Index: chrome/browser/net/cookie_store_util.cc |
diff --git a/chrome/browser/net/cookie_store_util.cc b/chrome/browser/net/cookie_store_util.cc |
deleted file mode 100644 |
index d3882ef9ef5b99482a2b1e2f5b4f664ec476c71e..0000000000000000000000000000000000000000 |
--- a/chrome/browser/net/cookie_store_util.cc |
+++ /dev/null |
@@ -1,76 +0,0 @@ |
-// Copyright 2014 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/net/cookie_store_util.h" |
- |
-#include "base/lazy_instance.h" |
-#include "chrome/browser/browser_process.h" |
-#include "chrome/common/chrome_constants.h" |
-#include "chrome/common/chrome_switches.h" |
-#include "components/os_crypt/os_crypt.h" |
-#include "content/public/common/content_constants.h" |
-#include "extensions/common/constants.h" |
-#include "net/extras/sqlite/cookie_crypto_delegate.h" |
- |
-namespace chrome_browser_net { |
- |
-#if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_LINUX) |
-namespace { |
- |
-// Use the operating system's mechanisms to encrypt cookies before writing |
-// them to persistent store. Currently this only is done with desktop OS's |
-// because ChromeOS and Android already protect the entire profile contents. |
-class CookieOSCryptoDelegate : public net::CookieCryptoDelegate { |
- public: |
- bool ShouldEncrypt() override; |
- bool EncryptString(const std::string& plaintext, |
- std::string* ciphertext) override; |
- bool DecryptString(const std::string& ciphertext, |
- std::string* plaintext) override; |
-}; |
- |
-bool CookieOSCryptoDelegate::ShouldEncrypt() { |
-#if defined(OS_IOS) |
- // Cookie encryption is not necessary on iOS, due to OS-protected storage. |
- // However, due to https://codereview.chromium.org/135183021/, cookies were |
- // accidentally encrypted. In order to allow these cookies to still be used,a |
- // a CookieCryptoDelegate is provided that can decrypt existing cookies. |
- // However, new cookies will not be encrypted. The alternatives considered |
- // were not supplying a delegate at all (thus invalidating all existing |
- // encrypted cookies) or in migrating all cookies at once, which may impose |
- // startup costs. Eventually, all cookies will get migrated as they are |
- // rewritten. |
- return false; |
-#else |
- return true; |
-#endif |
-} |
- |
-bool CookieOSCryptoDelegate::EncryptString(const std::string& plaintext, |
- std::string* ciphertext) { |
- return OSCrypt::EncryptString(plaintext, ciphertext); |
-} |
- |
-bool CookieOSCryptoDelegate::DecryptString(const std::string& ciphertext, |
- std::string* plaintext) { |
- return OSCrypt::DecryptString(ciphertext, plaintext); |
-} |
- |
-// Using a LazyInstance is safe here because this class is stateless and |
-// requires 0 initialization. |
-base::LazyInstance<CookieOSCryptoDelegate> g_cookie_crypto_delegate = |
- LAZY_INSTANCE_INITIALIZER; |
- |
-} // namespace |
- |
-net::CookieCryptoDelegate* GetCookieCryptoDelegate() { |
- return g_cookie_crypto_delegate.Pointer(); |
-} |
-#else // defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_LINUX) |
-net::CookieCryptoDelegate* GetCookieCryptoDelegate() { |
- return NULL; |
-} |
-#endif // defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_LINUX) |
- |
-} // namespace chrome_browser_net |