| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| 7 | 7 |
| 8 #include <map> | 8 #include <map> |
| 9 #include <string> | 9 #include <string> |
| 10 #include <utility> | 10 #include <utility> |
| (...skipping 26 matching lines...) Expand all Loading... |
| 37 | 37 |
| 38 namespace blink { | 38 namespace blink { |
| 39 struct WebWindowFeatures; | 39 struct WebWindowFeatures; |
| 40 } | 40 } |
| 41 | 41 |
| 42 namespace base { | 42 namespace base { |
| 43 class DictionaryValue; | 43 class DictionaryValue; |
| 44 class FilePath; | 44 class FilePath; |
| 45 } | 45 } |
| 46 namespace crypto { | 46 namespace crypto { |
| 47 class CryptoModuleBlockingPasswordDelegate; | 47 class NSSCryptoModuleDelegate; |
| 48 } | 48 } |
| 49 | 49 |
| 50 namespace gfx { | 50 namespace gfx { |
| 51 class ImageSkia; | 51 class ImageSkia; |
| 52 } | 52 } |
| 53 | 53 |
| 54 namespace net { | 54 namespace net { |
| 55 class CookieOptions; | 55 class CookieOptions; |
| 56 class HttpNetworkSession; | 56 class HttpNetworkSession; |
| 57 class NetLog; | 57 class NetLog; |
| (...skipping 527 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 585 virtual const wchar_t* GetResourceDllName(); | 585 virtual const wchar_t* GetResourceDllName(); |
| 586 | 586 |
| 587 // This is called on the PROCESS_LAUNCHER thread before the renderer process | 587 // This is called on the PROCESS_LAUNCHER thread before the renderer process |
| 588 // is launched. It gives the embedder a chance to add loosen the sandbox | 588 // is launched. It gives the embedder a chance to add loosen the sandbox |
| 589 // policy. | 589 // policy. |
| 590 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy, | 590 virtual void PreSpawnRenderer(sandbox::TargetPolicy* policy, |
| 591 bool* success) {} | 591 bool* success) {} |
| 592 #endif | 592 #endif |
| 593 | 593 |
| 594 #if defined(USE_NSS) | 594 #if defined(USE_NSS) |
| 595 // Return a delegate to authenticate and unlock |module|. | 595 // Return a delegate to select a module for keygen and to authenticate and |
| 596 // This is called on a worker thread. | 596 // unlock it. This is called on the IO thread. |
| 597 virtual | 597 virtual crypto::NSSCryptoModuleDelegate* GetKeygenCryptoModuleDelegate( |
| 598 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( | 598 ResourceContext* context, |
| 599 const GURL& url); | 599 const GURL& url); |
| 600 #endif | 600 #endif |
| 601 | 601 |
| 602 // Returns true if plugin referred to by the url can use | 602 // Returns true if plugin referred to by the url can use |
| 603 // pp::FileIO::RequestOSFileHandle. | 603 // pp::FileIO::RequestOSFileHandle. |
| 604 virtual bool IsPluginAllowedToCallRequestOSFileHandle( | 604 virtual bool IsPluginAllowedToCallRequestOSFileHandle( |
| 605 content::BrowserContext* browser_context, | 605 content::BrowserContext* browser_context, |
| 606 const GURL& url); | 606 const GURL& url); |
| 607 }; | 607 }; |
| 608 | 608 |
| 609 } // namespace content | 609 } // namespace content |
| 610 | 610 |
| 611 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ | 611 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ |
| OLD | NEW |