| Index: content/browser/ssl/ssl_policy_backend.cc
|
| diff --git a/content/browser/ssl/ssl_policy_backend.cc b/content/browser/ssl/ssl_policy_backend.cc
|
| deleted file mode 100644
|
| index 34fa2e4b7c515896d5aa1e89032edf743e7a5c67..0000000000000000000000000000000000000000
|
| --- a/content/browser/ssl/ssl_policy_backend.cc
|
| +++ /dev/null
|
| @@ -1,85 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "content/browser/ssl/ssl_policy_backend.h"
|
| -
|
| -#include "content/browser/frame_host/navigation_controller_impl.h"
|
| -#include "content/public/browser/browser_context.h"
|
| -#include "content/public/browser/ssl_host_state_delegate.h"
|
| -
|
| -namespace content {
|
| -
|
| -SSLPolicyBackend::SSLPolicyBackend(NavigationControllerImpl* controller)
|
| - : ssl_host_state_delegate_(
|
| - controller->GetBrowserContext()->GetSSLHostStateDelegate()),
|
| - controller_(controller) {
|
| - DCHECK(controller_);
|
| -}
|
| -
|
| -void SSLPolicyBackend::HostRanInsecureContent(const std::string& host, int id) {
|
| - if (ssl_host_state_delegate_)
|
| - ssl_host_state_delegate_->HostRanInsecureContent(
|
| - host, id, SSLHostStateDelegate::MIXED_CONTENT);
|
| - SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext());
|
| -}
|
| -
|
| -bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host,
|
| - int pid) const {
|
| - if (!ssl_host_state_delegate_)
|
| - return false;
|
| -
|
| - return ssl_host_state_delegate_->DidHostRunInsecureContent(
|
| - host, pid, SSLHostStateDelegate::MIXED_CONTENT);
|
| -}
|
| -
|
| -void SSLPolicyBackend::HostRanContentWithCertErrors(const std::string& host,
|
| - int id) {
|
| - if (ssl_host_state_delegate_)
|
| - ssl_host_state_delegate_->HostRanInsecureContent(
|
| - host, id, SSLHostStateDelegate::CERT_ERRORS_CONTENT);
|
| - SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext());
|
| -}
|
| -
|
| -bool SSLPolicyBackend::DidHostRunContentWithCertErrors(const std::string& host,
|
| - int pid) const {
|
| - if (!ssl_host_state_delegate_)
|
| - return false;
|
| -
|
| - return ssl_host_state_delegate_->DidHostRunInsecureContent(
|
| - host, pid, SSLHostStateDelegate::CERT_ERRORS_CONTENT);
|
| -}
|
| -
|
| -void SSLPolicyBackend::RevokeUserAllowExceptions(const std::string& host) {
|
| - if (!ssl_host_state_delegate_)
|
| - return;
|
| -
|
| - ssl_host_state_delegate_->RevokeUserAllowExceptions(host);
|
| -}
|
| -
|
| -bool SSLPolicyBackend::HasAllowException(const std::string& host) {
|
| - if (!ssl_host_state_delegate_)
|
| - return false;
|
| -
|
| - return ssl_host_state_delegate_->HasAllowException(host);
|
| -}
|
| -
|
| -void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert,
|
| - const std::string& host,
|
| - net::CertStatus error) {
|
| - if (ssl_host_state_delegate_)
|
| - ssl_host_state_delegate_->AllowCert(host, cert, error);
|
| -}
|
| -
|
| -SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy(
|
| - const net::X509Certificate& cert,
|
| - const std::string& host,
|
| - net::CertStatus error,
|
| - bool* expired_previous_decision) {
|
| - return ssl_host_state_delegate_ ?
|
| - ssl_host_state_delegate_->QueryPolicy(
|
| - host, cert, error, expired_previous_decision) :
|
| - SSLHostStateDelegate::DENIED;
|
| -}
|
| -
|
| -} // namespace content
|
|
|