/usr/include/thunderbird/nsISiteSecurityService.h is in thunderbird-dev 1:38.6.0+build1-0ubuntu1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 | /*
* DO NOT EDIT. THIS FILE IS GENERATED FROM ../../../dist/idl/nsISiteSecurityService.idl
*/
#ifndef __gen_nsISiteSecurityService_h__
#define __gen_nsISiteSecurityService_h__
#ifndef __gen_nsISupports_h__
#include "nsISupports.h"
#endif
/* For IDL files that don't want to include root IDL files. */
#ifndef NS_NO_VTABLE
#define NS_NO_VTABLE
#endif
class nsIURI; /* forward declaration */
class nsIObserver; /* forward declaration */
class nsIHttpChannel; /* forward declaration */
class nsISSLStatus; /* forward declaration */
template<class T> class nsTArray;
class nsCString;
namespace mozilla
{
namespace pkix
{
class Time;
}
}
/* starting interface: nsISiteSecurityService */
#define NS_ISITESECURITYSERVICE_IID_STR "e219eace-0e04-42ba-b203-58a8b327867c"
#define NS_ISITESECURITYSERVICE_IID \
{0xe219eace, 0x0e04, 0x42ba, \
{ 0xb2, 0x03, 0x58, 0xa8, 0xb3, 0x27, 0x86, 0x7c }}
class NS_NO_VTABLE nsISiteSecurityService : public nsISupports {
public:
NS_DECLARE_STATIC_IID_ACCESSOR(NS_ISITESECURITYSERVICE_IID)
enum {
HEADER_HSTS = 0U,
HEADER_HPKP = 1U,
HEADER_OMS = 2U
};
/* void processHeader (in uint32_t aType, in nsIURI aSourceURI, in string aHeader, in nsISSLStatus aSSLStatus, in uint32_t aFlags, [optional] out unsigned long long aMaxAge, [optional] out boolean aIncludeSubdomains); */
NS_IMETHOD ProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, nsISSLStatus *aSSLStatus, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) = 0;
/* void unsafeProcessHeader (in uint32_t aType, in nsIURI aSourceURI, in string aHeader, in uint32_t aFlags, [optional] out unsigned long long aMaxAge, [optional] out boolean aIncludeSubdomains); */
NS_IMETHOD UnsafeProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) = 0;
/* void removeState (in uint32_t aType, in nsIURI aURI, in uint32_t aFlags); */
NS_IMETHOD RemoveState(uint32_t aType, nsIURI *aURI, uint32_t aFlags) = 0;
/* boolean isSecureHost (in uint32_t aType, in string aHost, in uint32_t aFlags); */
NS_IMETHOD IsSecureHost(uint32_t aType, const char * aHost, uint32_t aFlags, bool *_retval) = 0;
/* boolean isSecureURI (in uint32_t aType, in nsIURI aURI, in uint32_t aFlags); */
NS_IMETHOD IsSecureURI(uint32_t aType, nsIURI *aURI, uint32_t aFlags, bool *_retval) = 0;
/* void clearAll (); */
NS_IMETHOD ClearAll(void) = 0;
/* [noscript] boolean getKeyPinsForHostname (in string aHostname, in mozillaPkixTime evalTime, out nsCStringTArrayRef aPinArray, out boolean aIncludeSubdomains); */
NS_IMETHOD GetKeyPinsForHostname(const char * aHostname, mozilla::pkix::Time & evalTime, nsTArray<nsCString> & aPinArray, bool *aIncludeSubdomains, bool *_retval) = 0;
/* boolean setKeyPins (in string aHost, in boolean aIncludeSubdomains, in unsigned long aMaxAge, in unsigned long aPinCount, [array, size_is (aPinCount)] in string aSha256Pins); */
NS_IMETHOD SetKeyPins(const char * aHost, bool aIncludeSubdomains, uint32_t aMaxAge, uint32_t aPinCount, const char * *aSha256Pins, bool *_retval) = 0;
};
NS_DEFINE_STATIC_IID_ACCESSOR(nsISiteSecurityService, NS_ISITESECURITYSERVICE_IID)
/* Use this macro when declaring classes that implement this interface. */
#define NS_DECL_NSISITESECURITYSERVICE \
NS_IMETHOD ProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, nsISSLStatus *aSSLStatus, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override; \
NS_IMETHOD UnsafeProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override; \
NS_IMETHOD RemoveState(uint32_t aType, nsIURI *aURI, uint32_t aFlags) override; \
NS_IMETHOD IsSecureHost(uint32_t aType, const char * aHost, uint32_t aFlags, bool *_retval) override; \
NS_IMETHOD IsSecureURI(uint32_t aType, nsIURI *aURI, uint32_t aFlags, bool *_retval) override; \
NS_IMETHOD ClearAll(void) override; \
NS_IMETHOD GetKeyPinsForHostname(const char * aHostname, mozilla::pkix::Time & evalTime, nsTArray<nsCString> & aPinArray, bool *aIncludeSubdomains, bool *_retval) override; \
NS_IMETHOD SetKeyPins(const char * aHost, bool aIncludeSubdomains, uint32_t aMaxAge, uint32_t aPinCount, const char * *aSha256Pins, bool *_retval) override;
/* Use this macro to declare functions that forward the behavior of this interface to another object. */
#define NS_FORWARD_NSISITESECURITYSERVICE(_to) \
NS_IMETHOD ProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, nsISSLStatus *aSSLStatus, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override { return _to ProcessHeader(aType, aSourceURI, aHeader, aSSLStatus, aFlags, aMaxAge, aIncludeSubdomains); } \
NS_IMETHOD UnsafeProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override { return _to UnsafeProcessHeader(aType, aSourceURI, aHeader, aFlags, aMaxAge, aIncludeSubdomains); } \
NS_IMETHOD RemoveState(uint32_t aType, nsIURI *aURI, uint32_t aFlags) override { return _to RemoveState(aType, aURI, aFlags); } \
NS_IMETHOD IsSecureHost(uint32_t aType, const char * aHost, uint32_t aFlags, bool *_retval) override { return _to IsSecureHost(aType, aHost, aFlags, _retval); } \
NS_IMETHOD IsSecureURI(uint32_t aType, nsIURI *aURI, uint32_t aFlags, bool *_retval) override { return _to IsSecureURI(aType, aURI, aFlags, _retval); } \
NS_IMETHOD ClearAll(void) override { return _to ClearAll(); } \
NS_IMETHOD GetKeyPinsForHostname(const char * aHostname, mozilla::pkix::Time & evalTime, nsTArray<nsCString> & aPinArray, bool *aIncludeSubdomains, bool *_retval) override { return _to GetKeyPinsForHostname(aHostname, evalTime, aPinArray, aIncludeSubdomains, _retval); } \
NS_IMETHOD SetKeyPins(const char * aHost, bool aIncludeSubdomains, uint32_t aMaxAge, uint32_t aPinCount, const char * *aSha256Pins, bool *_retval) override { return _to SetKeyPins(aHost, aIncludeSubdomains, aMaxAge, aPinCount, aSha256Pins, _retval); }
/* Use this macro to declare functions that forward the behavior of this interface to another object in a safe way. */
#define NS_FORWARD_SAFE_NSISITESECURITYSERVICE(_to) \
NS_IMETHOD ProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, nsISSLStatus *aSSLStatus, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ProcessHeader(aType, aSourceURI, aHeader, aSSLStatus, aFlags, aMaxAge, aIncludeSubdomains); } \
NS_IMETHOD UnsafeProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains) override { return !_to ? NS_ERROR_NULL_POINTER : _to->UnsafeProcessHeader(aType, aSourceURI, aHeader, aFlags, aMaxAge, aIncludeSubdomains); } \
NS_IMETHOD RemoveState(uint32_t aType, nsIURI *aURI, uint32_t aFlags) override { return !_to ? NS_ERROR_NULL_POINTER : _to->RemoveState(aType, aURI, aFlags); } \
NS_IMETHOD IsSecureHost(uint32_t aType, const char * aHost, uint32_t aFlags, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSecureHost(aType, aHost, aFlags, _retval); } \
NS_IMETHOD IsSecureURI(uint32_t aType, nsIURI *aURI, uint32_t aFlags, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->IsSecureURI(aType, aURI, aFlags, _retval); } \
NS_IMETHOD ClearAll(void) override { return !_to ? NS_ERROR_NULL_POINTER : _to->ClearAll(); } \
NS_IMETHOD GetKeyPinsForHostname(const char * aHostname, mozilla::pkix::Time & evalTime, nsTArray<nsCString> & aPinArray, bool *aIncludeSubdomains, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->GetKeyPinsForHostname(aHostname, evalTime, aPinArray, aIncludeSubdomains, _retval); } \
NS_IMETHOD SetKeyPins(const char * aHost, bool aIncludeSubdomains, uint32_t aMaxAge, uint32_t aPinCount, const char * *aSha256Pins, bool *_retval) override { return !_to ? NS_ERROR_NULL_POINTER : _to->SetKeyPins(aHost, aIncludeSubdomains, aMaxAge, aPinCount, aSha256Pins, _retval); }
#if 0
/* Use the code below as a template for the implementation class for this interface. */
/* Header file */
class nsSiteSecurityService : public nsISiteSecurityService
{
public:
NS_DECL_ISUPPORTS
NS_DECL_NSISITESECURITYSERVICE
nsSiteSecurityService();
private:
~nsSiteSecurityService();
protected:
/* additional members */
};
/* Implementation file */
NS_IMPL_ISUPPORTS(nsSiteSecurityService, nsISiteSecurityService)
nsSiteSecurityService::nsSiteSecurityService()
{
/* member initializers and constructor code */
}
nsSiteSecurityService::~nsSiteSecurityService()
{
/* destructor code */
}
/* void processHeader (in uint32_t aType, in nsIURI aSourceURI, in string aHeader, in nsISSLStatus aSSLStatus, in uint32_t aFlags, [optional] out unsigned long long aMaxAge, [optional] out boolean aIncludeSubdomains); */
NS_IMETHODIMP nsSiteSecurityService::ProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, nsISSLStatus *aSSLStatus, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* void unsafeProcessHeader (in uint32_t aType, in nsIURI aSourceURI, in string aHeader, in uint32_t aFlags, [optional] out unsigned long long aMaxAge, [optional] out boolean aIncludeSubdomains); */
NS_IMETHODIMP nsSiteSecurityService::UnsafeProcessHeader(uint32_t aType, nsIURI *aSourceURI, const char * aHeader, uint32_t aFlags, uint64_t *aMaxAge, bool *aIncludeSubdomains)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* void removeState (in uint32_t aType, in nsIURI aURI, in uint32_t aFlags); */
NS_IMETHODIMP nsSiteSecurityService::RemoveState(uint32_t aType, nsIURI *aURI, uint32_t aFlags)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* boolean isSecureHost (in uint32_t aType, in string aHost, in uint32_t aFlags); */
NS_IMETHODIMP nsSiteSecurityService::IsSecureHost(uint32_t aType, const char * aHost, uint32_t aFlags, bool *_retval)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* boolean isSecureURI (in uint32_t aType, in nsIURI aURI, in uint32_t aFlags); */
NS_IMETHODIMP nsSiteSecurityService::IsSecureURI(uint32_t aType, nsIURI *aURI, uint32_t aFlags, bool *_retval)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* void clearAll (); */
NS_IMETHODIMP nsSiteSecurityService::ClearAll()
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* [noscript] boolean getKeyPinsForHostname (in string aHostname, in mozillaPkixTime evalTime, out nsCStringTArrayRef aPinArray, out boolean aIncludeSubdomains); */
NS_IMETHODIMP nsSiteSecurityService::GetKeyPinsForHostname(const char * aHostname, mozilla::pkix::Time & evalTime, nsTArray<nsCString> & aPinArray, bool *aIncludeSubdomains, bool *_retval)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* boolean setKeyPins (in string aHost, in boolean aIncludeSubdomains, in unsigned long aMaxAge, in unsigned long aPinCount, [array, size_is (aPinCount)] in string aSha256Pins); */
NS_IMETHODIMP nsSiteSecurityService::SetKeyPins(const char * aHost, bool aIncludeSubdomains, uint32_t aMaxAge, uint32_t aPinCount, const char * *aSha256Pins, bool *_retval)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
/* End of implementation class template. */
#endif
#define NS_SSSERVICE_CONTRACTID "@mozilla.org/ssservice;1"
#endif /* __gen_nsISiteSecurityService_h__ */
|