Only grant permissions to new extensions from sync if they have the expected version
[chromium-blink-merge.git] / chrome / browser / ssl / ssl_add_certificate_android.cc
blob14c05e8750e38049c0b49ffabd2a02fa259bcd58
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/ssl/ssl_add_certificate.h"
7 #include "net/android/network_library.h"
9 namespace chrome {
11 // Special case for Android here for several reasons:
13 // - The SSLAddCertHandler implementation currently only supports
14 // CERTIFICATE_TYPE_X509_USER_CERT, but not other types, like
15 // CERTIFICATE_TYPE_PKCS12_ARCHIVE which are required on this
16 // platform.
18 // - Besides, SSLAddCertHandler tries to parse the certificate
19 // by calling net::CertDatabase::CheckUserCert() which is not
20 // implemented on Android, mainly because there is no API
21 // provided by the system to do that properly.
23 // - The Android CertInstaller activity will check the certificate file
24 // and display a toast (small fading dialog) to the user if it is
25 // not valid, so the UI performed by SSLAddCertHandler would
26 // be redundant.
27 void SSLAddCertificate(
28 net::CertificateMimeType cert_type,
29 const void* cert_data,
30 size_t cert_size,
31 int /* render_process_id */,
32 int /* render_view_id */) {
33 if (cert_size > 0) {
34 // This launches a new activity which will run in a different process.
35 // It handles all user interaction, so no need to do anything in the
36 // browser UI thread here.
37 net::android::StoreCertificate(cert_type, cert_data, cert_size);
41 } // namespace chrome