| Index: net/cert/nss_cert_database_chromeos.h
|
| diff --git a/net/cert/nss_cert_database_chromeos.h b/net/cert/nss_cert_database_chromeos.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..bd2880138541c9f090cef99aadcc174f646e6389
|
| --- /dev/null
|
| +++ b/net/cert/nss_cert_database_chromeos.h
|
| @@ -0,0 +1,75 @@
|
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef NET_CERT_NSS_CERT_DATABASE_CHROMEOS_
|
| +#define NET_CERT_NSS_CERT_DATABASE_CHROMEOS_
|
| +
|
| +#include "base/callback.h"
|
| +#include "crypto/scoped_nss_types.h"
|
| +#include "net/cert/nss_cert_database.h"
|
| +#include "net/cert/nss_profile_filter_chromeos.h"
|
| +
|
| +namespace net {
|
| +class CryptoModule;
|
| +typedef std::vector<scoped_refptr<CryptoModule> > CryptoModuleList;
|
| +class X509Certificate;
|
| +typedef std::vector<scoped_refptr<X509Certificate> > CertificateList;
|
| +
|
| +class NET_EXPORT NSSCertDatabaseChromeOS : public NSSCertDatabase {
|
| + public:
|
| + // Get a pointer to the NSSCertDatabase for the given user. Ownership is not
|
| + // transferred, but the caller may hold the pointer, which will remain valid
|
| + // for the lifetime of the process. If the database is already initialized it
|
| + // will be returned, otherwise if |callback| is non-null, the database will be
|
| + // passed to the callback when it is ready.
|
| + static NSSCertDatabase* GetForUser(
|
| + const std::string& username_hash,
|
| + const base::Callback<void(NSSCertDatabase*)>& callback);
|
| +
|
| + virtual ~NSSCertDatabaseChromeOS();
|
| +
|
| + // NSSCertDatabase implementation.
|
| + virtual void ListCerts(CertificateList* certs) OVERRIDE;
|
| + virtual crypto::ScopedPK11Slot GetPublicSlot() const OVERRIDE;
|
| + virtual crypto::ScopedPK11Slot GetPrivateSlot() const OVERRIDE;
|
| + virtual void ListModules(CryptoModuleList* modules, bool need_rw) const
|
| + OVERRIDE;
|
| + virtual TrustBits GetCertTrust(const X509Certificate* cert,
|
| + CertType type) const OVERRIDE;
|
| + virtual bool IsUntrusted(const X509Certificate* cert) const OVERRIDE;
|
| + //virtual bool SetCertTrust(const X509Certificate* cert,
|
| + // CertType type,
|
| + // TrustBits trust_bits) OVERRIDE;
|
| +
|
| + // TODO(mattm): handle trust setting, deletion, etc correctly when certs exist
|
| + // in multiple slots.
|
| + // TODO(mattm): handle trust setting correctly for certs in read-only slots.
|
| +
|
| + class Manager;
|
| + friend class Manager;
|
| + private:
|
| +
|
| + // This class should not be constructed directly. Use GetForUser.
|
| + explicit NSSCertDatabaseChromeOS(crypto::ScopedPK11Slot public_slot);
|
| + void SetPrivateSlot(crypto::ScopedPK11Slot private_slot);
|
| + void OnReady(const base::Callback<void(NSSCertDatabase*)>& callback);
|
| +
|
| + scoped_refptr<const X509Certificate> ResolveCert(const X509Certificate* cert,
|
| + bool need_rw) const;
|
| +
|
| + bool ready_;
|
| + crypto::ScopedPK11Slot public_slot_;
|
| + crypto::ScopedPK11Slot private_slot_;
|
| + NSSProfileFilterChromeOS profile_filter_;
|
| +
|
| + typedef std::vector<base::Callback<void(NSSCertDatabase*)> >
|
| + ReadyCallbackList;
|
| + ReadyCallbackList ready_callback_list_;
|
| +
|
| + DISALLOW_COPY_AND_ASSIGN(NSSCertDatabaseChromeOS);
|
| +};
|
| +
|
| +} // namespace net
|
| +
|
| +#endif // NET_CERT_NSS_CERT_DATABASE_CHROMEOS_
|
|
|