Index: content/browser/ssl/ssl_host_state.h |
diff --git a/content/browser/ssl/ssl_host_state.h b/content/browser/ssl/ssl_host_state.h |
deleted file mode 100644 |
index 820821786d31180066f21fdfb900f1b7dd9a7fbd..0000000000000000000000000000000000000000 |
--- a/content/browser/ssl/ssl_host_state.h |
+++ /dev/null |
@@ -1,84 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |
-#define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |
- |
-#include <map> |
-#include <set> |
-#include <string> |
- |
-#include "base/basictypes.h" |
-#include "base/compiler_specific.h" |
-#include "base/supports_user_data.h" |
-#include "base/threading/non_thread_safe.h" |
-#include "content/common/content_export.h" |
-#include "net/cert/cert_status_flags.h" |
-#include "net/cert/x509_certificate.h" |
- |
-namespace content { |
-class BrowserContext; |
- |
-// SSLHostState |
-// |
-// The SSLHostState encapulates the host-specific state for SSL errors. For |
-// example, SSLHostState remembers whether the user has whitelisted a |
-// particular broken cert for use with particular host. We separate this state |
-// from the SSLManager because this state is shared across many navigation |
-// controllers. |
- |
-class CONTENT_EXPORT SSLHostState |
- : NON_EXPORTED_BASE(base::SupportsUserData::Data), |
- NON_EXPORTED_BASE(public base::NonThreadSafe) { |
- public: |
- static SSLHostState* GetFor(BrowserContext* browser_context); |
- |
- SSLHostState(); |
- virtual ~SSLHostState(); |
- |
- // Records that a host has run insecure content. |
- void HostRanInsecureContent(const std::string& host, int pid); |
- |
- // Returns whether the specified host ran insecure content. |
- bool DidHostRunInsecureContent(const std::string& host, int pid) const; |
- |
- // Records that |cert| is not permitted to be used for |host| in the future, |
- // for a specified |error| type.. |
- void DenyCertForHost(net::X509Certificate* cert, |
- const std::string& host, |
- net::CertStatus error); |
- |
- // Records that |cert| is permitted to be used for |host| in the future, for |
- // a specified |error| type. |
- void AllowCertForHost(net::X509Certificate* cert, |
- const std::string& host, |
- net::CertStatus error); |
- |
- // Clear all allow/deny preferences. |
- void Clear(); |
- |
- // Queries whether |cert| is allowed or denied for |host| and |error|. |
- net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert, |
- const std::string& host, |
- net::CertStatus error); |
- |
- private: |
- // A BrokenHostEntry is a pair of (host, process_id) that indicates the host |
- // contains insecure content in that renderer process. |
- typedef std::pair<std::string, int> BrokenHostEntry; |
- |
- // Hosts which have been contaminated with insecure content in the |
- // specified process. Note that insecure content can travel between |
- // same-origin frames in one processs but cannot jump between processes. |
- std::set<BrokenHostEntry> ran_insecure_content_hosts_; |
- |
- // Certificate policies for each host. |
- std::map<std::string, net::CertPolicy> cert_policy_for_host_; |
- |
- DISALLOW_COPY_AND_ASSIGN(SSLHostState); |
-}; |
- |
-} // namespace content |
- |
-#endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ |