| Index: components/ssl_errors/error_info.cc
|
| diff --git a/chrome/browser/ssl/ssl_error_info.cc b/components/ssl_errors/error_info.cc
|
| similarity index 76%
|
| rename from chrome/browser/ssl/ssl_error_info.cc
|
| rename to components/ssl_errors/error_info.cc
|
| index 7e60783c598366bfe022e72c8ca4b0afa840cbd0..625a31b5510e49e1281676b5ac4ed71d8fd0b810 100644
|
| --- a/chrome/browser/ssl/ssl_error_info.cc
|
| +++ b/components/ssl_errors/error_info.cc
|
| @@ -1,14 +1,12 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "chrome/browser/ssl/ssl_error_info.h"
|
| +#include "components/ssl_errors/error_info.h"
|
|
|
| #include "base/i18n/message_formatter.h"
|
| #include "base/strings/utf_string_conversions.h"
|
| -#include "chrome/grit/chromium_strings.h"
|
| -#include "chrome/grit/generated_resources.h"
|
| -#include "content/public/browser/cert_store.h"
|
| +#include "grit/components_strings.h"
|
| #include "net/base/escape.h"
|
| #include "net/base/net_errors.h"
|
| #include "net/cert/cert_status_flags.h"
|
| @@ -18,16 +16,16 @@
|
|
|
| using base::UTF8ToUTF16;
|
|
|
| -SSLErrorInfo::SSLErrorInfo(const base::string16& details,
|
| - const base::string16& short_description)
|
| - : details_(details),
|
| - short_description_(short_description) {
|
| -}
|
| +namespace ssl_errors {
|
| +
|
| +ErrorInfo::ErrorInfo(const base::string16& details,
|
| + const base::string16& short_description)
|
| + : details_(details), short_description_(short_description) {}
|
|
|
| // static
|
| -SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| - net::X509Certificate* cert,
|
| - const GURL& request_url) {
|
| +ErrorInfo ErrorInfo::CreateError(ErrorType error_type,
|
| + net::X509Certificate* cert,
|
| + const GURL& request_url) {
|
| base::string16 details, short_description;
|
| switch (error_type) {
|
| case CERT_COMMON_NAME_INVALID: {
|
| @@ -47,11 +45,10 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| }
|
| if (i == dns_names.size())
|
| i = 0;
|
| - details =
|
| - l10n_util::GetStringFUTF16(IDS_CERT_ERROR_COMMON_NAME_INVALID_DETAILS,
|
| - UTF8ToUTF16(request_url.host()),
|
| - net::EscapeForHTML(
|
| - UTF8ToUTF16(dns_names[i])));
|
| + details = l10n_util::GetStringFUTF16(
|
| + IDS_CERT_ERROR_COMMON_NAME_INVALID_DETAILS,
|
| + UTF8ToUTF16(request_url.host()),
|
| + net::EscapeForHTML(UTF8ToUTF16(dns_names[i])));
|
| short_description = l10n_util::GetStringUTF16(
|
| IDS_CERT_ERROR_COMMON_NAME_INVALID_DESCRIPTION);
|
| break;
|
| @@ -87,16 +84,16 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| }
|
| break;
|
| case CERT_AUTHORITY_INVALID:
|
| - details = l10n_util::GetStringFUTF16(
|
| - IDS_CERT_ERROR_AUTHORITY_INVALID_DETAILS,
|
| - UTF8ToUTF16(request_url.host()));
|
| + details =
|
| + l10n_util::GetStringFUTF16(IDS_CERT_ERROR_AUTHORITY_INVALID_DETAILS,
|
| + UTF8ToUTF16(request_url.host()));
|
| short_description = l10n_util::GetStringUTF16(
|
| IDS_CERT_ERROR_AUTHORITY_INVALID_DESCRIPTION);
|
| break;
|
| case CERT_CONTAINS_ERRORS:
|
| - details = l10n_util::GetStringFUTF16(
|
| - IDS_CERT_ERROR_CONTAINS_ERRORS_DETAILS,
|
| - UTF8ToUTF16(request_url.host()));
|
| + details =
|
| + l10n_util::GetStringFUTF16(IDS_CERT_ERROR_CONTAINS_ERRORS_DETAILS,
|
| + UTF8ToUTF16(request_url.host()));
|
| short_description =
|
| l10n_util::GetStringUTF16(IDS_CERT_ERROR_CONTAINS_ERRORS_DESCRIPTION);
|
| break;
|
| @@ -113,9 +110,8 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| l10n_util::GetStringUTF16(IDS_CERT_ERROR_REVOKED_CERT_DESCRIPTION);
|
| break;
|
| case CERT_INVALID:
|
| - details = l10n_util::GetStringFUTF16(
|
| - IDS_CERT_ERROR_INVALID_CERT_DETAILS,
|
| - UTF8ToUTF16(request_url.host()));
|
| + details = l10n_util::GetStringFUTF16(IDS_CERT_ERROR_INVALID_CERT_DETAILS,
|
| + UTF8ToUTF16(request_url.host()));
|
| short_description =
|
| l10n_util::GetStringUTF16(IDS_CERT_ERROR_INVALID_CERT_DESCRIPTION);
|
| break;
|
| @@ -127,16 +123,16 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| IDS_CERT_ERROR_WEAK_SIGNATURE_ALGORITHM_DESCRIPTION);
|
| break;
|
| case CERT_WEAK_KEY:
|
| - details = l10n_util::GetStringFUTF16(
|
| - IDS_CERT_ERROR_WEAK_KEY_DETAILS, UTF8ToUTF16(request_url.host()));
|
| - short_description = l10n_util::GetStringUTF16(
|
| - IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION);
|
| + details = l10n_util::GetStringFUTF16(IDS_CERT_ERROR_WEAK_KEY_DETAILS,
|
| + UTF8ToUTF16(request_url.host()));
|
| + short_description =
|
| + l10n_util::GetStringUTF16(IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION);
|
| break;
|
| case CERT_WEAK_KEY_DH:
|
| - details = l10n_util::GetStringFUTF16(
|
| - IDS_CERT_ERROR_WEAK_KEY_DETAILS, UTF8ToUTF16(request_url.host()));
|
| - short_description = l10n_util::GetStringUTF16(
|
| - IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION);
|
| + details = l10n_util::GetStringFUTF16(IDS_CERT_ERROR_WEAK_KEY_DETAILS,
|
| + UTF8ToUTF16(request_url.host()));
|
| + short_description =
|
| + l10n_util::GetStringUTF16(IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION);
|
| case CERT_NAME_CONSTRAINT_VIOLATION:
|
| details = l10n_util::GetStringFUTF16(
|
| IDS_CERT_ERROR_NAME_CONSTRAINT_VIOLATION_DETAILS,
|
| @@ -153,9 +149,9 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| break;
|
| case CERT_PINNED_KEY_MISSING:
|
| details = l10n_util::GetStringUTF16(
|
| - IDS_ERRORPAGES_SUMMARY_PINNING_FAILURE);
|
| + IDS_CERT_ERROR_SUMMARY_PINNING_FAILURE_DETAILS);
|
| short_description = l10n_util::GetStringUTF16(
|
| - IDS_ERRORPAGES_DETAILS_PINNING_FAILURE);
|
| + IDS_CERT_ERROR_SUMMARY_PINNING_FAILURE_DESCRIPTION);
|
| break;
|
| case CERT_UNABLE_TO_CHECK_REVOCATION:
|
| details = l10n_util::GetStringUTF16(
|
| @@ -171,14 +167,13 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type,
|
| default:
|
| NOTREACHED();
|
| }
|
| - return SSLErrorInfo(details, short_description);
|
| + return ErrorInfo(details, short_description);
|
| }
|
|
|
| -SSLErrorInfo::~SSLErrorInfo() {
|
| -}
|
| +ErrorInfo::~ErrorInfo() {}
|
|
|
| // static
|
| -SSLErrorInfo::ErrorType SSLErrorInfo::NetErrorToErrorType(int net_error) {
|
| +ErrorInfo::ErrorType ErrorInfo::NetErrorToErrorType(int net_error) {
|
| switch (net_error) {
|
| case net::ERR_CERT_COMMON_NAME_INVALID:
|
| return CERT_COMMON_NAME_INVALID;
|
| @@ -211,14 +206,15 @@ SSLErrorInfo::ErrorType SSLErrorInfo::NetErrorToErrorType(int net_error) {
|
| default:
|
| NOTREACHED();
|
| return UNKNOWN;
|
| - }
|
| + }
|
| }
|
|
|
| // static
|
| -void SSLErrorInfo::GetErrorsForCertStatus(int cert_id,
|
| - net::CertStatus cert_status,
|
| - const GURL& url,
|
| - std::vector<SSLErrorInfo>* errors) {
|
| +void ErrorInfo::GetErrorsForCertStatus(
|
| + const scoped_refptr<net::X509Certificate>& cert,
|
| + net::CertStatus cert_status,
|
| + const GURL& url,
|
| + std::vector<ErrorInfo>* errors) {
|
| const net::CertStatus kErrorFlags[] = {
|
| net::CERT_STATUS_COMMON_NAME_INVALID,
|
| net::CERT_STATUS_DATE_INVALID,
|
| @@ -248,18 +244,12 @@ void SSLErrorInfo::GetErrorsForCertStatus(int cert_id,
|
| };
|
| DCHECK(arraysize(kErrorFlags) == arraysize(kErrorTypes));
|
|
|
| - scoped_refptr<net::X509Certificate> cert = NULL;
|
| for (size_t i = 0; i < arraysize(kErrorFlags); ++i) {
|
| - if (cert_status & kErrorFlags[i]) {
|
| - if (!cert.get()) {
|
| - bool r = content::CertStore::GetInstance()->RetrieveCert(
|
| - cert_id, &cert);
|
| - DCHECK(r);
|
| - }
|
| - if (errors) {
|
| - errors->push_back(
|
| - SSLErrorInfo::CreateError(kErrorTypes[i], cert.get(), url));
|
| - }
|
| + if ((cert_status & kErrorFlags[i]) && errors) {
|
| + errors->push_back(
|
| + ErrorInfo::CreateError(kErrorTypes[i], cert.get(), url));
|
| }
|
| }
|
| }
|
| +
|
| +} // namespace ssl_errors
|
|
|