Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(119)

Side by Side Diff: chrome/browser/ssl/chrome_security_state_model_client_browser_tests.cc

Issue 2400673003: Remove SSLStatus::security_style member and content::SecurityStyle (Closed)
Patch Set: more curly braces Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h"
6 6
7 #include <openssl/ssl.h> 7 #include <openssl/ssl.h>
8 8
9 #include "base/command_line.h" 9 #include "base/command_line.h"
10 #include "base/files/file_path.h" 10 #include "base/files/file_path.h"
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
66 const base::FilePath::CharType kDocRoot[] = 66 const base::FilePath::CharType kDocRoot[] =
67 FILE_PATH_LITERAL("chrome/test/data"); 67 FILE_PATH_LITERAL("chrome/test/data");
68 68
69 // A WebContentsObserver useful for testing the SecurityStyleChanged() 69 // A WebContentsObserver useful for testing the SecurityStyleChanged()
70 // method: it keeps track of the latest security style and explanation 70 // method: it keeps track of the latest security style and explanation
71 // that was fired. 71 // that was fired.
72 class SecurityStyleTestObserver : public content::WebContentsObserver { 72 class SecurityStyleTestObserver : public content::WebContentsObserver {
73 public: 73 public:
74 explicit SecurityStyleTestObserver(content::WebContents* web_contents) 74 explicit SecurityStyleTestObserver(content::WebContents* web_contents)
75 : content::WebContentsObserver(web_contents), 75 : content::WebContentsObserver(web_contents),
76 latest_security_style_(content::SECURITY_STYLE_UNKNOWN) {} 76 latest_security_style_(blink::WebSecurityStyleUnknown) {}
77 ~SecurityStyleTestObserver() override {} 77 ~SecurityStyleTestObserver() override {}
78 78
79 void SecurityStyleChanged(content::SecurityStyle security_style, 79 void SecurityStyleChanged(blink::WebSecurityStyle security_style,
80 const content::SecurityStyleExplanations& 80 const content::SecurityStyleExplanations&
81 security_style_explanations) override { 81 security_style_explanations) override {
82 latest_security_style_ = security_style; 82 latest_security_style_ = security_style;
83 latest_explanations_ = security_style_explanations; 83 latest_explanations_ = security_style_explanations;
84 } 84 }
85 85
86 content::SecurityStyle latest_security_style() const { 86 blink::WebSecurityStyle latest_security_style() const {
87 return latest_security_style_; 87 return latest_security_style_;
88 } 88 }
89 89
90 const content::SecurityStyleExplanations& latest_explanations() const { 90 const content::SecurityStyleExplanations& latest_explanations() const {
91 return latest_explanations_; 91 return latest_explanations_;
92 } 92 }
93 93
94 void ClearLatestSecurityStyleAndExplanations() { 94 void ClearLatestSecurityStyleAndExplanations() {
95 latest_security_style_ = content::SECURITY_STYLE_UNKNOWN; 95 latest_security_style_ = blink::WebSecurityStyleUnknown;
96 latest_explanations_ = content::SecurityStyleExplanations(); 96 latest_explanations_ = content::SecurityStyleExplanations();
97 } 97 }
98 98
99 private: 99 private:
100 content::SecurityStyle latest_security_style_; 100 blink::WebSecurityStyle latest_security_style_;
101 content::SecurityStyleExplanations latest_explanations_; 101 content::SecurityStyleExplanations latest_explanations_;
102 102
103 DISALLOW_COPY_AND_ASSIGN(SecurityStyleTestObserver); 103 DISALLOW_COPY_AND_ASSIGN(SecurityStyleTestObserver);
104 }; 104 };
105 105
106 // Check that |observer|'s latest event was for an expired certificate 106 // Check that |observer|'s latest event was for an expired certificate
107 // and that it saw the proper SecurityStyle and explanations. 107 // and that it saw the proper SecurityStyle and explanations.
108 void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer, 108 void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer,
109 int error, 109 int error,
110 Browser* browser, 110 Browser* browser,
111 net::X509Certificate* expected_cert) { 111 net::X509Certificate* expected_cert) {
112 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, 112 EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken,
113 observer.latest_security_style()); 113 observer.latest_security_style());
114 114
115 const content::SecurityStyleExplanations& expired_explanation = 115 const content::SecurityStyleExplanations& expired_explanation =
116 observer.latest_explanations(); 116 observer.latest_explanations();
117 EXPECT_EQ(0u, expired_explanation.unauthenticated_explanations.size()); 117 EXPECT_EQ(0u, expired_explanation.unauthenticated_explanations.size());
118 ASSERT_EQ(1u, expired_explanation.broken_explanations.size()); 118 ASSERT_EQ(1u, expired_explanation.broken_explanations.size());
119 EXPECT_FALSE(expired_explanation.pkp_bypassed); 119 EXPECT_FALSE(expired_explanation.pkp_bypassed);
120 EXPECT_TRUE(expired_explanation.info_explanations.empty()); 120 EXPECT_TRUE(expired_explanation.info_explanations.empty());
121 121
122 // Check that the summary and description are as expected. 122 // Check that the summary and description are as expected.
(...skipping 1043 matching lines...) Expand 10 before | Expand all | Expand 10 after
1166 base::FilePath(kDocRoot)); 1166 base::FilePath(kDocRoot));
1167 ASSERT_TRUE(https_test_server_expired.Start()); 1167 ASSERT_TRUE(https_test_server_expired.Start());
1168 1168
1169 content::WebContents* web_contents = 1169 content::WebContents* web_contents =
1170 browser()->tab_strip_model()->GetActiveWebContents(); 1170 browser()->tab_strip_model()->GetActiveWebContents();
1171 SecurityStyleTestObserver observer(web_contents); 1171 SecurityStyleTestObserver observer(web_contents);
1172 1172
1173 // Visit an HTTP url. 1173 // Visit an HTTP url.
1174 GURL http_url(embedded_test_server()->GetURL("/title1.html")); 1174 GURL http_url(embedded_test_server()->GetURL("/title1.html"));
1175 ui_test_utils::NavigateToURL(browser(), http_url); 1175 ui_test_utils::NavigateToURL(browser(), http_url);
1176 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, 1176 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
1177 observer.latest_security_style()); 1177 observer.latest_security_style());
1178 EXPECT_EQ(0u, 1178 EXPECT_EQ(0u,
1179 observer.latest_explanations().unauthenticated_explanations.size()); 1179 observer.latest_explanations().unauthenticated_explanations.size());
1180 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); 1180 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
1181 EXPECT_EQ(0u, observer.latest_explanations().secure_explanations.size()); 1181 EXPECT_EQ(0u, observer.latest_explanations().secure_explanations.size());
1182 EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic); 1182 EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic);
1183 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1183 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1184 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1184 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
1185 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); 1185 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
1186 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); 1186 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
1187 1187
1188 // Visit an (otherwise valid) HTTPS page that displays mixed content. 1188 // Visit an (otherwise valid) HTTPS page that displays mixed content.
1189 std::string replacement_path; 1189 std::string replacement_path;
1190 GetFilePathWithHostAndPortReplacement( 1190 GetFilePathWithHostAndPortReplacement(
1191 "/ssl/page_displays_insecure_content.html", 1191 "/ssl/page_displays_insecure_content.html",
1192 embedded_test_server()->host_port_pair(), &replacement_path); 1192 embedded_test_server()->host_port_pair(), &replacement_path);
1193 1193
1194 GURL mixed_content_url(https_server_.GetURL(replacement_path)); 1194 GURL mixed_content_url(https_server_.GetURL(replacement_path));
1195 ui_test_utils::NavigateToURL(browser(), mixed_content_url); 1195 ui_test_utils::NavigateToURL(browser(), mixed_content_url);
1196 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, 1196 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
1197 observer.latest_security_style()); 1197 observer.latest_security_style());
1198 1198
1199 const content::SecurityStyleExplanations& mixed_content_explanation = 1199 const content::SecurityStyleExplanations& mixed_content_explanation =
1200 observer.latest_explanations(); 1200 observer.latest_explanations();
1201 ASSERT_EQ(0u, mixed_content_explanation.unauthenticated_explanations.size()); 1201 ASSERT_EQ(0u, mixed_content_explanation.unauthenticated_explanations.size());
1202 ASSERT_EQ(0u, mixed_content_explanation.broken_explanations.size()); 1202 ASSERT_EQ(0u, mixed_content_explanation.broken_explanations.size());
1203 CheckSecureExplanations(mixed_content_explanation.secure_explanations, 1203 CheckSecureExplanations(mixed_content_explanation.secure_explanations,
1204 VALID_CERTIFICATE, browser(), 1204 VALID_CERTIFICATE, browser(),
1205 https_server_.GetCertificate().get()); 1205 https_server_.GetCertificate().get());
1206 EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic); 1206 EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic);
1207 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1207 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1208 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1208 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
1209 EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content); 1209 EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content);
1210 EXPECT_FALSE(mixed_content_explanation.ran_mixed_content); 1210 EXPECT_FALSE(mixed_content_explanation.ran_mixed_content);
1211 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, 1211 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated,
1212 mixed_content_explanation.displayed_insecure_content_style); 1212 mixed_content_explanation.displayed_insecure_content_style);
1213 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, 1213 EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken,
1214 mixed_content_explanation.ran_insecure_content_style); 1214 mixed_content_explanation.ran_insecure_content_style);
1215 1215
1216 // Visit a broken HTTPS url. 1216 // Visit a broken HTTPS url.
1217 GURL expired_url(https_test_server_expired.GetURL("/title1.html")); 1217 GURL expired_url(https_test_server_expired.GetURL("/title1.html"));
1218 ui_test_utils::NavigateToURL(browser(), expired_url); 1218 ui_test_utils::NavigateToURL(browser(), expired_url);
1219 1219
1220 // An interstitial should show, and an event for the lock icon on the 1220 // An interstitial should show, and an event for the lock icon on the
1221 // interstitial should fire. 1221 // interstitial should fire.
1222 content::WaitForInterstitialAttach(web_contents); 1222 content::WaitForInterstitialAttach(web_contents);
1223 EXPECT_TRUE(web_contents->ShowingInterstitialPage()); 1223 EXPECT_TRUE(web_contents->ShowingInterstitialPage());
1224 CheckBrokenSecurityStyle(observer, net::ERR_CERT_DATE_INVALID, browser(), 1224 CheckBrokenSecurityStyle(observer, net::ERR_CERT_DATE_INVALID, browser(),
1225 https_test_server_expired.GetCertificate().get()); 1225 https_test_server_expired.GetCertificate().get());
1226 CheckSecureExplanations(observer.latest_explanations().secure_explanations, 1226 CheckSecureExplanations(observer.latest_explanations().secure_explanations,
1227 INVALID_CERTIFICATE, browser(), 1227 INVALID_CERTIFICATE, browser(),
1228 https_test_server_expired.GetCertificate().get()); 1228 https_test_server_expired.GetCertificate().get());
1229 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); 1229 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
1230 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1230 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1231 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1231 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
1232 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); 1232 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
1233 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); 1233 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
1234 1234
1235 // Before clicking through, navigate to a different page, and then go 1235 // Before clicking through, navigate to a different page, and then go
1236 // back to the interstitial. 1236 // back to the interstitial.
1237 GURL valid_https_url(https_server_.GetURL("/title1.html")); 1237 GURL valid_https_url(https_server_.GetURL("/title1.html"));
1238 ui_test_utils::NavigateToURL(browser(), valid_https_url); 1238 ui_test_utils::NavigateToURL(browser(), valid_https_url);
1239 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, 1239 EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
1240 observer.latest_security_style()); 1240 observer.latest_security_style());
1241 EXPECT_EQ(0u, 1241 EXPECT_EQ(0u,
1242 observer.latest_explanations().unauthenticated_explanations.size()); 1242 observer.latest_explanations().unauthenticated_explanations.size());
1243 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); 1243 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
1244 CheckSecureExplanations(observer.latest_explanations().secure_explanations, 1244 CheckSecureExplanations(observer.latest_explanations().secure_explanations,
1245 VALID_CERTIFICATE, browser(), 1245 VALID_CERTIFICATE, browser(),
1246 https_server_.GetCertificate().get()); 1246 https_server_.GetCertificate().get());
1247 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); 1247 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
1248 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1248 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1249 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1249 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
1308 base::FilePath(kDocRoot)); 1308 base::FilePath(kDocRoot));
1309 ASSERT_TRUE(https_test_server_expired.Start()); 1309 ASSERT_TRUE(https_test_server_expired.Start());
1310 1310
1311 content::WebContents* web_contents = 1311 content::WebContents* web_contents =
1312 browser()->tab_strip_model()->GetActiveWebContents(); 1312 browser()->tab_strip_model()->GetActiveWebContents();
1313 SecurityStyleTestObserver observer(web_contents); 1313 SecurityStyleTestObserver observer(web_contents);
1314 1314
1315 // Visit a valid HTTPS url. 1315 // Visit a valid HTTPS url.
1316 GURL valid_https_url(https_server_.GetURL("/title1.html")); 1316 GURL valid_https_url(https_server_.GetURL("/title1.html"));
1317 ui_test_utils::NavigateToURL(browser(), valid_https_url); 1317 ui_test_utils::NavigateToURL(browser(), valid_https_url);
1318 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, 1318 EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
1319 observer.latest_security_style()); 1319 observer.latest_security_style());
1320 EXPECT_EQ(0u, 1320 EXPECT_EQ(0u,
1321 observer.latest_explanations().unauthenticated_explanations.size()); 1321 observer.latest_explanations().unauthenticated_explanations.size());
1322 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); 1322 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
1323 CheckSecureExplanations(observer.latest_explanations().secure_explanations, 1323 CheckSecureExplanations(observer.latest_explanations().secure_explanations,
1324 VALID_CERTIFICATE, browser(), 1324 VALID_CERTIFICATE, browser(),
1325 https_server_.GetCertificate().get()); 1325 https_server_.GetCertificate().get());
1326 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); 1326 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
1327 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1327 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1328 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1328 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
(...skipping 29 matching lines...) Expand all
1358 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); 1358 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content);
1359 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); 1359 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content);
1360 1360
1361 content::WindowedNotificationObserver back_nav_load_observer( 1361 content::WindowedNotificationObserver back_nav_load_observer(
1362 content::NOTIFICATION_LOAD_STOP, 1362 content::NOTIFICATION_LOAD_STOP,
1363 content::Source<content::NavigationController>( 1363 content::Source<content::NavigationController>(
1364 &web_contents->GetController())); 1364 &web_contents->GetController()));
1365 chrome::GoBack(browser(), WindowOpenDisposition::CURRENT_TAB); 1365 chrome::GoBack(browser(), WindowOpenDisposition::CURRENT_TAB);
1366 back_nav_load_observer.Wait(); 1366 back_nav_load_observer.Wait();
1367 1367
1368 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, 1368 EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
1369 observer.latest_security_style()); 1369 observer.latest_security_style());
1370 EXPECT_EQ(0u, 1370 EXPECT_EQ(0u,
1371 observer.latest_explanations().unauthenticated_explanations.size()); 1371 observer.latest_explanations().unauthenticated_explanations.size());
1372 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); 1372 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size());
1373 CheckSecureExplanations(observer.latest_explanations().secure_explanations, 1373 CheckSecureExplanations(observer.latest_explanations().secure_explanations,
1374 VALID_CERTIFICATE, browser(), 1374 VALID_CERTIFICATE, browser(),
1375 https_server_.GetCertificate().get()); 1375 https_server_.GetCertificate().get());
1376 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); 1376 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic);
1377 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); 1377 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed);
1378 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); 1378 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty());
(...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after
1499 IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest, 1499 IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest,
1500 SecurityStyleChangedObserverNonsecureConnection) { 1500 SecurityStyleChangedObserverNonsecureConnection) {
1501 content::WebContents* web_contents = 1501 content::WebContents* web_contents =
1502 browser()->tab_strip_model()->GetActiveWebContents(); 1502 browser()->tab_strip_model()->GetActiveWebContents();
1503 SecurityStyleTestObserver observer(web_contents); 1503 SecurityStyleTestObserver observer(web_contents);
1504 1504
1505 ui_test_utils::NavigateToURL( 1505 ui_test_utils::NavigateToURL(
1506 browser(), GURL(std::string("https://") + kMockNonsecureHostname)); 1506 browser(), GURL(std::string("https://") + kMockNonsecureHostname));
1507 1507
1508 // The security style of the page doesn't get downgraded for obsolete 1508 // The security style of the page doesn't get downgraded for obsolete
1509 // TLS settings, so it should remain at SECURITY_STYLE_AUTHENTICATED. 1509 // TLS settings, so it should remain at WebSecurityStyleAuthenticated.
1510 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, 1510 EXPECT_EQ(blink::WebSecurityStyleAuthenticated,
1511 observer.latest_security_style()); 1511 observer.latest_security_style());
1512 1512
1513 // The messages explaining the security style do, however, get 1513 // The messages explaining the security style do, however, get
1514 // downgraded: SECURE_PROTOCOL_AND_CIPHERSUITE should not show up when 1514 // downgraded: SECURE_PROTOCOL_AND_CIPHERSUITE should not show up when
1515 // the TLS settings are obsolete. 1515 // the TLS settings are obsolete.
1516 for (const auto& explanation : 1516 for (const auto& explanation :
1517 observer.latest_explanations().secure_explanations) { 1517 observer.latest_explanations().secure_explanations) {
1518 EXPECT_NE(l10n_util::GetStringUTF8(IDS_STRONG_SSL_SUMMARY), 1518 EXPECT_NE(l10n_util::GetStringUTF8(IDS_STRONG_SSL_SUMMARY),
1519 explanation.summary); 1519 explanation.summary);
1520 } 1520 }
(...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after
1672 ChromeSecurityStateModelClient* model_client = 1672 ChromeSecurityStateModelClient* model_client =
1673 ChromeSecurityStateModelClient::FromWebContents(web_contents); 1673 ChromeSecurityStateModelClient::FromWebContents(web_contents);
1674 ASSERT_TRUE(model_client); 1674 ASSERT_TRUE(model_client);
1675 SecurityStateModel::SecurityInfo security_info; 1675 SecurityStateModel::SecurityInfo security_info;
1676 model_client->GetSecurityInfo(&security_info); 1676 model_client->GetSecurityInfo(&security_info);
1677 EXPECT_EQ(SecurityStateModel::SECURE, security_info.security_level); 1677 EXPECT_EQ(SecurityStateModel::SECURE, security_info.security_level);
1678 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses); 1678 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses);
1679 } 1679 }
1680 1680
1681 } // namespace 1681 } // namespace
OLDNEW
« no previous file with comments | « chrome/browser/ssl/chrome_security_state_model_client.cc ('k') | chrome/browser/ssl/ssl_blocking_page.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698