Index: chrome/browser/ssl/ssl_error_info.cc |
diff --git a/chrome/browser/ssl/ssl_error_info.cc b/chrome/browser/ssl/ssl_error_info.cc |
index b0e4de5c02b52dcbed4c34af405f0fc0dbcc7c44..573784ecfe2ec6d18aef8659bcb9ce89f9188983 100644 |
--- a/chrome/browser/ssl/ssl_error_info.cc |
+++ b/chrome/browser/ssl/ssl_error_info.cc |
@@ -19,26 +19,19 @@ |
using base::UTF8ToUTF16; |
-SSLErrorInfo::SSLErrorInfo(const base::string16& title, |
- const base::string16& details, |
- const base::string16& short_description, |
- const std::vector<base::string16>& extra_info) |
- : title_(title), |
- details_(details), |
- short_description_(short_description), |
- extra_information_(extra_info) { |
+SSLErrorInfo::SSLErrorInfo(const base::string16& details, |
+ const base::string16& short_description) |
+ : details_(details), |
+ short_description_(short_description) { |
} |
// static |
SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type, |
net::X509Certificate* cert, |
const GURL& request_url) { |
- base::string16 title, details, short_description; |
- std::vector<base::string16> extra_info; |
+ base::string16 details, short_description; |
switch (error_type) { |
case CERT_COMMON_NAME_INVALID: { |
- title = |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_COMMON_NAME_INVALID_TITLE); |
// If the certificate contains multiple DNS names, we choose the most |
// representative one -- either the DNS name that's also in the subject |
// field, or the first one. If this heuristic turns out to be |
@@ -62,20 +55,10 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type, |
UTF8ToUTF16(dns_names[i]))); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_COMMON_NAME_INVALID_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back( |
- l10n_util::GetStringFUTF16( |
- IDS_CERT_ERROR_COMMON_NAME_INVALID_EXTRA_INFO_2, |
- net::EscapeForHTML(UTF8ToUTF16(cert->subject().common_name)), |
- UTF8ToUTF16(request_url.host()))); |
break; |
} |
case CERT_DATE_INVALID: |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
if (cert->HasExpired()) { |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXPIRED_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_EXPIRED_DETAILS, |
UTF8ToUTF16(request_url.host()), |
@@ -84,13 +67,10 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type, |
base::TimeFormatFriendlyDate(base::Time::Now())); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXPIRED_DESCRIPTION); |
- extra_info.push_back(l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_EXPIRED_DETAILS_EXTRA_INFO_2)); |
} else { |
// Then it must be not yet valid. We don't check that it is not yet |
// valid as there is still a very unlikely chance that the cert might |
// have become valid since the error occurred. |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_NOT_YET_VALID_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_NOT_YET_VALID_DETAILS, |
UTF8ToUTF16(request_url.host()), |
@@ -98,123 +78,60 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type, |
(cert->valid_start() - base::Time::Now()).InDays())); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_NOT_YET_VALID_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_NOT_YET_VALID_DETAILS_EXTRA_INFO_2)); |
} |
break; |
case CERT_AUTHORITY_INVALID: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_AUTHORITY_INVALID_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_AUTHORITY_INVALID_DETAILS, |
UTF8ToUTF16(request_url.host())); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_AUTHORITY_INVALID_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back(l10n_util::GetStringFUTF16( |
- IDS_CERT_ERROR_AUTHORITY_INVALID_EXTRA_INFO_2, |
- UTF8ToUTF16(request_url.host()), |
- UTF8ToUTF16(request_url.host()))); |
-#if !defined(OS_IOS) |
- // The third paragraph advises users to install a private trust anchor, |
- // but that is not possible in Chrome for iOS at this time. |
- extra_info.push_back(l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_AUTHORITY_INVALID_EXTRA_INFO_3)); |
-#endif |
break; |
case CERT_CONTAINS_ERRORS: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_CONTAINS_ERRORS_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_CONTAINS_ERRORS_DETAILS, |
UTF8ToUTF16(request_url.host())); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_CONTAINS_ERRORS_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back(l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_CONTAINS_ERRORS_EXTRA_INFO_2)); |
break; |
case CERT_NO_REVOCATION_MECHANISM: |
- title = l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_NO_REVOCATION_MECHANISM_TITLE); |
details = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_NO_REVOCATION_MECHANISM_DETAILS); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_NO_REVOCATION_MECHANISM_DESCRIPTION); |
break; |
- case CERT_UNABLE_TO_CHECK_REVOCATION: |
- // TODO(felt): Hasn't this been deprecated? |
- title = l10n_util::GetStringFUTF16( |
- IDS_CERT_ERROR_UNABLE_TO_CHECK_REVOCATION_TITLE, |
- UTF8ToUTF16(request_url.host())); |
- details = l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_UNABLE_TO_CHECK_REVOCATION_DETAILS); |
- short_description = l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_UNABLE_TO_CHECK_REVOCATION_DESCRIPTION); |
- break; |
case CERT_REVOKED: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_REVOKED_CERT_TITLE); |
details = l10n_util::GetStringFUTF16(IDS_CERT_ERROR_REVOKED_CERT_DETAILS, |
UTF8ToUTF16(request_url.host())); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_REVOKED_CERT_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_REVOKED_CERT_EXTRA_INFO_2)); |
break; |
case CERT_INVALID: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_INVALID_CERT_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_INVALID_CERT_DETAILS, |
UTF8ToUTF16(request_url.host())); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_INVALID_CERT_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back(l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_INVALID_CERT_EXTRA_INFO_2)); |
break; |
case CERT_WEAK_SIGNATURE_ALGORITHM: |
- title = l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_WEAK_SIGNATURE_ALGORITHM_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_WEAK_SIGNATURE_ALGORITHM_DETAILS, |
UTF8ToUTF16(request_url.host())); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_WEAK_SIGNATURE_ALGORITHM_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_WEAK_SIGNATURE_ALGORITHM_EXTRA_INFO_2)); |
break; |
case CERT_WEAK_KEY: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_WEAK_KEY_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_WEAK_KEY_DETAILS, UTF8ToUTF16(request_url.host())); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16(IDS_CERT_ERROR_EXTRA_INFO_1)); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_WEAK_KEY_EXTRA_INFO_2)); |
break; |
case CERT_WEAK_KEY_DH: |
- title = l10n_util::GetStringUTF16( |
- IDS_ERRORPAGES_HEADING_WEAK_SERVER_EPHEMERAL_DH_KEY); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_WEAK_KEY_DETAILS, UTF8ToUTF16(request_url.host())); |
short_description = l10n_util::GetStringUTF16( |
IDS_CERT_ERROR_WEAK_KEY_DESCRIPTION); |
- extra_info.push_back( |
- l10n_util::GetStringUTF16( |
- IDS_ERRORPAGES_SUMMARY_WEAK_SERVER_EPHEMERAL_DH_KEY)); |
case CERT_NAME_CONSTRAINT_VIOLATION: |
- title = l10n_util::GetStringUTF16( |
- IDS_CERT_ERROR_NAME_CONSTRAINT_VIOLATION_TITLE); |
details = l10n_util::GetStringFUTF16( |
IDS_CERT_ERROR_NAME_CONSTRAINT_VIOLATION_DETAILS, |
UTF8ToUTF16(request_url.host())); |
@@ -222,22 +139,20 @@ SSLErrorInfo SSLErrorInfo::CreateError(ErrorType error_type, |
IDS_CERT_ERROR_NAME_CONSTRAINT_VIOLATION_DESCRIPTION); |
break; |
case CERT_PINNED_KEY_MISSING: |
- title = l10n_util::GetStringUTF16( |
- IDS_ERRORPAGES_HEADING_PINNING_FAILURE); |
details = l10n_util::GetStringUTF16( |
IDS_ERRORPAGES_SUMMARY_PINNING_FAILURE); |
short_description = l10n_util::GetStringUTF16( |
IDS_ERRORPAGES_DETAILS_PINNING_FAILURE); |
case UNKNOWN: |
- title = l10n_util::GetStringUTF16(IDS_CERT_ERROR_UNKNOWN_ERROR_TITLE); |
details = l10n_util::GetStringUTF16(IDS_CERT_ERROR_UNKNOWN_ERROR_DETAILS); |
short_description = |
l10n_util::GetStringUTF16(IDS_CERT_ERROR_UNKNOWN_ERROR_DESCRIPTION); |
break; |
+ case CERT_UNABLE_TO_CHECK_REVOCATION: // Deprecated. |
default: |
NOTREACHED(); |
} |
- return SSLErrorInfo(title, details, short_description, extra_info); |
+ return SSLErrorInfo(details, short_description); |
} |
SSLErrorInfo::~SSLErrorInfo() { |