Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 5 #ifndef CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| 6 #define CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 6 #define CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
| (...skipping 37 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 48 void OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, | 48 void OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
| 49 bool allow); | 49 bool allow); |
| 50 | 50 |
| 51 // Helper method for derived classes handling certificate errors. | 51 // Helper method for derived classes handling certificate errors. |
| 52 // | 52 // |
| 53 // |overridable| indicates whether or not the user could (assuming perfect | 53 // |overridable| indicates whether or not the user could (assuming perfect |
| 54 // knowledge) successfully override the error and still get the security | 54 // knowledge) successfully override the error and still get the security |
| 55 // guarantees of TLS. |strict_enforcement| indicates whether or not the | 55 // guarantees of TLS. |strict_enforcement| indicates whether or not the |
| 56 // site the user is trying to connect to has requested strict enforcement | 56 // site the user is trying to connect to has requested strict enforcement |
| 57 // of certificate validation (e.g. with HTTP Strict-Transport-Security). | 57 // of certificate validation (e.g. with HTTP Strict-Transport-Security). |
| 58 // |expried_previous_decision| indicates whether a user decision had been | |
| 59 // previously made but the decision has expired. | |
| 58 void OnCertErrorInternal(SSLCertErrorHandler* handler, | 60 void OnCertErrorInternal(SSLCertErrorHandler* handler, |
| 59 bool overridable, | 61 bool overridable, |
|
sky
2014/08/12 16:47:31
Same comment about a bitmask here.
jww
2014/08/12 19:23:42
Done.
| |
| 60 bool strict_enforcement); | 62 bool strict_enforcement, |
| 63 bool expired_previous_decision); | |
| 61 | 64 |
| 62 // If the security style of |entry| has not been initialized, then initialize | 65 // If the security style of |entry| has not been initialized, then initialize |
| 63 // it with the default style for its URL. | 66 // it with the default style for its URL. |
| 64 void InitializeEntryIfNeeded(NavigationEntryImpl* entry); | 67 void InitializeEntryIfNeeded(NavigationEntryImpl* entry); |
| 65 | 68 |
| 66 // Mark |origin| as having run insecure content in the process with ID |pid|. | 69 // Mark |origin| as having run insecure content in the process with ID |pid|. |
| 67 void OriginRanInsecureContent(const std::string& origin, int pid); | 70 void OriginRanInsecureContent(const std::string& origin, int pid); |
| 68 | 71 |
| 69 // The backend we use to enact our decisions. | 72 // The backend we use to enact our decisions. |
| 70 SSLPolicyBackend* backend_; | 73 SSLPolicyBackend* backend_; |
| 71 | 74 |
| 72 DISALLOW_COPY_AND_ASSIGN(SSLPolicy); | 75 DISALLOW_COPY_AND_ASSIGN(SSLPolicy); |
| 73 }; | 76 }; |
| 74 | 77 |
| 75 } // namespace content | 78 } // namespace content |
| 76 | 79 |
| 77 #endif // CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 80 #endif // CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| OLD | NEW |