| Index: chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| index e7c25a71c9fee762ae797a29b008fb0b80bc054d..16508c07c1050fb7118b46f87e8db4f20520b59e 100644
|
| --- a/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| +++ b/chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc
|
| @@ -918,8 +918,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
|
|
| // Visit an (otherwise valid) HTTPS page that displays mixed content.
|
| std::string replacement_path;
|
| @@ -941,8 +941,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_TRUE(mixed_content_explanation.displayed_insecure_content);
|
| - EXPECT_FALSE(mixed_content_explanation.ran_insecure_content);
|
| + EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content);
|
| + EXPECT_FALSE(mixed_content_explanation.ran_mixed_content);
|
| EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED,
|
| mixed_content_explanation.displayed_insecure_content_style);
|
| EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN,
|
| @@ -962,8 +962,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
|
|
| // Before clicking through, navigate to a different page, and then go
|
| // back to the interstitial.
|
| @@ -979,8 +979,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
|
|
| // After going back to the interstitial, an event for a broken lock
|
| // icon should fire again.
|
| @@ -993,8 +993,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
|
|
| // Since the next expected style is the same as the previous, clear
|
| // the observer (to make sure that the event fires twice and we don't
|
| @@ -1011,8 +1011,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest, SecurityStyleChangedObserver) {
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| }
|
|
|
| // Visit a valid HTTPS page, then a broken HTTPS page, and then go back,
|
| @@ -1053,8 +1053,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest,
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
|
|
| // Navigate to a bad HTTPS page on a different host, and then click
|
| // Back to verify that the previous good security style is seen again.
|
| @@ -1079,8 +1079,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest,
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
|
|
| content::WindowedNotificationObserver back_nav_load_observer(
|
| content::NOTIFICATION_LOAD_STOP,
|
| @@ -1099,8 +1099,8 @@ IN_PROC_BROWSER_TEST_F(SecurityStyleChangedTest,
|
| EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
|
| EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
|
| EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
|
| - EXPECT_FALSE(observer.latest_explanations().displayed_insecure_content);
|
| - EXPECT_FALSE(observer.latest_explanations().ran_insecure_content);
|
| + EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
|
| + EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
|
| }
|
|
|
| // After AddNonsecureUrlHandler() is called, requests to this hostname
|
|
|