| Index: content/browser/ssl/ssl_host_state.h
|
| diff --git a/content/browser/ssl/ssl_host_state.h b/content/browser/ssl/ssl_host_state.h
|
| deleted file mode 100644
|
| index 820821786d31180066f21fdfb900f1b7dd9a7fbd..0000000000000000000000000000000000000000
|
| --- a/content/browser/ssl/ssl_host_state.h
|
| +++ /dev/null
|
| @@ -1,84 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
|
| -#define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
|
| -
|
| -#include <map>
|
| -#include <set>
|
| -#include <string>
|
| -
|
| -#include "base/basictypes.h"
|
| -#include "base/compiler_specific.h"
|
| -#include "base/supports_user_data.h"
|
| -#include "base/threading/non_thread_safe.h"
|
| -#include "content/common/content_export.h"
|
| -#include "net/cert/cert_status_flags.h"
|
| -#include "net/cert/x509_certificate.h"
|
| -
|
| -namespace content {
|
| -class BrowserContext;
|
| -
|
| -// SSLHostState
|
| -//
|
| -// The SSLHostState encapulates the host-specific state for SSL errors. For
|
| -// example, SSLHostState remembers whether the user has whitelisted a
|
| -// particular broken cert for use with particular host. We separate this state
|
| -// from the SSLManager because this state is shared across many navigation
|
| -// controllers.
|
| -
|
| -class CONTENT_EXPORT SSLHostState
|
| - : NON_EXPORTED_BASE(base::SupportsUserData::Data),
|
| - NON_EXPORTED_BASE(public base::NonThreadSafe) {
|
| - public:
|
| - static SSLHostState* GetFor(BrowserContext* browser_context);
|
| -
|
| - SSLHostState();
|
| - virtual ~SSLHostState();
|
| -
|
| - // Records that a host has run insecure content.
|
| - void HostRanInsecureContent(const std::string& host, int pid);
|
| -
|
| - // Returns whether the specified host ran insecure content.
|
| - bool DidHostRunInsecureContent(const std::string& host, int pid) const;
|
| -
|
| - // Records that |cert| is not permitted to be used for |host| in the future,
|
| - // for a specified |error| type..
|
| - void DenyCertForHost(net::X509Certificate* cert,
|
| - const std::string& host,
|
| - net::CertStatus error);
|
| -
|
| - // Records that |cert| is permitted to be used for |host| in the future, for
|
| - // a specified |error| type.
|
| - void AllowCertForHost(net::X509Certificate* cert,
|
| - const std::string& host,
|
| - net::CertStatus error);
|
| -
|
| - // Clear all allow/deny preferences.
|
| - void Clear();
|
| -
|
| - // Queries whether |cert| is allowed or denied for |host| and |error|.
|
| - net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert,
|
| - const std::string& host,
|
| - net::CertStatus error);
|
| -
|
| - private:
|
| - // A BrokenHostEntry is a pair of (host, process_id) that indicates the host
|
| - // contains insecure content in that renderer process.
|
| - typedef std::pair<std::string, int> BrokenHostEntry;
|
| -
|
| - // Hosts which have been contaminated with insecure content in the
|
| - // specified process. Note that insecure content can travel between
|
| - // same-origin frames in one processs but cannot jump between processes.
|
| - std::set<BrokenHostEntry> ran_insecure_content_hosts_;
|
| -
|
| - // Certificate policies for each host.
|
| - std::map<std::string, net::CertPolicy> cert_policy_for_host_;
|
| -
|
| - DISALLOW_COPY_AND_ASSIGN(SSLHostState);
|
| -};
|
| -
|
| -} // namespace content
|
| -
|
| -#endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
|
|
|