| Index: net/ssl/ssl_config_service.cc
|
| diff --git a/net/ssl/ssl_config_service.cc b/net/ssl/ssl_config_service.cc
|
| deleted file mode 100644
|
| index 8a633320e432b09d80a0b1ec55f9bcd462b0f5ff..0000000000000000000000000000000000000000
|
| --- a/net/ssl/ssl_config_service.cc
|
| +++ /dev/null
|
| @@ -1,106 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/ssl/ssl_config_service.h"
|
| -
|
| -#include "base/lazy_instance.h"
|
| -#include "base/synchronization/lock.h"
|
| -#include "net/ssl/ssl_config_service_defaults.h"
|
| -
|
| -namespace net {
|
| -
|
| -SSLConfigService::SSLConfigService()
|
| - : observer_list_(ObserverList<Observer>::NOTIFY_EXISTING_ONLY) {
|
| -}
|
| -
|
| -// GlobalSSLObject holds a reference to a global SSL object, such as the
|
| -// CRLSet or the EVCertsWhitelist. It simply wraps a lock around a
|
| -// scoped_refptr so that getting a reference doesn't race with
|
| -// updating the global object.
|
| -template <class T>
|
| -class GlobalSSLObject {
|
| - public:
|
| - void Set(const scoped_refptr<T>& new_ssl_object) {
|
| - base::AutoLock locked(lock_);
|
| - ssl_object_ = new_ssl_object;
|
| - }
|
| -
|
| - scoped_refptr<T> Get() const {
|
| - base::AutoLock locked(lock_);
|
| - return ssl_object_;
|
| - }
|
| -
|
| - private:
|
| - scoped_refptr<T> ssl_object_;
|
| - mutable base::Lock lock_;
|
| -};
|
| -
|
| -typedef GlobalSSLObject<CRLSet> GlobalCRLSet;
|
| -typedef GlobalSSLObject<ct::EVCertsWhitelist> GlobalEVCertsWhitelist;
|
| -
|
| -base::LazyInstance<GlobalCRLSet>::Leaky g_crl_set = LAZY_INSTANCE_INITIALIZER;
|
| -base::LazyInstance<GlobalEVCertsWhitelist>::Leaky g_ev_whitelist =
|
| - LAZY_INSTANCE_INITIALIZER;
|
| -
|
| -// static
|
| -void SSLConfigService::SetCRLSet(scoped_refptr<CRLSet> crl_set) {
|
| - // Note: this can be called concurently with GetCRLSet().
|
| - g_crl_set.Get().Set(crl_set);
|
| -}
|
| -
|
| -// static
|
| -scoped_refptr<CRLSet> SSLConfigService::GetCRLSet() {
|
| - return g_crl_set.Get().Get();
|
| -}
|
| -
|
| -// static
|
| -void SSLConfigService::SetEVCertsWhitelist(
|
| - scoped_refptr<ct::EVCertsWhitelist> ev_whitelist) {
|
| - g_ev_whitelist.Get().Set(ev_whitelist);
|
| -}
|
| -
|
| -// static
|
| -scoped_refptr<ct::EVCertsWhitelist> SSLConfigService::GetEVCertsWhitelist() {
|
| - return g_ev_whitelist.Get().Get();
|
| -}
|
| -
|
| -void SSLConfigService::AddObserver(Observer* observer) {
|
| - observer_list_.AddObserver(observer);
|
| -}
|
| -
|
| -void SSLConfigService::RemoveObserver(Observer* observer) {
|
| - observer_list_.RemoveObserver(observer);
|
| -}
|
| -
|
| -void SSLConfigService::NotifySSLConfigChange() {
|
| - FOR_EACH_OBSERVER(Observer, observer_list_, OnSSLConfigChanged());
|
| -}
|
| -
|
| -bool SSLConfigService::SupportsFastradioPadding(const GURL& url) {
|
| - return false;
|
| -}
|
| -
|
| -SSLConfigService::~SSLConfigService() {
|
| -}
|
| -
|
| -void SSLConfigService::ProcessConfigUpdate(const SSLConfig& orig_config,
|
| - const SSLConfig& new_config) {
|
| - bool config_changed =
|
| - (orig_config.rev_checking_enabled != new_config.rev_checking_enabled) ||
|
| - (orig_config.rev_checking_required_local_anchors !=
|
| - new_config.rev_checking_required_local_anchors) ||
|
| - (orig_config.version_min != new_config.version_min) ||
|
| - (orig_config.version_max != new_config.version_max) ||
|
| - (orig_config.disabled_cipher_suites !=
|
| - new_config.disabled_cipher_suites) ||
|
| - (orig_config.channel_id_enabled != new_config.channel_id_enabled) ||
|
| - (orig_config.false_start_enabled != new_config.false_start_enabled) ||
|
| - (orig_config.require_forward_secrecy !=
|
| - new_config.require_forward_secrecy);
|
| -
|
| - if (config_changed)
|
| - NotifySSLConfigChange();
|
| -}
|
| -
|
| -} // namespace net
|
|
|