Index: chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.h |
diff --git a/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.h b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..8c5d13f46c5fc46bf24071aaec93ab29f608ee23 |
--- /dev/null |
+++ b/chrome/browser/safe_browsing/incident_reporting/blacklist_load_analyzer.h |
@@ -0,0 +1,29 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef CHROME_BROWSER_SAFE_BROWSING_INCIDENT_REPORTING_BLACKLIST_LOAD_ANALYZER_H_ |
+#define CHROME_BROWSER_SAFE_BROWSING_INCIDENT_REPORTING_BLACKLIST_LOAD_ANALYZER_H_ |
+ |
+#include <vector> |
+ |
+#include "base/strings/string16.h" |
+#include "chrome/browser/safe_browsing/incident_reporting/add_incident_callback.h" |
+ |
+namespace safe_browsing { |
+ |
+// Registers a process-wide analysis with the incident reporting service that |
+// will examine how effective the blacklist was. |
+void RegisterBlacklistLoadAnalysis(); |
+ |
+// Retrieves the set of blacklisted modules that are loaded in the process. |
+// Returns true if successful, false otherwise. |
+bool GetLoadedBlacklistedModules(std::vector<base::string16>* module_names); |
+ |
+// Callback to pass to the incident reporting service. The incident reporting |
+// service will decide when to start the analysis. |
+void VerifyBlacklistLoadState(const AddIncidentCallback& callback); |
+ |
+} // namespace safe_browsing |
+ |
+#endif // CHROME_BROWSER_SAFE_BROWSING_INCIDENT_REPORTING_BLACKLIST_LOAD_ANALYZER_H_ |