Index: ios/web/net/crw_cert_verification_controller.h |
diff --git a/ios/web/net/crw_cert_verification_controller.h b/ios/web/net/crw_cert_verification_controller.h |
index 28a7a503d42557c8238e484efd8aaef8a7e925f3..d75488366557e139334e0342ab2aa29d87b1c19d 100644 |
--- a/ios/web/net/crw_cert_verification_controller.h |
+++ b/ios/web/net/crw_cert_verification_controller.h |
@@ -22,17 +22,20 @@ class BrowserState; |
// Accept policy for valid or invalid SSL cert. |
typedef NS_ENUM(NSInteger, CertAcceptPolicy) { |
- // Cert status can't be determined due to an error. Caller should not proceed |
- // with the load, but show net error page instead. |
+ // Cert status can't be determined due to an error. Caller should reject the |
+ // load and show net error page. |
CERT_ACCEPT_POLICY_NON_RECOVERABLE_ERROR = 0, |
// Cert is not valid. Caller may present SSL warning and ask user if they |
- // want to proceed with the load. |
- CERT_ACCEPT_POLICY_RECOVERABLE_ERROR, |
+ // want to proceed or reject the load. |
+ CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_UNDECIDED_BY_USER, |
+ // Cert is not valid. However caller should proceed with the load because |
+ // user has decided to proceed with this invalid cert. |
+ CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_ACCEPTED_BY_USER, |
// Cert is valid. Caller should proceed with the load. |
CERT_ACCEPT_POLICY_ALLOW, |
}; |
-// Completion handler called by decidePolicyForCert:host:completionHandler:. |
+// Completion handler called by decideLoadPolicyForTrust:host:completionHandler. |
typedef void (^PolicyDecisionHandler)(web::CertAcceptPolicy, net::CertStatus); |
// Completion handler called by querySSLStatusForTrust:host:completionHandler:. |
typedef void (^StatusQueryHandler)(web::SecurityStyle, net::CertStatus); |
@@ -51,28 +54,34 @@ typedef void (^StatusQueryHandler)(web::SecurityStyle, net::CertStatus); |
- (instancetype)initWithBrowserState:(web::BrowserState*)browserState |
NS_DESIGNATED_INITIALIZER; |
-// TODO(eugenebut): add API for: |
-// - accepting bad SSL cert using CertPolicyCache |
- |
-// Decides the policy for the given |cert| for the given |host| and calls |
+// Decides the policy for the given |trust| and for the given |host| and calls |
// |completionHandler| on completion. |host| should be in ASCII compatible form |
// (e.g. for "http://名がドメイン.com", it should be "xn--v8jxj3d1dzdz08w.com"). |
// |completionHandler| cannot be null and will be called asynchronously on the |
// UI thread. |
Ryan Sleevi
2015/10/19 23:56:21
Include a forward reference to allowCert here
//
Eugene But (OOO till 7-30)
2015/10/21 04:01:02
Done.
|
-- (void)decidePolicyForCert:(const scoped_refptr<net::X509Certificate>&)cert |
- host:(NSString*)host |
- completionHandler:(web::PolicyDecisionHandler)completionHandler; |
+- (void)decideLoadPolicyForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust |
+ host:(NSString*)host |
+ completionHandler:(web::PolicyDecisionHandler)completionHandler; |
// Asynchronously provides web::SecurityStyle and net::CertStatus for the given |
-// |serverTrust| and |host|. |host| should be in ASCII compatible form. |
+// |trust| and |host|. |host| should be in ASCII compatible form. |
// Note: The web::SecurityStyle determines whether the certificate is trusted. |
// It is possible for an untrusted certificate to return a net::CertStatus with |
// no errors if the cause could not be determined. Callers must handle this case |
// gracefully. |
-- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)serverTrust |
+- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust |
host:(NSString*)host |
completionHandler:(web::StatusQueryHandler)completionHandler; |
+// Records that |cert| is permitted to be used for |host| in the future. |
+// |host| should be in ASCII compatible form. Next time when |
+// |decideLoadPolicyForTrust:| is called for the same server cert it will return |
+// CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_ACCEPTED_BY_USER if cert error is |
+// recoverable. |
Ryan Sleevi
2015/10/19 23:56:21
This comment needs rewording
// Records that |cer
Eugene But (OOO till 7-30)
2015/10/21 04:01:02
Done.
|
+- (void)allowCert:(scoped_refptr<net::X509Certificate>)cert |
+ forHost:(NSString*)host |
+ status:(net::CertStatus)status; |
Ryan Sleevi
2015/10/19 23:56:21
Does this mean you can only ignore a single error?
Eugene But (OOO till 7-30)
2015/10/21 04:01:02
This will do whatever web::CertificatePolicyCache
|
+ |
// Cancels all pending verification requests. Completion handlers will not be |
// called after |shutDown| call. Must always be called before object's |
// deallocation. |