| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 5 #ifndef CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| 6 #define CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 6 #define CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| 7 #pragma once | 7 #pragma once |
| 8 | 8 |
| 9 #include <string> | 9 #include <string> |
| 10 | 10 |
| (...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 45 WebContentsImpl* web_contents); | 45 WebContentsImpl* web_contents); |
| 46 | 46 |
| 47 SSLPolicyBackend* backend() const { return backend_; } | 47 SSLPolicyBackend* backend() const { return backend_; } |
| 48 | 48 |
| 49 private: | 49 private: |
| 50 // Callback that the user chose to accept or deny the certificate. | 50 // Callback that the user chose to accept or deny the certificate. |
| 51 void OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, | 51 void OnAllowCertificate(scoped_refptr<SSLCertErrorHandler> handler, |
| 52 bool allow); | 52 bool allow); |
| 53 | 53 |
| 54 // Helper method for derived classes handling certificate errors. | 54 // Helper method for derived classes handling certificate errors. |
| 55 // If the error can be overridden by the user, show a blocking page that | 55 // |
| 56 // lets the user continue or cancel the request. | 56 // |overridable| indicates whether or not the user could (assuming perfect |
| 57 // For fatal certificate errors, show a blocking page that only lets the | 57 // knowledge) successfully override the error and still get the security |
| 58 // user cancel the request. | 58 // guarantees of TLS. |strict_enforcement| indicates whether or not the |
| 59 void OnCertErrorInternal(SSLCertErrorHandler* handler, bool overridable); | 59 // site the user is trying to connect to has requested strict enforcement |
| 60 // of certificate validation (e.g. with HTTP Strict-Transport-Security). |
| 61 void OnCertErrorInternal(SSLCertErrorHandler* handler, |
| 62 bool overridable, |
| 63 bool strict_enforcement); |
| 60 | 64 |
| 61 // If the security style of |entry| has not been initialized, then initialize | 65 // If the security style of |entry| has not been initialized, then initialize |
| 62 // it with the default style for its URL. | 66 // it with the default style for its URL. |
| 63 void InitializeEntryIfNeeded(content::NavigationEntryImpl* entry); | 67 void InitializeEntryIfNeeded(content::NavigationEntryImpl* entry); |
| 64 | 68 |
| 65 // Mark |origin| as having run insecure content in the process with ID |pid|. | 69 // Mark |origin| as having run insecure content in the process with ID |pid|. |
| 66 void OriginRanInsecureContent(const std::string& origin, int pid); | 70 void OriginRanInsecureContent(const std::string& origin, int pid); |
| 67 | 71 |
| 68 // The backend we use to enact our decisions. | 72 // The backend we use to enact our decisions. |
| 69 SSLPolicyBackend* backend_; | 73 SSLPolicyBackend* backend_; |
| 70 | 74 |
| 71 DISALLOW_COPY_AND_ASSIGN(SSLPolicy); | 75 DISALLOW_COPY_AND_ASSIGN(SSLPolicy); |
| 72 }; | 76 }; |
| 73 | 77 |
| 74 #endif // CONTENT_BROWSER_SSL_SSL_POLICY_H_ | 78 #endif // CONTENT_BROWSER_SSL_SSL_POLICY_H_ |
| OLD | NEW |