Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(305)

Side by Side Diff: components/security_state/security_state_model.cc

Issue 2327433002: Stop using CertStore which is not compatible with PlzNavigate. (Closed)
Patch Set: remove cert_store on ios Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "components/security_state/security_state_model.h" 5 #include "components/security_state/security_state_model.h"
6 6
7 #include <stdint.h> 7 #include <stdint.h>
8 8
9 #include "base/command_line.h" 9 #include "base/command_line.h"
10 #include "base/metrics/field_trial.h" 10 #include "base/metrics/field_trial.h"
(...skipping 177 matching lines...) Expand 10 before | Expand all | Expand 10 after
188 visible_security_state.fails_malware_check; 188 visible_security_state.fails_malware_check;
189 if (security_info->fails_malware_check) { 189 if (security_info->fails_malware_check) {
190 security_info->security_level = GetSecurityLevelForRequest( 190 security_info->security_level = GetSecurityLevelForRequest(
191 visible_security_state, client, cert, 191 visible_security_state, client, cert,
192 SecurityStateModel::UNKNOWN_SHA1, 192 SecurityStateModel::UNKNOWN_SHA1,
193 SecurityStateModel::CONTENT_STATUS_UNKNOWN, 193 SecurityStateModel::CONTENT_STATUS_UNKNOWN,
194 SecurityStateModel::CONTENT_STATUS_UNKNOWN); 194 SecurityStateModel::CONTENT_STATUS_UNKNOWN);
195 } 195 }
196 return; 196 return;
197 } 197 }
198 security_info->cert_id = visible_security_state.cert_id; 198 security_info->certificate = visible_security_state.certificate;
199 security_info->sha1_deprecation_status = 199 security_info->sha1_deprecation_status =
200 GetSHA1DeprecationStatus(cert, visible_security_state); 200 GetSHA1DeprecationStatus(cert, visible_security_state);
201 security_info->mixed_content_status = 201 security_info->mixed_content_status =
202 GetContentStatus(visible_security_state.displayed_mixed_content, 202 GetContentStatus(visible_security_state.displayed_mixed_content,
203 visible_security_state.ran_mixed_content); 203 visible_security_state.ran_mixed_content);
204 security_info->content_with_cert_errors_status = GetContentStatus( 204 security_info->content_with_cert_errors_status = GetContentStatus(
205 visible_security_state.displayed_content_with_cert_errors, 205 visible_security_state.displayed_content_with_cert_errors,
206 visible_security_state.ran_content_with_cert_errors); 206 visible_security_state.ran_content_with_cert_errors);
207 security_info->security_bits = visible_security_state.security_bits; 207 security_info->security_bits = visible_security_state.security_bits;
208 security_info->connection_status = visible_security_state.connection_status; 208 security_info->connection_status = visible_security_state.connection_status;
(...skipping 26 matching lines...) Expand all
235 SecurityStateModel::SECURITY_ERROR; 235 SecurityStateModel::SECURITY_ERROR;
236 236
237 SecurityStateModel::SecurityInfo::SecurityInfo() 237 SecurityStateModel::SecurityInfo::SecurityInfo()
238 : security_level(SecurityStateModel::NONE), 238 : security_level(SecurityStateModel::NONE),
239 fails_malware_check(false), 239 fails_malware_check(false),
240 sha1_deprecation_status(SecurityStateModel::NO_DEPRECATED_SHA1), 240 sha1_deprecation_status(SecurityStateModel::NO_DEPRECATED_SHA1),
241 mixed_content_status(SecurityStateModel::CONTENT_STATUS_NONE), 241 mixed_content_status(SecurityStateModel::CONTENT_STATUS_NONE),
242 content_with_cert_errors_status(SecurityStateModel::CONTENT_STATUS_NONE), 242 content_with_cert_errors_status(SecurityStateModel::CONTENT_STATUS_NONE),
243 scheme_is_cryptographic(false), 243 scheme_is_cryptographic(false),
244 cert_status(0), 244 cert_status(0),
245 cert_id(0),
246 security_bits(-1), 245 security_bits(-1),
247 connection_status(0), 246 connection_status(0),
248 obsolete_ssl_status(net::OBSOLETE_SSL_NONE), 247 obsolete_ssl_status(net::OBSOLETE_SSL_NONE),
249 pkp_bypassed(false) {} 248 pkp_bypassed(false) {}
250 249
251 SecurityStateModel::SecurityInfo::~SecurityInfo() {} 250 SecurityStateModel::SecurityInfo::~SecurityInfo() {}
252 251
253 SecurityStateModel::SecurityStateModel() {} 252 SecurityStateModel::SecurityStateModel() {}
254 253
255 SecurityStateModel::~SecurityStateModel() {} 254 SecurityStateModel::~SecurityStateModel() {}
(...skipping 25 matching lines...) Expand all
281 } 280 }
282 281
283 void SecurityStateModel::SetClient(SecurityStateModelClient* client) { 282 void SecurityStateModel::SetClient(SecurityStateModelClient* client) {
284 client_ = client; 283 client_ = client;
285 } 284 }
286 285
287 SecurityStateModel::VisibleSecurityState::VisibleSecurityState() 286 SecurityStateModel::VisibleSecurityState::VisibleSecurityState()
288 : initial_security_level(SecurityStateModel::NONE), 287 : initial_security_level(SecurityStateModel::NONE),
289 fails_malware_check(false), 288 fails_malware_check(false),
290 connection_info_initialized(false), 289 connection_info_initialized(false),
291 cert_id(0),
292 cert_status(0), 290 cert_status(0),
293 connection_status(0), 291 connection_status(0),
294 security_bits(-1), 292 security_bits(-1),
295 displayed_mixed_content(false), 293 displayed_mixed_content(false),
296 ran_mixed_content(false), 294 ran_mixed_content(false),
297 displayed_content_with_cert_errors(false), 295 displayed_content_with_cert_errors(false),
298 ran_content_with_cert_errors(false), 296 ran_content_with_cert_errors(false),
299 pkp_bypassed(false) {} 297 pkp_bypassed(false) {}
300 298
301 SecurityStateModel::VisibleSecurityState::~VisibleSecurityState() {} 299 SecurityStateModel::VisibleSecurityState::~VisibleSecurityState() {}
302 300
303 bool SecurityStateModel::VisibleSecurityState::operator==( 301 bool SecurityStateModel::VisibleSecurityState::operator==(
304 const SecurityStateModel::VisibleSecurityState& other) const { 302 const SecurityStateModel::VisibleSecurityState& other) const {
305 return (url == other.url && 303 return (url == other.url &&
306 initial_security_level == other.initial_security_level && 304 initial_security_level == other.initial_security_level &&
307 fails_malware_check == other.fails_malware_check && 305 fails_malware_check == other.fails_malware_check &&
308 cert_id == other.cert_id && cert_status == other.cert_status && 306 !!certificate == !!other.certificate &&
307 (certificate ? certificate->Equals(other.certificate.get()) : true) &&
309 connection_status == other.connection_status && 308 connection_status == other.connection_status &&
310 security_bits == other.security_bits && 309 security_bits == other.security_bits &&
311 sct_verify_statuses == other.sct_verify_statuses && 310 sct_verify_statuses == other.sct_verify_statuses &&
312 displayed_mixed_content == other.displayed_mixed_content && 311 displayed_mixed_content == other.displayed_mixed_content &&
313 ran_mixed_content == other.ran_mixed_content && 312 ran_mixed_content == other.ran_mixed_content &&
314 displayed_content_with_cert_errors == 313 displayed_content_with_cert_errors ==
315 other.displayed_content_with_cert_errors && 314 other.displayed_content_with_cert_errors &&
316 ran_content_with_cert_errors == other.ran_content_with_cert_errors && 315 ran_content_with_cert_errors == other.ran_content_with_cert_errors &&
317 pkp_bypassed == other.pkp_bypassed); 316 pkp_bypassed == other.pkp_bypassed);
318 } 317 }
319 318
320 } // namespace security_state 319 } // namespace security_state
OLDNEW
« no previous file with comments | « components/security_state/security_state_model.h ('k') | components/security_state/security_state_model_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698