Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(269)

Side by Side Diff: chrome/browser/ssl/chrome_security_state_model_client.cc

Issue 2208073002: DO NOT REVIEW: Certificate Transparency: Extend SCT verify result enum. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: CT: Formatting and compilation fixes. Created 4 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h"
6 6
7 #include "base/command_line.h" 7 #include "base/command_line.h"
8 #include "base/metrics/field_trial.h" 8 #include "base/metrics/field_trial.h"
9 #include "base/metrics/histogram_macros.h" 9 #include "base/metrics/histogram_macros.h"
10 #include "base/strings/utf_string_conversions.h" 10 #include "base/strings/utf_string_conversions.h"
(...skipping 228 matching lines...) Expand 10 before | Expand all | Expand 10 after
239 state->cert_id = ssl.cert_id; 239 state->cert_id = ssl.cert_id;
240 state->cert_status = ssl.cert_status; 240 state->cert_status = ssl.cert_status;
241 state->connection_status = ssl.connection_status; 241 state->connection_status = ssl.connection_status;
242 state->security_bits = ssl.security_bits; 242 state->security_bits = ssl.security_bits;
243 state->pkp_bypassed = ssl.pkp_bypassed; 243 state->pkp_bypassed = ssl.pkp_bypassed;
244 state->sct_verify_statuses.clear(); 244 state->sct_verify_statuses.clear();
245 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), 245 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(),
246 ssl.num_unknown_scts, 246 ssl.num_unknown_scts,
247 net::ct::SCT_STATUS_LOG_UNKNOWN); 247 net::ct::SCT_STATUS_LOG_UNKNOWN);
248 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), 248 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(),
249 ssl.num_invalid_scts, 249 ssl.num_scts_invalid_signature,
250 net::ct::SCT_STATUS_INVALID); 250 net::ct::SCT_STATUS_INVALID_SIGNATURE);
251 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(),
252 ssl.num_scts_invalid_timestamp,
253 net::ct::SCT_STATUS_INVALID_TIMESTAMP);
251 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(), 254 state->sct_verify_statuses.insert(state->sct_verify_statuses.end(),
252 ssl.num_valid_scts, net::ct::SCT_STATUS_OK); 255 ssl.num_valid_scts, net::ct::SCT_STATUS_OK);
253 state->displayed_mixed_content = 256 state->displayed_mixed_content =
254 (ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT) 257 (ssl.content_status & content::SSLStatus::DISPLAYED_INSECURE_CONTENT)
255 ? true 258 ? true
256 : false; 259 : false;
257 state->ran_mixed_content = 260 state->ran_mixed_content =
258 (ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT) ? true 261 (ssl.content_status & content::SSLStatus::RAN_INSECURE_CONTENT) ? true
259 : false; 262 : false;
260 } 263 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698