Revert 268405 "Make sure that ScratchBuffer::Allocate() always r..."
[chromium-blink-merge.git] / content / browser / ssl / ssl_host_state.h
blob820821786d31180066f21fdfb900f1b7dd9a7fbd
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
6 #define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
8 #include <map>
9 #include <set>
10 #include <string>
12 #include "base/basictypes.h"
13 #include "base/compiler_specific.h"
14 #include "base/supports_user_data.h"
15 #include "base/threading/non_thread_safe.h"
16 #include "content/common/content_export.h"
17 #include "net/cert/cert_status_flags.h"
18 #include "net/cert/x509_certificate.h"
20 namespace content {
21 class BrowserContext;
23 // SSLHostState
25 // The SSLHostState encapulates the host-specific state for SSL errors. For
26 // example, SSLHostState remembers whether the user has whitelisted a
27 // particular broken cert for use with particular host. We separate this state
28 // from the SSLManager because this state is shared across many navigation
29 // controllers.
31 class CONTENT_EXPORT SSLHostState
32 : NON_EXPORTED_BASE(base::SupportsUserData::Data),
33 NON_EXPORTED_BASE(public base::NonThreadSafe) {
34 public:
35 static SSLHostState* GetFor(BrowserContext* browser_context);
37 SSLHostState();
38 virtual ~SSLHostState();
40 // Records that a host has run insecure content.
41 void HostRanInsecureContent(const std::string& host, int pid);
43 // Returns whether the specified host ran insecure content.
44 bool DidHostRunInsecureContent(const std::string& host, int pid) const;
46 // Records that |cert| is not permitted to be used for |host| in the future,
47 // for a specified |error| type..
48 void DenyCertForHost(net::X509Certificate* cert,
49 const std::string& host,
50 net::CertStatus error);
52 // Records that |cert| is permitted to be used for |host| in the future, for
53 // a specified |error| type.
54 void AllowCertForHost(net::X509Certificate* cert,
55 const std::string& host,
56 net::CertStatus error);
58 // Clear all allow/deny preferences.
59 void Clear();
61 // Queries whether |cert| is allowed or denied for |host| and |error|.
62 net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert,
63 const std::string& host,
64 net::CertStatus error);
66 private:
67 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host
68 // contains insecure content in that renderer process.
69 typedef std::pair<std::string, int> BrokenHostEntry;
71 // Hosts which have been contaminated with insecure content in the
72 // specified process. Note that insecure content can travel between
73 // same-origin frames in one processs but cannot jump between processes.
74 std::set<BrokenHostEntry> ran_insecure_content_hosts_;
76 // Certificate policies for each host.
77 std::map<std::string, net::CertPolicy> cert_policy_for_host_;
79 DISALLOW_COPY_AND_ASSIGN(SSLHostState);
82 } // namespace content
84 #endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_