Index: content/browser/ssl/ssl_policy_backend.cc |
diff --git a/content/browser/ssl/ssl_policy_backend.cc b/content/browser/ssl/ssl_policy_backend.cc |
deleted file mode 100644 |
index 34fa2e4b7c515896d5aa1e89032edf743e7a5c67..0000000000000000000000000000000000000000 |
--- a/content/browser/ssl/ssl_policy_backend.cc |
+++ /dev/null |
@@ -1,85 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "content/browser/ssl/ssl_policy_backend.h" |
- |
-#include "content/browser/frame_host/navigation_controller_impl.h" |
-#include "content/public/browser/browser_context.h" |
-#include "content/public/browser/ssl_host_state_delegate.h" |
- |
-namespace content { |
- |
-SSLPolicyBackend::SSLPolicyBackend(NavigationControllerImpl* controller) |
- : ssl_host_state_delegate_( |
- controller->GetBrowserContext()->GetSSLHostStateDelegate()), |
- controller_(controller) { |
- DCHECK(controller_); |
-} |
- |
-void SSLPolicyBackend::HostRanInsecureContent(const std::string& host, int id) { |
- if (ssl_host_state_delegate_) |
- ssl_host_state_delegate_->HostRanInsecureContent( |
- host, id, SSLHostStateDelegate::MIXED_CONTENT); |
- SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext()); |
-} |
- |
-bool SSLPolicyBackend::DidHostRunInsecureContent(const std::string& host, |
- int pid) const { |
- if (!ssl_host_state_delegate_) |
- return false; |
- |
- return ssl_host_state_delegate_->DidHostRunInsecureContent( |
- host, pid, SSLHostStateDelegate::MIXED_CONTENT); |
-} |
- |
-void SSLPolicyBackend::HostRanContentWithCertErrors(const std::string& host, |
- int id) { |
- if (ssl_host_state_delegate_) |
- ssl_host_state_delegate_->HostRanInsecureContent( |
- host, id, SSLHostStateDelegate::CERT_ERRORS_CONTENT); |
- SSLManager::NotifySSLInternalStateChanged(controller_->GetBrowserContext()); |
-} |
- |
-bool SSLPolicyBackend::DidHostRunContentWithCertErrors(const std::string& host, |
- int pid) const { |
- if (!ssl_host_state_delegate_) |
- return false; |
- |
- return ssl_host_state_delegate_->DidHostRunInsecureContent( |
- host, pid, SSLHostStateDelegate::CERT_ERRORS_CONTENT); |
-} |
- |
-void SSLPolicyBackend::RevokeUserAllowExceptions(const std::string& host) { |
- if (!ssl_host_state_delegate_) |
- return; |
- |
- ssl_host_state_delegate_->RevokeUserAllowExceptions(host); |
-} |
- |
-bool SSLPolicyBackend::HasAllowException(const std::string& host) { |
- if (!ssl_host_state_delegate_) |
- return false; |
- |
- return ssl_host_state_delegate_->HasAllowException(host); |
-} |
- |
-void SSLPolicyBackend::AllowCertForHost(const net::X509Certificate& cert, |
- const std::string& host, |
- net::CertStatus error) { |
- if (ssl_host_state_delegate_) |
- ssl_host_state_delegate_->AllowCert(host, cert, error); |
-} |
- |
-SSLHostStateDelegate::CertJudgment SSLPolicyBackend::QueryPolicy( |
- const net::X509Certificate& cert, |
- const std::string& host, |
- net::CertStatus error, |
- bool* expired_previous_decision) { |
- return ssl_host_state_delegate_ ? |
- ssl_host_state_delegate_->QueryPolicy( |
- host, cert, error, expired_previous_decision) : |
- SSLHostStateDelegate::DENIED; |
-} |
- |
-} // namespace content |