^StatusQueryHandler)(web::SecurityStyle, net::CertStatus);
- (instancetype)initWithBrowserState:(web::BrowserState*)browserState
NS_DESIGNATED_INITIALIZER;
-// TODO(eugenebut): add API for:
-// - accepting bad SSL cert using CertPolicyCache
-
-// Decides the policy for the given |cert| for the given |host| and calls
+// Decides the policy for the given |trust| and for the given |host| and calls
// |completionHandler| on completion. |host| should be in ASCII compatible form
// (e.g. for "http://名がドメイン.com", it should be "xn--v8jxj3d1dzdz08w.com").
// |completionHandler| cannot be null and will be called asynchronously on the
// UI thread.
Ryan Sleevi 2015/10/19 23:56:21 Include a forward reference to allowCert here //
Eugene But (OOO till 7-30) 2015/10/21 04:01:02 Done.
-- (void)decidePolicyForCert:(const scoped_refptr<net::X509Certificate>&)cert
- host:(NSString*)host
- completionHandler:(web::PolicyDecisionHandler)completionHandler;
+- (void)decideLoadPolicyForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
+ host:(NSString*)host
+ completionHandler:(web::PolicyDecisionHandler)completionHandler;
// Asynchronously provides web::SecurityStyle and net::CertStatus for the given
-// |serverTrust| and |host|. |host| should be in ASCII compatible form.
+// |trust| and |host|. |host| should be in ASCII compatible form.
// Note: The web::SecurityStyle determines whether the certificate is trusted.
// It is possible for an untrusted certificate to return a net::CertStatus with
// no errors if the cause could not be determined. Callers must handle this case
// gracefully.
-- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)serverTrust
+- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
host:(NSString*)host
completionHandler:(web::StatusQueryHandler)completionHandler;
+// Records that |cert| is permitted to be used for |host| in the future.
+// |host| should be in ASCII compatible form. Next time when
+// |decideLoadPolicyForTrust:| is called for the same server cert it will return
+// CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_ACCEPTED_BY_USER if cert error is
+// recoverable.
Ryan Sleevi 2015/10/19 23:56:21 This comment needs rewording // Records that |cer
Eugene But (OOO till 7-30) 2015/10/21 04:01:02 Done.
+- (void)allowCert:(scoped_refptr<net::X509Certificate>)cert
+ forHost:(NSString*)host
+ status:(net::CertStatus)status;
Ryan Sleevi 2015/10/19 23:56:21 Does this mean you can only ignore a single error?
Eugene But (OOO till 7-30) 2015/10/21 04:01:02 This will do whatever web::CertificatePolicyCache
+
// Cancels all pending verification requests. Completion handlers will not be
// called after |shutDown| call. Must always be called before object's
// deallocation.

Powered by Google App Engine
This is Rietveld 408576698