Index: chrome/browser/ui/website_settings/website_settings_unittest.cc |
diff --git a/chrome/browser/ui/website_settings/website_settings_unittest.cc b/chrome/browser/ui/website_settings/website_settings_unittest.cc |
index 1bdb92194e06aefc82def18a3ed9dd44f7e099d2..9b0a5af1f95f2d395a541c1a8329ad595d5bdcc5 100644 |
--- a/chrome/browser/ui/website_settings/website_settings_unittest.cc |
+++ b/chrome/browser/ui/website_settings/website_settings_unittest.cc |
@@ -79,7 +79,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
void SetUp() override { |
ChromeRenderViewHostTestHarness::SetUp(); |
// Setup stub SSLStatus. |
- security_info_.security_level = SecurityStateModel::NONE; |
+ security_info_.security_level = security_state::NONE; |
// Create the certificate. |
cert_id_ = 1; |
@@ -123,9 +123,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
MockCertStore* cert_store() { return &cert_store_; } |
int cert_id() { return cert_id_; } |
MockWebsiteSettingsUI* mock_ui() { return mock_ui_.get(); } |
- const SecurityStateModel::SecurityInfo& security_info() { |
- return security_info_; |
- } |
+ const security_state::SecurityInfo& security_info() { return security_info_; } |
TabSpecificContentSettings* tab_specific_content_settings() { |
return TabSpecificContentSettings::FromWebContents(web_contents()); |
} |
@@ -142,7 +140,7 @@ class WebsiteSettingsTest : public ChromeRenderViewHostTestHarness { |
return website_settings_.get(); |
} |
- SecurityStateModel::SecurityInfo security_info_; |
+ security_state::SecurityInfo security_info_; |
private: |
scoped_ptr<WebsiteSettings> website_settings_; |
@@ -288,7 +286,7 @@ TEST_F(WebsiteSettingsTest, HTTPConnection) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSConnection) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -310,13 +308,12 @@ TEST_F(WebsiteSettingsTest, HTTPSConnection) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSPassiveMixedContent) { |
- security_info_.security_level = SecurityStateModel::NONE; |
+ security_info_.security_level = security_state::NONE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
- security_info_.mixed_content_status = |
- SecurityStateModel::DISPLAYED_MIXED_CONTENT; |
+ security_info_.mixed_content_status = security_state::DISPLAYED_MIXED_CONTENT; |
int status = 0; |
status = SetSSLVersion(status, net::SSL_CONNECTION_VERSION_TLS1); |
status = SetSSLCipherSuite(status, CR_TLS_RSA_WITH_AES_256_CBC_SHA256); |
@@ -336,13 +333,13 @@ TEST_F(WebsiteSettingsTest, HTTPSPassiveMixedContent) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSActiveMixedContent) { |
- security_info_.security_level = SecurityStateModel::SECURITY_ERROR; |
+ security_info_.security_level = security_state::SECURITY_ERROR; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
security_info_.security_bits = 81; // No error if > 80. |
security_info_.mixed_content_status = |
- SecurityStateModel::RAN_AND_DISPLAYED_MIXED_CONTENT; |
+ security_state::RAN_AND_DISPLAYED_MIXED_CONTENT; |
int status = 0; |
status = SetSSLVersion(status, net::SSL_CONNECTION_VERSION_TLS1); |
status = SetSSLCipherSuite(status, CR_TLS_RSA_WITH_AES_256_CBC_SHA256); |
@@ -370,13 +367,12 @@ TEST_F(WebsiteSettingsTest, HTTPSEVCert) { |
EXPECT_CALL(*cert_store(), RetrieveCert(ev_cert_id, _)).WillRepeatedly( |
DoAll(SetArgPointee<1>(ev_cert), Return(true))); |
- security_info_.security_level = SecurityStateModel::NONE; |
+ security_info_.security_level = security_state::NONE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = ev_cert_id; |
security_info_.cert_status = net::CERT_STATUS_IS_EV; |
security_info_.security_bits = 81; // No error if > 80. |
- security_info_.mixed_content_status = |
- SecurityStateModel::DISPLAYED_MIXED_CONTENT; |
+ security_info_.mixed_content_status = security_state::DISPLAYED_MIXED_CONTENT; |
int status = 0; |
status = SetSSLVersion(status, net::SSL_CONNECTION_VERSION_TLS1); |
status = SetSSLCipherSuite(status, CR_TLS_RSA_WITH_AES_256_CBC_SHA256); |
@@ -394,7 +390,7 @@ TEST_F(WebsiteSettingsTest, HTTPSEVCert) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSRevocationError) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; |
@@ -415,7 +411,7 @@ TEST_F(WebsiteSettingsTest, HTTPSRevocationError) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSConnectionError) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -436,7 +432,7 @@ TEST_F(WebsiteSettingsTest, HTTPSConnectionError) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSPolicyCertConnection) { |
- security_info_.security_level = SecurityStateModel::SECURITY_POLICY_WARNING; |
+ security_info_.security_level = security_state::SECURITY_POLICY_WARNING; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -457,7 +453,7 @@ TEST_F(WebsiteSettingsTest, HTTPSPolicyCertConnection) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSSHA1Minor) { |
- security_info_.security_level = SecurityStateModel::NONE; |
+ security_info_.security_level = security_state::NONE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -467,7 +463,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Minor) { |
status = SetSSLCipherSuite(status, CR_TLS_RSA_WITH_AES_256_CBC_SHA256); |
security_info_.connection_status = status; |
security_info_.sha1_deprecation_status = |
- SecurityStateModel::DEPRECATED_SHA1_MINOR; |
+ security_state::DEPRECATED_SHA1_MINOR; |
SetDefaultUIExpectations(mock_ui()); |
EXPECT_CALL(*mock_ui(), SetSelectedTab(WebsiteSettingsUI::TAB_ID_CONNECTION)); |
@@ -484,7 +480,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Minor) { |
} |
TEST_F(WebsiteSettingsTest, HTTPSSHA1Major) { |
- security_info_.security_level = SecurityStateModel::NONE; |
+ security_info_.security_level = security_state::NONE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -494,7 +490,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Major) { |
status = SetSSLCipherSuite(status, CR_TLS_RSA_WITH_AES_256_CBC_SHA256); |
security_info_.connection_status = status; |
security_info_.sha1_deprecation_status = |
- SecurityStateModel::DEPRECATED_SHA1_MAJOR; |
+ security_state::DEPRECATED_SHA1_MAJOR; |
SetDefaultUIExpectations(mock_ui()); |
EXPECT_CALL(*mock_ui(), SetSelectedTab(WebsiteSettingsUI::TAB_ID_CONNECTION)); |
@@ -512,7 +508,7 @@ TEST_F(WebsiteSettingsTest, HTTPSSHA1Major) { |
// All SCTs are from unknown logs. |
TEST_F(WebsiteSettingsTest, UnknownSCTs) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -538,7 +534,7 @@ TEST_F(WebsiteSettingsTest, UnknownSCTs) { |
// All SCTs are invalid. |
TEST_F(WebsiteSettingsTest, InvalidSCTs) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -564,7 +560,7 @@ TEST_F(WebsiteSettingsTest, InvalidSCTs) { |
// All SCTs are valid. |
TEST_F(WebsiteSettingsTest, ValidSCTs) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -598,7 +594,7 @@ TEST_F(WebsiteSettingsTest, ValidSCTsEV) { |
EXPECT_CALL(*cert_store(), RetrieveCert(ev_cert_id, _)) |
.WillRepeatedly(DoAll(SetArgPointee<1>(ev_cert), Return(true))); |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = ev_cert_id; |
security_info_.cert_status = net::CERT_STATUS_IS_EV; |
@@ -625,7 +621,7 @@ TEST_F(WebsiteSettingsTest, ValidSCTsEV) { |
// A mix of unknown and invalid SCTs. |
TEST_F(WebsiteSettingsTest, UnknownAndInvalidSCTs) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |
@@ -651,7 +647,7 @@ TEST_F(WebsiteSettingsTest, UnknownAndInvalidSCTs) { |
// At least one SCT is valid and one is from an unknown log. |
TEST_F(WebsiteSettingsTest, ValidAndUnknownSCTs) { |
- security_info_.security_level = SecurityStateModel::SECURE; |
+ security_info_.security_level = security_state::SECURE; |
security_info_.scheme_is_cryptographic = true; |
security_info_.cert_id = cert_id(); |
security_info_.cert_status = 0; |