| Index: chrome/browser/ui/browser.cc
|
| diff --git a/chrome/browser/ui/browser.cc b/chrome/browser/ui/browser.cc
|
| index 95e708d8fa7770fd27508d842b610099a66fdb67..1111a4f1d1606a203dbb55411fc5c76f0e47a1a1 100644
|
| --- a/chrome/browser/ui/browser.cc
|
| +++ b/chrome/browser/ui/browser.cc
|
| @@ -189,8 +189,6 @@
|
| #include "content/public/browser/render_view_host.h"
|
| #include "content/public/browser/render_widget_host.h"
|
| #include "content/public/browser/render_widget_host_view.h"
|
| -#include "content/public/browser/security_style_explanation.h"
|
| -#include "content/public/browser/security_style_explanations.h"
|
| #include "content/public/browser/site_instance.h"
|
| #include "content/public/browser/user_metrics.h"
|
| #include "content/public/browser/web_contents.h"
|
| @@ -269,28 +267,6 @@ bool IsFastTabUnloadEnabled() {
|
| switches::kEnableFastUnload);
|
| }
|
|
|
| -// Note: This is a lossy operation. Not all of the policies that can be
|
| -// expressed by a SecurityLevel (a //chrome concept) can be expressed by
|
| -// a content::SecurityStyle.
|
| -content::SecurityStyle SecurityLevelToSecurityStyle(
|
| - SecurityStateModel::SecurityLevel security_level) {
|
| - switch (security_level) {
|
| - case SecurityStateModel::NONE:
|
| - return content::SECURITY_STYLE_UNAUTHENTICATED;
|
| - case SecurityStateModel::SECURITY_WARNING:
|
| - case SecurityStateModel::SECURITY_POLICY_WARNING:
|
| - return content::SECURITY_STYLE_WARNING;
|
| - case SecurityStateModel::EV_SECURE:
|
| - case SecurityStateModel::SECURE:
|
| - return content::SECURITY_STYLE_AUTHENTICATED;
|
| - case SecurityStateModel::SECURITY_ERROR:
|
| - return content::SECURITY_STYLE_AUTHENTICATION_BROKEN;
|
| - }
|
| -
|
| - NOTREACHED();
|
| - return content::SECURITY_STYLE_UNKNOWN;
|
| -}
|
| -
|
| } // namespace
|
|
|
| ////////////////////////////////////////////////////////////////////////////////
|
| @@ -1320,98 +1296,8 @@ content::SecurityStyle Browser::GetSecurityStyle(
|
| ChromeSecurityStateModelClient* model_client =
|
| ChromeSecurityStateModelClient::FromWebContents(web_contents);
|
| DCHECK(model_client);
|
| - const SecurityStateModel::SecurityInfo& security_info =
|
| - model_client->GetSecurityInfo();
|
| -
|
| - const content::SecurityStyle security_style =
|
| - SecurityLevelToSecurityStyle(security_info.security_level);
|
| -
|
| - security_style_explanations->ran_insecure_content_style =
|
| - SecurityLevelToSecurityStyle(
|
| - SecurityStateModel::kRanInsecureContentLevel);
|
| - security_style_explanations->displayed_insecure_content_style =
|
| - SecurityLevelToSecurityStyle(
|
| - SecurityStateModel::kDisplayedInsecureContentLevel);
|
| -
|
| - // Check if the page is HTTP; if so, no explanations are needed. Note
|
| - // that SECURITY_STYLE_UNAUTHENTICATED does not necessarily mean that
|
| - // the page is loaded over HTTP, because the security style merely
|
| - // represents how the embedder wishes to display the security state of
|
| - // the page, and the embedder can choose to display HTTPS page as HTTP
|
| - // if it wants to (for example, displaying deprecated crypto
|
| - // algorithms with the same UI treatment as HTTP pages).
|
| - security_style_explanations->scheme_is_cryptographic =
|
| - security_info.scheme_is_cryptographic;
|
| - if (!security_info.scheme_is_cryptographic) {
|
| - return security_style;
|
| - }
|
| -
|
| - if (security_info.sha1_deprecation_status ==
|
| - SecurityStateModel::DEPRECATED_SHA1_MAJOR) {
|
| - security_style_explanations->broken_explanations.push_back(
|
| - content::SecurityStyleExplanation(
|
| - l10n_util::GetStringUTF8(IDS_MAJOR_SHA1),
|
| - l10n_util::GetStringUTF8(IDS_MAJOR_SHA1_DESCRIPTION),
|
| - security_info.cert_id));
|
| - } else if (security_info.sha1_deprecation_status ==
|
| - SecurityStateModel::DEPRECATED_SHA1_MINOR) {
|
| - security_style_explanations->unauthenticated_explanations.push_back(
|
| - content::SecurityStyleExplanation(
|
| - l10n_util::GetStringUTF8(IDS_MINOR_SHA1),
|
| - l10n_util::GetStringUTF8(IDS_MINOR_SHA1_DESCRIPTION),
|
| - security_info.cert_id));
|
| - }
|
| -
|
| - security_style_explanations->ran_insecure_content =
|
| - security_info.mixed_content_status ==
|
| - SecurityStateModel::RAN_MIXED_CONTENT ||
|
| - security_info.mixed_content_status ==
|
| - SecurityStateModel::RAN_AND_DISPLAYED_MIXED_CONTENT;
|
| - security_style_explanations->displayed_insecure_content =
|
| - security_info.mixed_content_status ==
|
| - SecurityStateModel::DISPLAYED_MIXED_CONTENT ||
|
| - security_info.mixed_content_status ==
|
| - SecurityStateModel::RAN_AND_DISPLAYED_MIXED_CONTENT;
|
| -
|
| - if (net::IsCertStatusError(security_info.cert_status)) {
|
| - base::string16 error_string = base::UTF8ToUTF16(net::ErrorToString(
|
| - net::MapCertStatusToNetError(security_info.cert_status)));
|
| -
|
| - content::SecurityStyleExplanation explanation(
|
| - l10n_util::GetStringUTF8(IDS_CERTIFICATE_CHAIN_ERROR),
|
| - l10n_util::GetStringFUTF8(
|
| - IDS_CERTIFICATE_CHAIN_ERROR_DESCRIPTION_FORMAT, error_string),
|
| - security_info.cert_id);
|
| -
|
| - if (net::IsCertStatusMinorError(security_info.cert_status))
|
| - security_style_explanations->unauthenticated_explanations.push_back(
|
| - explanation);
|
| - else
|
| - security_style_explanations->broken_explanations.push_back(explanation);
|
| - } else {
|
| - // If the certificate does not have errors and is not using
|
| - // deprecated SHA1, then add an explanation that the certificate is
|
| - // valid.
|
| - if (security_info.sha1_deprecation_status ==
|
| - SecurityStateModel::NO_DEPRECATED_SHA1) {
|
| - security_style_explanations->secure_explanations.push_back(
|
| - content::SecurityStyleExplanation(
|
| - l10n_util::GetStringUTF8(IDS_VALID_SERVER_CERTIFICATE),
|
| - l10n_util::GetStringUTF8(
|
| - IDS_VALID_SERVER_CERTIFICATE_DESCRIPTION),
|
| - security_info.cert_id));
|
| - }
|
| - }
|
| -
|
| - if (security_info.is_secure_protocol_and_ciphersuite) {
|
| - security_style_explanations->secure_explanations.push_back(
|
| - content::SecurityStyleExplanation(
|
| - l10n_util::GetStringUTF8(IDS_SECURE_PROTOCOL_AND_CIPHERSUITE),
|
| - l10n_util::GetStringUTF8(
|
| - IDS_SECURE_PROTOCOL_AND_CIPHERSUITE_DESCRIPTION)));
|
| - }
|
| -
|
| - return security_style;
|
| + return model_client->GetSecurityStyle(model_client->GetSecurityInfo(),
|
| + security_style_explanations);
|
| }
|
|
|
| void Browser::ShowCertificateViewerInDevTools(
|
|
|