// Copyright 2015 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. // // Helper functions for SafeBrowsingApiHandlerImpl. Separated out for tests. #ifndef CHROME_BROWSER_SAFE_BROWSING_SAFE_BROWSING_API_HANDLER_UTIL_H_ #define CHROME_BROWSER_SAFE_BROWSING_SAFE_BROWSING_API_HANDLER_UTIL_H_ #include #include "chrome/browser/safe_browsing/safe_browsing_util.h" namespace safe_browsing { // These match what SafeBrowsingApiHandler.java uses for |resultStatus| enum RemoteCallResultStatus { RESULT_STATUS_INTERNAL_ERROR = -1, RESULT_STATUS_SUCCESS = 0, RESULT_STATUS_TIMEOUT = 1, }; // Threat types as per the Java code. // This must match those in GMS's SafeBrowsingThreatTypes.java. enum JavaThreatTypes { JAVA_THREAT_TYPE_POTENTIALLY_HARMFUL_APPLICATION = 4, JAVA_THREAT_TYPE_SOCIAL_ENGINEERING = 5, }; // Do not reorder or delete entries, and make sure changes here are reflected // in SB2RemoteCallResult histogram. enum UmaRemoteCallResult { UMA_STATUS_INTERNAL_ERROR = 0, UMA_STATUS_TIMEOUT = 1, UMA_STATUS_SAFE = 2, UMA_STATUS_UNSAFE = 3, UMA_STATUS_JSON_EMPTY = 4, UMA_STATUS_JSON_FAILED_TO_PARSE = 5, UMA_STATUS_JSON_UNKNOWN_THREAT = 6, UMA_STATUS_UNSUPPORTED = 7, UMA_STATUS_MAX_VALUE }; // This parses the JSON from the GMSCore API and then: // 1) Picks the most severe threat type // 2) Parses remaining key/value pairs into a MalwarePatternType PB // so DisplayBlockingPage() can unmarshal it. We make this string // is binary compatible with the Pver3 API's metadata string even // though it comes from Pver4. // // If anything fails to parse, this sets the threat to "safe". The caller // should report the return value via UMA. UmaRemoteCallResult ParseJsonToThreatAndPB(const std::string& metadata_str, SBThreatType* worst_threat, std::string* metadata_pb_str); } // namespace safe_browsing #endif // CHROME_BROWSER_SAFE_BROWSING_SAFE_BROWSING_API_HANDLER_UTIL_H_