Chromium Code Reviews| Index: chrome/browser/ssl/ssl_error_classification.h |
| diff --git a/chrome/browser/ssl/ssl_error_classification.h b/chrome/browser/ssl/ssl_error_classification.h |
| index dec1ed295901132ded88faf46f12ea52300a663d..9ccbe52fca94176ec20c3ed1f80b001378b18c63 100644 |
| --- a/chrome/browser/ssl/ssl_error_classification.h |
| +++ b/chrome/browser/ssl/ssl_error_classification.h |
| @@ -9,17 +9,25 @@ |
| #include <vector> |
| #include "base/time/time.h" |
| +#include "content/public/browser/notification_observer.h" |
| +#include "content/public/browser/notification_registrar.h" |
| #include "net/cert/x509_certificate.h" |
| #include "url/gurl.h" |
| +namespace content { |
| +class WebContents; |
| +} |
| + |
| // This class calculates the severity scores for the different type of SSL |
|
palmer
2014/08/07 23:48:37
Now that it extends |NotificationObserver|, this c
radhikabhar
2014/08/08 00:19:43
Done.
|
| // errors. |
| -class SSLErrorClassification { |
| +class SSLErrorClassification : public content::NotificationObserver { |
| public: |
| - SSLErrorClassification(const base::Time& current_time, |
| + SSLErrorClassification(content::WebContents* web_contents, |
| + const base::Time& current_time, |
| const GURL& url, |
| + int cert_error, |
| const net::X509Certificate& cert); |
| - ~SSLErrorClassification(); |
| + virtual ~SSLErrorClassification(); |
| // Returns true if the system time is in the past. |
| static bool IsUserClockInThePast(const base::Time& time_now); |
| @@ -31,18 +39,19 @@ class SSLErrorClassification { |
| static bool IsWindowsVersionSP3OrLower(); |
| // A function which calculates the severity score when the ssl error is |
|
palmer
2014/08/07 23:48:37
As before, be more concise in these comments (for
radhikabhar
2014/08/08 00:19:43
Done.
|
| - // CERT_DATE_INVALID, returns a score between 0.0 and 1.0, higher values |
| + // CERT_DATE_INVALID, calculates a score between 0.0 and 1.0, higher values |
| // being more severe, indicating how severe the certificate's invalid |
| // date error is. |
| - float InvalidDateSeverityScore(int cert_error) const; |
| + void InvalidDateSeverityScore() const; |
|
palmer
2014/08/07 23:48:37
How can these functions be all of: void, const, an
radhikabhar
2014/08/08 00:19:43
Done.
|
| // A function which calculates the severity score when the ssl error is |
| - // when the SSL error is |CERT_COMMON_NAME_INVALID|, returns a score between |
| + // when the SSL error is |CERT_COMMON_NAME_INVALID|, calcualates a score |
|
palmer
2014/08/07 23:48:37
Typo: should be "calculates"
|
| // between 0.0 and 1.0, higher values being more severe, indicating how |
| // severe the certificate's common name invalid error is. |
| - float InvalidCommonNameSeverityScore(int cert_error) const; |
| + void InvalidCommonNameSeverityScore() const; |
| - void RecordUMAStatistics(bool overridable, int cert_error); |
| + void RecordUMAStatistics(bool overridable) const; |
| + void RecordCaptivePortalUMAStatistics(bool overridable) const; |
| base::TimeDelta TimePassedSinceExpiry() const; |
| private: |
| @@ -84,8 +93,6 @@ class SSLErrorClassification { |
| // b.example.com ~ *.example.com --> false |
| bool IsSubDomainOutsideWildcard(const Tokens& hostname) const; |
| - float CalculateScoreTimePassedSinceExpiry() const; |
| - |
| static std::vector<Tokens> GetTokenizedDNSNames( |
| const std::vector<std::string>& dns_names); |
| @@ -103,13 +110,32 @@ class SSLErrorClassification { |
| static Tokens Tokenize(const std::string& name); |
| + float CalculateScoreTimePassedSinceExpiry() const; |
| + float CalculateScoreEnvironments() const; |
| + |
| + // content::NotificationObserver: |
| + virtual void Observe( |
| + int type, |
| + const content::NotificationSource& source, |
| + const content::NotificationDetails& details) OVERRIDE; |
| + |
| + content::WebContents* web_contents_; |
| // This stores the current time. |
| base::Time current_time_; |
| - |
| const GURL& request_url_; |
| - |
| + int cert_error_; |
| // This stores the certificate. |
| const net::X509Certificate& cert_; |
| + // Is captive portal detection enabled? |
| + bool captive_portal_detection_enabled_; |
| + // Did the probe complete before the interstitial was closed? |
| + bool captive_portal_probe_completed_; |
| + // Did the captive portal probe receive an error or get a non-HTTP response? |
| + bool captive_portal_no_response_; |
| + // Was a captive portal detected? |
| + bool captive_portal_detected_; |
| + |
| + content::NotificationRegistrar registrar_; |
| }; |
| #endif // CHROME_BROWSER_SSL_SSL_ERROR_CLASSIFICATION_H_ |