| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ | 5 #ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |
| 6 #define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ | 6 #define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |
| 7 | 7 |
| 8 #include <map> | 8 #include <map> |
| 9 #include <set> | 9 #include <set> |
| 10 #include <string> | 10 #include <string> |
| 11 | 11 |
| 12 #include "base/basictypes.h" | 12 #include "base/basictypes.h" |
| 13 #include "base/compiler_specific.h" | 13 #include "base/compiler_specific.h" |
| 14 #include "base/supports_user_data.h" | 14 #include "base/supports_user_data.h" |
| 15 #include "base/threading/non_thread_safe.h" | 15 #include "base/threading/non_thread_safe.h" |
| 16 #include "content/common/content_export.h" | 16 #include "content/common/content_export.h" |
| 17 #include "net/cert/cert_status_flags.h" | 17 #include "net/cert/cert_status_flags.h" |
| 18 #include "net/cert/x509_certificate.h" | 18 #include "net/cert/x509_certificate.h" |
| 19 | 19 |
| 20 namespace content { | 20 namespace content { |
| 21 class BrowserContext; | 21 class BrowserContext; |
| 22 class SSLHostStateDelegate; |
| 22 | 23 |
| 23 // SSLHostState | 24 // SSLHostState |
| 24 // | 25 // |
| 25 // The SSLHostState encapulates the host-specific state for SSL errors. For | 26 // The SSLHostState encapulates the host-specific state for SSL errors. For |
| 26 // example, SSLHostState remembers whether the user has whitelisted a | 27 // example, SSLHostState remembers whether the user has whitelisted a |
| 27 // particular broken cert for use with particular host. We separate this state | 28 // particular broken cert for use with particular host. We separate this state |
| 28 // from the SSLManager because this state is shared across many navigation | 29 // from the SSLManager because this state is shared across many navigation |
| 29 // controllers. | 30 // controllers. |
| 30 | |
| 31 class CONTENT_EXPORT SSLHostState | 31 class CONTENT_EXPORT SSLHostState |
| 32 : NON_EXPORTED_BASE(base::SupportsUserData::Data), | 32 : NON_EXPORTED_BASE(base::SupportsUserData::Data), |
| 33 NON_EXPORTED_BASE(public base::NonThreadSafe) { | 33 NON_EXPORTED_BASE(public base::NonThreadSafe) { |
| 34 public: | 34 public: |
| 35 // Contexts may specify a NULL certificate decision storage strategy. In that |
| 36 // case, the returned SSLHostState from GetFor() will implement a default |
| 37 // strategy of ignoring all exception requests and returning |
| 38 // net::QueryPolicy::Judgment::UNKOWN from QueryPolicy(). |
| 35 static SSLHostState* GetFor(BrowserContext* browser_context); | 39 static SSLHostState* GetFor(BrowserContext* browser_context); |
| 36 | 40 |
| 37 SSLHostState(); | 41 SSLHostState(); |
| 38 virtual ~SSLHostState(); | 42 virtual ~SSLHostState(); |
| 39 | 43 |
| 40 // Records that a host has run insecure content. | 44 // Records that a host has run insecure content. |
| 41 void HostRanInsecureContent(const std::string& host, int pid); | 45 void HostRanInsecureContent(const std::string& host, int pid); |
| 42 | 46 |
| 43 // Returns whether the specified host ran insecure content. | 47 // Returns whether the specified host ran insecure content. |
| 44 bool DidHostRunInsecureContent(const std::string& host, int pid) const; | 48 bool DidHostRunInsecureContent(const std::string& host, int pid) const; |
| 45 | 49 |
| 46 // Records that |cert| is not permitted to be used for |host| in the future, | 50 // Records that |cert| is not permitted to be used for |url| in the future, |
| 47 // for a specified |error| type.. | 51 // for a specified |error| type. |
| 48 void DenyCertForHost(net::X509Certificate* cert, | 52 void DenyCertForHost(net::X509Certificate* cert, |
| 49 const std::string& host, | 53 const std::string& host, |
| 50 net::CertStatus error); | 54 net::CertStatus error); |
| 51 | 55 |
| 52 // Records that |cert| is permitted to be used for |host| in the future, for | 56 // Records that |cert| is permitted to be used for |url| in the future, for |
| 53 // a specified |error| type. | 57 // a specified |error| type. |
| 54 void AllowCertForHost(net::X509Certificate* cert, | 58 void AllowCertForHost(net::X509Certificate* cert, |
| 55 const std::string& host, | 59 const std::string& host, |
| 56 net::CertStatus error); | 60 net::CertStatus error); |
| 57 | 61 |
| 62 // Revoke all allow/deny preferences for |url|. |
| 63 void RevokeAllowAndDenyPreferences(const std::string& host); |
| 64 |
| 65 bool HasAllowedOrDeniedCert(const std::string& host); |
| 66 |
| 58 // Clear all allow/deny preferences. | 67 // Clear all allow/deny preferences. |
| 59 void Clear(); | 68 void Clear(); |
| 60 | 69 |
| 61 // Queries whether |cert| is allowed or denied for |host| and |error|. | 70 // Queries whether |cert| is allowed or denied for |url| and |error|. |
| 62 net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert, | 71 net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert, |
| 63 const std::string& host, | 72 const std::string& host, |
| 64 net::CertStatus error); | 73 net::CertStatus error); |
| 65 | 74 |
| 66 private: | 75 private: |
| 67 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host | 76 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host |
| 68 // contains insecure content in that renderer process. | 77 // contains insecure content in that renderer process. |
| 69 typedef std::pair<std::string, int> BrokenHostEntry; | 78 typedef std::pair<std::string, int> BrokenHostEntry; |
| 70 | 79 |
| 71 // Hosts which have been contaminated with insecure content in the | 80 // Hosts which have been contaminated with insecure content in the |
| 72 // specified process. Note that insecure content can travel between | 81 // specified process. Note that insecure content can travel between |
| 73 // same-origin frames in one processs but cannot jump between processes. | 82 // same-origin frames in one processs but cannot jump between processes. |
| 74 std::set<BrokenHostEntry> ran_insecure_content_hosts_; | 83 std::set<BrokenHostEntry> ran_insecure_content_hosts_; |
| 75 | 84 |
| 76 // Certificate policies for each host. | 85 // The certificate decision store. It may be NULL, depending on the browsing |
| 77 std::map<std::string, net::CertPolicy> cert_policy_for_host_; | 86 // context. This is owned by the browsing context. |
| 87 SSLHostStateDelegate* delegate_; |
| 78 | 88 |
| 79 DISALLOW_COPY_AND_ASSIGN(SSLHostState); | 89 DISALLOW_COPY_AND_ASSIGN(SSLHostState); |
| 80 }; | 90 }; |
| 81 | 91 |
| 82 } // namespace content | 92 } // namespace content |
| 83 | 93 |
| 84 #endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ | 94 #endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |
| OLD | NEW |