1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ 6 #define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ 7 8 #include <map> 9 #include <set> 10 #include <string> 11 12 #include "base/basictypes.h" 13 #include "base/compiler_specific.h" 14 #include "base/supports_user_data.h" 15 #include "base/threading/non_thread_safe.h" 16 #include "content/common/content_export.h" 17 #include "net/cert/cert_status_flags.h" 18 #include "net/cert/x509_certificate.h" 19 20 namespace content { 21 class BrowserContext; 22 23 // SSLHostState 24 // 25 // The SSLHostState encapulates the host-specific state for SSL errors. For 26 // example, SSLHostState remembers whether the user has whitelisted a 27 // particular broken cert for use with particular host. We separate this state 28 // from the SSLManager because this state is shared across many navigation 29 // controllers. 30 31 class CONTENT_EXPORT SSLHostState 32 : NON_EXPORTED_BASE(base::SupportsUserData::Data), 33 NON_EXPORTED_BASE(public base::NonThreadSafe) { 34 public: 35 static SSLHostState* GetFor(BrowserContext* browser_context); 36 37 SSLHostState(); 38 virtual ~SSLHostState(); 39 40 // Records that a host has run insecure content. 41 void HostRanInsecureContent(const std::string& host, int pid); 42 43 // Returns whether the specified host ran insecure content. 44 bool DidHostRunInsecureContent(const std::string& host, int pid) const; 45 46 // Records that |cert| is not permitted to be used for |host| in the future, 47 // for a specified |error| type.. 48 void DenyCertForHost(net::X509Certificate* cert, 49 const std::string& host, 50 net::CertStatus error); 51 52 // Records that |cert| is permitted to be used for |host| in the future, for 53 // a specified |error| type. 54 void AllowCertForHost(net::X509Certificate* cert, 55 const std::string& host, 56 net::CertStatus error); 57 58 // Clear all allow/deny preferences. 59 void Clear(); 60 61 // Queries whether |cert| is allowed or denied for |host| and |error|. 62 net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert, 63 const std::string& host, 64 net::CertStatus error); 65 66 private: 67 // A BrokenHostEntry is a pair of (host, process_id) that indicates the host 68 // contains insecure content in that renderer process. 69 typedef std::pair<std::string, int> BrokenHostEntry; 70 71 // Hosts which have been contaminated with insecure content in the 72 // specified process. Note that insecure content can travel between 73 // same-origin frames in one processs but cannot jump between processes. 74 std::set<BrokenHostEntry> ran_insecure_content_hosts_; 75 76 // Certificate policies for each host. 77 std::map<std::string, net::CertPolicy> cert_policy_for_host_; 78 79 DISALLOW_COPY_AND_ASSIGN(SSLHostState); 80 }; 81 82 } // namespace content 83 84 #endif // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_ 85