Home | History | Annotate | Download | only in ssl
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #ifndef CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
      6 #define CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
      7 
      8 #include <map>
      9 #include <set>
     10 #include <string>
     11 
     12 #include "base/basictypes.h"
     13 #include "base/compiler_specific.h"
     14 #include "base/supports_user_data.h"
     15 #include "base/threading/non_thread_safe.h"
     16 #include "content/common/content_export.h"
     17 #include "net/cert/cert_status_flags.h"
     18 #include "net/cert/x509_certificate.h"
     19 
     20 namespace content {
     21 class BrowserContext;
     22 
     23 // SSLHostState
     24 //
     25 // The SSLHostState encapulates the host-specific state for SSL errors.  For
     26 // example, SSLHostState remembers whether the user has whitelisted a
     27 // particular broken cert for use with particular host.  We separate this state
     28 // from the SSLManager because this state is shared across many navigation
     29 // controllers.
     30 
     31 class CONTENT_EXPORT SSLHostState
     32     : NON_EXPORTED_BASE(base::SupportsUserData::Data),
     33       NON_EXPORTED_BASE(public base::NonThreadSafe) {
     34  public:
     35   static SSLHostState* GetFor(BrowserContext* browser_context);
     36 
     37   SSLHostState();
     38   virtual ~SSLHostState();
     39 
     40   // Records that a host has run insecure content.
     41   void HostRanInsecureContent(const std::string& host, int pid);
     42 
     43   // Returns whether the specified host ran insecure content.
     44   bool DidHostRunInsecureContent(const std::string& host, int pid) const;
     45 
     46   // Records that |cert| is not permitted to be used for |host| in the future,
     47   // for a specified |error| type..
     48   void DenyCertForHost(net::X509Certificate* cert,
     49                        const std::string& host,
     50                        net::CertStatus error);
     51 
     52   // Records that |cert| is permitted to be used for |host| in the future, for
     53   // a specified |error| type.
     54   void AllowCertForHost(net::X509Certificate* cert,
     55                         const std::string& host,
     56                         net::CertStatus error);
     57 
     58   // Clear all allow/deny preferences.
     59   void Clear();
     60 
     61   // Queries whether |cert| is allowed or denied for |host| and |error|.
     62   net::CertPolicy::Judgment QueryPolicy(net::X509Certificate* cert,
     63                                         const std::string& host,
     64                                         net::CertStatus error);
     65 
     66  private:
     67   // A BrokenHostEntry is a pair of (host, process_id) that indicates the host
     68   // contains insecure content in that renderer process.
     69   typedef std::pair<std::string, int> BrokenHostEntry;
     70 
     71   // Hosts which have been contaminated with insecure content in the
     72   // specified process.  Note that insecure content can travel between
     73   // same-origin frames in one processs but cannot jump between processes.
     74   std::set<BrokenHostEntry> ran_insecure_content_hosts_;
     75 
     76   // Certificate policies for each host.
     77   std::map<std::string, net::CertPolicy> cert_policy_for_host_;
     78 
     79   DISALLOW_COPY_AND_ASSIGN(SSLHostState);
     80 };
     81 
     82 }  // namespace content
     83 
     84 #endif  // CONTENT_BROWSER_SSL_SSL_HOST_STATE_H_
     85