Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(5965)

Unified Diff: chrome/browser/ssl/ssl_error_classification.h

Issue 400323002: Refactor the captive portal code to move from the ssl_blocking_page class to the ssl_error_classific (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Removed arguments from functions Created 6 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/ssl/ssl_error_classification.h
diff --git a/chrome/browser/ssl/ssl_error_classification.h b/chrome/browser/ssl/ssl_error_classification.h
index dec1ed295901132ded88faf46f12ea52300a663d..9ccbe52fca94176ec20c3ed1f80b001378b18c63 100644
--- a/chrome/browser/ssl/ssl_error_classification.h
+++ b/chrome/browser/ssl/ssl_error_classification.h
@@ -9,17 +9,25 @@
#include <vector>
#include "base/time/time.h"
+#include "content/public/browser/notification_observer.h"
+#include "content/public/browser/notification_registrar.h"
#include "net/cert/x509_certificate.h"
#include "url/gurl.h"
+namespace content {
+class WebContents;
+}
+
// This class calculates the severity scores for the different type of SSL
// errors.
-class SSLErrorClassification {
+class SSLErrorClassification : public content::NotificationObserver {
public:
- SSLErrorClassification(const base::Time& current_time,
+ SSLErrorClassification(content::WebContents* web_contents,
+ const base::Time& current_time,
const GURL& url,
+ int cert_error,
const net::X509Certificate& cert);
- ~SSLErrorClassification();
+ virtual ~SSLErrorClassification();
// Returns true if the system time is in the past.
static bool IsUserClockInThePast(const base::Time& time_now);
@@ -31,18 +39,19 @@ class SSLErrorClassification {
static bool IsWindowsVersionSP3OrLower();
// A function which calculates the severity score when the ssl error is
- // CERT_DATE_INVALID, returns a score between 0.0 and 1.0, higher values
+ // CERT_DATE_INVALID, calculates a score between 0.0 and 1.0, higher values
// being more severe, indicating how severe the certificate's invalid
// date error is.
- float InvalidDateSeverityScore(int cert_error) const;
+ void InvalidDateSeverityScore() const;
// A function which calculates the severity score when the ssl error is
- // when the SSL error is |CERT_COMMON_NAME_INVALID|, returns a score between
+ // when the SSL error is |CERT_COMMON_NAME_INVALID|, calcualates a score
// between 0.0 and 1.0, higher values being more severe, indicating how
// severe the certificate's common name invalid error is.
- float InvalidCommonNameSeverityScore(int cert_error) const;
+ void InvalidCommonNameSeverityScore() const;
- void RecordUMAStatistics(bool overridable, int cert_error);
+ void RecordUMAStatistics(bool overridable) const;
+ void RecordCaptivePortalUMAStatistics(bool overridable) const;
base::TimeDelta TimePassedSinceExpiry() const;
private:
@@ -84,8 +93,6 @@ class SSLErrorClassification {
// b.example.com ~ *.example.com --> false
bool IsSubDomainOutsideWildcard(const Tokens& hostname) const;
- float CalculateScoreTimePassedSinceExpiry() const;
-
static std::vector<Tokens> GetTokenizedDNSNames(
const std::vector<std::string>& dns_names);
@@ -103,13 +110,32 @@ class SSLErrorClassification {
static Tokens Tokenize(const std::string& name);
+ float CalculateScoreTimePassedSinceExpiry() const;
+ float CalculateScoreEnvironments() const;
+
+ // content::NotificationObserver:
+ virtual void Observe(
+ int type,
+ const content::NotificationSource& source,
+ const content::NotificationDetails& details) OVERRIDE;
+
+ content::WebContents* web_contents_;
// This stores the current time.
base::Time current_time_;
-
const GURL& request_url_;
-
+ int cert_error_;
// This stores the certificate.
const net::X509Certificate& cert_;
+ // Is captive portal detection enabled?
+ bool captive_portal_detection_enabled_;
+ // Did the probe complete before the interstitial was closed?
+ bool captive_portal_probe_completed_;
+ // Did the captive portal probe receive an error or get a non-HTTP response?
+ bool captive_portal_no_response_;
+ // Was a captive portal detected?
+ bool captive_portal_detected_;
+
+ content::NotificationRegistrar registrar_;
};
#endif // CHROME_BROWSER_SSL_SSL_ERROR_CLASSIFICATION_H_

Powered by Google App Engine
This is Rietveld 408576698