Index: android_webview/browser/aw_ssl_host_state_delegate.h |
diff --git a/android_webview/browser/aw_ssl_host_state_delegate.h b/android_webview/browser/aw_ssl_host_state_delegate.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..1297af9c13c2495421d782572c05fb241d5b1809 |
--- /dev/null |
+++ b/android_webview/browser/aw_ssl_host_state_delegate.h |
@@ -0,0 +1,77 @@ |
+// Copyright (c) 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef ANDROID_WEBVIEW_BROWSER_AW_SSL_HOST_STATE_DELEGATE_H_ |
+#define ANDROID_WEBVIEW_BROWSER_AW_SSL_HOST_STATE_DELEGATE_H_ |
+ |
+#include <map> |
+#include <string> |
+ |
+#include "content/public/browser/ssl_host_state_delegate.h" |
+#include "net/base/hash_value.h" |
+#include "net/cert/cert_status_flags.h" |
+#include "net/cert/x509_certificate.h" |
+ |
+namespace android_webview { |
+ |
+namespace internal { |
+// This class maintains the policy for storing actions on certificate errors. |
+class CertPolicy { |
+ public: |
+ CertPolicy(); |
+ ~CertPolicy(); |
+ // Returns true if the user has decided to proceed through the ssl error |
+ // before. For a certificate to be allowed, it must not have any |
+ // *additional* errors from when it was allowed. |
+ bool Check(const net::X509Certificate& cert, net::CertStatus error) const; |
+ |
+ // Causes the policy to allow this certificate for a given |error|. And |
+ // remember the user's choice. |
+ void Allow(const net::X509Certificate& cert, net::CertStatus error); |
+ |
+ private: |
+ // The set of fingerprints of allowed certificates. |
+ std::map<net::SHA256HashValue, net::CertStatus, net::SHA256HashValueLessThan> |
+ allowed_; |
+}; |
+ |
+} // namespace internal |
+ |
+class AwSSLHostStateDelegate : public content::SSLHostStateDelegate { |
+ public: |
+ AwSSLHostStateDelegate(); |
+ virtual ~AwSSLHostStateDelegate(); |
+ |
+ // Records that |cert| is permitted to be used for |host| in the future, for |
+ // a specified |error| type. |
+ void AllowCert(const std::string& host, |
+ const net::X509Certificate& cert, |
+ net::CertStatus error) override; |
+ |
+ void Clear() override; |
+ |
+ // Queries whether |cert| is allowed or denied for |host| and |error|. |
+ content::SSLHostStateDelegate::CertJudgment QueryPolicy( |
+ const std::string& host, |
+ const net::X509Certificate& cert, |
+ net::CertStatus error, |
+ bool* expired_previous_decision) override; |
+ |
+ // Records that a host has run insecure content. |
+ void HostRanInsecureContent(const std::string& host, int pid) override; |
+ |
+ // Returns whether the specified host ran insecure content. |
+ bool DidHostRunInsecureContent(const std::string& host, |
+ int pid) const override; |
+ |
+ private: |
+ // Certificate policies for each host. |
+ std::map<std::string, internal::CertPolicy> cert_policy_for_host_; |
+ |
+ DISALLOW_COPY_AND_ASSIGN(AwSSLHostStateDelegate); |
+}; |
+ |
+} // namespace android_webview |
+ |
+#endif // ANDROID_WEBVIEW_BROWSER_AW_SSL_HOST_STATE_DELEGATE_H_ |