| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" | 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" |
| 6 | 6 |
| 7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
| 8 #include "base/metrics/field_trial.h" | 8 #include "base/metrics/field_trial.h" |
| 9 #include "base/metrics/histogram_macros.h" | 9 #include "base/metrics/histogram_macros.h" |
| 10 #include "base/strings/utf_string_conversions.h" | 10 #include "base/strings/utf_string_conversions.h" |
| (...skipping 228 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 239 state->cert_id = ssl.cert_id; | 239 state->cert_id = ssl.cert_id; |
| 240 state->cert_status = ssl.cert_status; | 240 state->cert_status = ssl.cert_status; |
| 241 state->connection_status = ssl.connection_status; | 241 state->connection_status = ssl.connection_status; |
| 242 state->security_bits = ssl.security_bits; | 242 state->security_bits = ssl.security_bits; |
| 243 state->pkp_bypassed = ssl.pkp_bypassed; | 243 state->pkp_bypassed = ssl.pkp_bypassed; |
| 244 state->sct_verify_statuses.clear(); | 244 state->sct_verify_statuses.clear(); |
| 245 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), | 245 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), |
| 246 ssl.num_unknown_scts, | 246 ssl.num_unknown_scts, |
| 247 net::ct::SCT_STATUS_LOG_UNKNOWN); | 247 net::ct::SCT_STATUS_LOG_UNKNOWN); |
| 248 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), | 248 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), |
| 249 ssl.num_invalid_scts, | 249 ssl.num_scts_invalid_signature, |
| 250 net::ct::SCT_STATUS_INVALID); | 250 net::ct::SCT_STATUS_INVALID_SIGNATURE); |
| 251 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), |
| 252 ssl.num_scts_invalid_timestamp, |
| 253 net::ct::SCT_STATUS_INVALID_TIMESTAMP); |
| 251 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), | 254 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), |
| 252 ssl.num_valid_scts, net::ct::SCT_STATUS_OK); | 255 ssl.num_valid_scts, net::ct::SCT_STATUS_OK); |
| 253 state->displayed_mixed_content = | 256 state->displayed_mixed_content = |
| 254 (ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT) | 257 (ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT) |
| 255 ? true | 258 ? true |
| 256 : false; | 259 : false; |
| 257 state->ran_mixed_content = | 260 state->ran_mixed_content = |
| 258 (ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT) ? true | 261 (ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT) ? true |
| 259 : false; | 262 : false; |
| 260 } | 263 } |
| OLD | NEW |