| Index: chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| diff --git a/chrome/browser/ui/webui/options/certificate_manager_handler.cc b/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| index 85d6d0f1bf907961db3ce420a424f3f0c79133ce..57e7208dd42c00f0d02021fcd8537ecf050f5da5 100644
|
| --- a/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| +++ b/chrome/browser/ui/webui/options/certificate_manager_handler.cc
|
| @@ -525,14 +525,14 @@ void CertificateManagerHandler::GetCATrust(const ListValue* args) {
|
| return;
|
| }
|
|
|
| - net::CertDatabase::TrustBits trust_bits =
|
| + net::NSSCertDatabase::TrustBits trust_bits =
|
| certificate_manager_model_->cert_db().GetCertTrust(cert, net::CA_CERT);
|
| base::FundamentalValue ssl_value(
|
| - static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_SSL));
|
| + static_cast<bool>(trust_bits & net::NSSCertDatabase::TRUSTED_SSL));
|
| base::FundamentalValue email_value(
|
| - static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_EMAIL));
|
| + static_cast<bool>(trust_bits & net::NSSCertDatabase::TRUSTED_EMAIL));
|
| base::FundamentalValue obj_sign_value(
|
| - static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_OBJ_SIGN));
|
| + static_cast<bool>(trust_bits & net::NSSCertDatabase::TRUSTED_OBJ_SIGN));
|
| web_ui()->CallJavascriptFunction(
|
| "CertificateEditCaTrustOverlay.populateTrust",
|
| ssl_value, email_value, obj_sign_value);
|
| @@ -556,9 +556,9 @@ void CertificateManagerHandler::EditCATrust(const ListValue* args) {
|
| bool result = certificate_manager_model_->SetCertTrust(
|
| cert,
|
| net::CA_CERT,
|
| - trust_ssl * net::CertDatabase::TRUSTED_SSL +
|
| - trust_email * net::CertDatabase::TRUSTED_EMAIL +
|
| - trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN);
|
| + trust_ssl * net::NSSCertDatabase::TRUSTED_SSL +
|
| + trust_email * net::NSSCertDatabase::TRUSTED_EMAIL +
|
| + trust_obj_sign * net::NSSCertDatabase::TRUSTED_OBJ_SIGN);
|
| web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| if (!result) {
|
| // TODO(mattm): better error messages?
|
| @@ -833,11 +833,11 @@ void CertificateManagerHandler::ImportServerFileRead(int read_errno,
|
| return;
|
| }
|
|
|
| - net::CertDatabase::ImportCertFailureList not_imported;
|
| + net::NSSCertDatabase::ImportCertFailureList not_imported;
|
| // TODO(mattm): Add UI for trust. http://crbug.com/76274
|
| bool result = certificate_manager_model_->ImportServerCert(
|
| selected_cert_list_,
|
| - net::CertDatabase::TRUST_DEFAULT,
|
| + net::NSSCertDatabase::TRUST_DEFAULT,
|
| ¬_imported);
|
| if (!result) {
|
| ShowError(
|
| @@ -918,12 +918,12 @@ void CertificateManagerHandler::ImportCATrustSelected(const ListValue* args) {
|
|
|
| // TODO(mattm): add UI for setting explicit distrust, too.
|
| // http://crbug.com/128411
|
| - net::CertDatabase::ImportCertFailureList not_imported;
|
| + net::NSSCertDatabase::ImportCertFailureList not_imported;
|
| bool result = certificate_manager_model_->ImportCACerts(
|
| selected_cert_list_,
|
| - trust_ssl * net::CertDatabase::TRUSTED_SSL +
|
| - trust_email * net::CertDatabase::TRUSTED_EMAIL +
|
| - trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN,
|
| + trust_ssl * net::NSSCertDatabase::TRUSTED_SSL +
|
| + trust_email * net::NSSCertDatabase::TRUSTED_EMAIL +
|
| + trust_obj_sign * net::NSSCertDatabase::TRUSTED_OBJ_SIGN,
|
| ¬_imported);
|
| web_ui()->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
|
| if (!result) {
|
| @@ -1041,7 +1041,7 @@ void CertificateManagerHandler::ShowError(const std::string& title,
|
|
|
| void CertificateManagerHandler::ShowImportErrors(
|
| const std::string& title,
|
| - const net::CertDatabase::ImportCertFailureList& not_imported) const {
|
| + const net::NSSCertDatabase::ImportCertFailureList& not_imported) const {
|
| std::string error;
|
| if (selected_cert_list_.size() == 1)
|
| error = l10n_util::GetStringUTF8(
|
| @@ -1053,7 +1053,7 @@ void CertificateManagerHandler::ShowImportErrors(
|
|
|
| ListValue cert_error_list;
|
| for (size_t i = 0; i < not_imported.size(); ++i) {
|
| - const net::CertDatabase::ImportCertFailure& failure = not_imported[i];
|
| + const net::NSSCertDatabase::ImportCertFailure& failure = not_imported[i];
|
| DictionaryValue* dict = new DictionaryValue;
|
| dict->SetString(kNameId, failure.certificate->subject().GetDisplayName());
|
| dict->SetString(kErrorId, NetErrorToString(failure.net_error));
|
|
|