| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" | 5 #include "chrome/browser/ssl/chrome_security_state_model_client.h" |
| 6 | 6 |
| 7 #include <openssl/ssl.h> | 7 #include <openssl/ssl.h> |
| 8 | 8 |
| 9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
| 10 #include "base/files/file_path.h" | 10 #include "base/files/file_path.h" |
| (...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 66 const base::FilePath::CharType kDocRoot[] = | 66 const base::FilePath::CharType kDocRoot[] = |
| 67 FILE_PATH_LITERAL("chrome/test/data"); | 67 FILE_PATH_LITERAL("chrome/test/data"); |
| 68 | 68 |
| 69 // A WebContentsObserver useful for testing the SecurityStyleChanged() | 69 // A WebContentsObserver useful for testing the SecurityStyleChanged() |
| 70 // method: it keeps track of the latest security style and explanation | 70 // method: it keeps track of the latest security style and explanation |
| 71 // that was fired. | 71 // that was fired. |
| 72 class SecurityStyleTestObserver : public content::WebContentsObserver { | 72 class SecurityStyleTestObserver : public content::WebContentsObserver { |
| 73 public: | 73 public: |
| 74 explicit SecurityStyleTestObserver(content::WebContents* web_contents) | 74 explicit SecurityStyleTestObserver(content::WebContents* web_contents) |
| 75 : content::WebContentsObserver(web_contents), | 75 : content::WebContentsObserver(web_contents), |
| 76 latest_security_style_(content::SECURITY_STYLE_UNKNOWN) {} | 76 latest_security_style_(blink::WebSecurityStyleUnknown) {} |
| 77 ~SecurityStyleTestObserver() override {} | 77 ~SecurityStyleTestObserver() override {} |
| 78 | 78 |
| 79 void SecurityStyleChanged(content::SecurityStyle security_style, | 79 void SecurityStyleChanged(blink::WebSecurityStyle security_style, |
| 80 const content::SecurityStyleExplanations& | 80 const content::SecurityStyleExplanations& |
| 81 security_style_explanations) override { | 81 security_style_explanations) override { |
| 82 latest_security_style_ = security_style; | 82 latest_security_style_ = security_style; |
| 83 latest_explanations_ = security_style_explanations; | 83 latest_explanations_ = security_style_explanations; |
| 84 } | 84 } |
| 85 | 85 |
| 86 content::SecurityStyle latest_security_style() const { | 86 blink::WebSecurityStyle latest_security_style() const { |
| 87 return latest_security_style_; | 87 return latest_security_style_; |
| 88 } | 88 } |
| 89 | 89 |
| 90 const content::SecurityStyleExplanations& latest_explanations() const { | 90 const content::SecurityStyleExplanations& latest_explanations() const { |
| 91 return latest_explanations_; | 91 return latest_explanations_; |
| 92 } | 92 } |
| 93 | 93 |
| 94 void ClearLatestSecurityStyleAndExplanations() { | 94 void ClearLatestSecurityStyleAndExplanations() { |
| 95 latest_security_style_ = content::SECURITY_STYLE_UNKNOWN; | 95 latest_security_style_ = blink::WebSecurityStyleUnknown; |
| 96 latest_explanations_ = content::SecurityStyleExplanations(); | 96 latest_explanations_ = content::SecurityStyleExplanations(); |
| 97 } | 97 } |
| 98 | 98 |
| 99 private: | 99 private: |
| 100 content::SecurityStyle latest_security_style_; | 100 blink::WebSecurityStyle latest_security_style_; |
| 101 content::SecurityStyleExplanations latest_explanations_; | 101 content::SecurityStyleExplanations latest_explanations_; |
| 102 | 102 |
| 103 DISALLOW_COPY_AND_ASSIGN(SecurityStyleTestObserver); | 103 DISALLOW_COPY_AND_ASSIGN(SecurityStyleTestObserver); |
| 104 }; | 104 }; |
| 105 | 105 |
| 106 // Check that |observer|'s latest event was for an expired certificate | 106 // Check that |observer|'s latest event was for an expired certificate |
| 107 // and that it saw the proper SecurityStyle and explanations. | 107 // and that it saw the proper SecurityStyle and explanations. |
| 108 void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer, | 108 void CheckBrokenSecurityStyle(const SecurityStyleTestObserver& observer, |
| 109 int error, | 109 int error, |
| 110 Browser* browser, | 110 Browser* browser, |
| 111 net::X509Certificate* expected_cert) { | 111 net::X509Certificate* expected_cert) { |
| 112 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, | 112 EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken, |
| 113 observer.latest_security_style()); | 113 observer.latest_security_style()); |
| 114 | 114 |
| 115 const content::SecurityStyleExplanations& expired_explanation = | 115 const content::SecurityStyleExplanations& expired_explanation = |
| 116 observer.latest_explanations(); | 116 observer.latest_explanations(); |
| 117 EXPECT_EQ(0u, expired_explanation.unauthenticated_explanations.size()); | 117 EXPECT_EQ(0u, expired_explanation.unauthenticated_explanations.size()); |
| 118 ASSERT_EQ(1u, expired_explanation.broken_explanations.size()); | 118 ASSERT_EQ(1u, expired_explanation.broken_explanations.size()); |
| 119 EXPECT_FALSE(expired_explanation.pkp_bypassed); | 119 EXPECT_FALSE(expired_explanation.pkp_bypassed); |
| 120 EXPECT_TRUE(expired_explanation.info_explanations.empty()); | 120 EXPECT_TRUE(expired_explanation.info_explanations.empty()); |
| 121 | 121 |
| 122 // Check that the summary and description are as expected. | 122 // Check that the summary and description are as expected. |
| (...skipping 1043 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1166 base::FilePath(kDocRoot)); | 1166 base::FilePath(kDocRoot)); |
| 1167 ASSERT_TRUE(https_test_server_expired.Start()); | 1167 ASSERT_TRUE(https_test_server_expired.Start()); |
| 1168 | 1168 |
| 1169 content::WebContents* web_contents = | 1169 content::WebContents* web_contents = |
| 1170 browser()->tab_strip_model()->GetActiveWebContents(); | 1170 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1171 SecurityStyleTestObserver observer(web_contents); | 1171 SecurityStyleTestObserver observer(web_contents); |
| 1172 | 1172 |
| 1173 // Visit an HTTP url. | 1173 // Visit an HTTP url. |
| 1174 GURL http_url(embedded_test_server()->GetURL("/title1.html")); | 1174 GURL http_url(embedded_test_server()->GetURL("/title1.html")); |
| 1175 ui_test_utils::NavigateToURL(browser(), http_url); | 1175 ui_test_utils::NavigateToURL(browser(), http_url); |
| 1176 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, | 1176 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, |
| 1177 observer.latest_security_style()); | 1177 observer.latest_security_style()); |
| 1178 EXPECT_EQ(0u, | 1178 EXPECT_EQ(0u, |
| 1179 observer.latest_explanations().unauthenticated_explanations.size()); | 1179 observer.latest_explanations().unauthenticated_explanations.size()); |
| 1180 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); | 1180 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); |
| 1181 EXPECT_EQ(0u, observer.latest_explanations().secure_explanations.size()); | 1181 EXPECT_EQ(0u, observer.latest_explanations().secure_explanations.size()); |
| 1182 EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic); | 1182 EXPECT_FALSE(observer.latest_explanations().scheme_is_cryptographic); |
| 1183 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1183 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1184 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1184 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| 1185 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); | 1185 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| 1186 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); | 1186 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| 1187 | 1187 |
| 1188 // Visit an (otherwise valid) HTTPS page that displays mixed content. | 1188 // Visit an (otherwise valid) HTTPS page that displays mixed content. |
| 1189 std::string replacement_path; | 1189 std::string replacement_path; |
| 1190 GetFilePathWithHostAndPortReplacement( | 1190 GetFilePathWithHostAndPortReplacement( |
| 1191 "/ssl/page_displays_insecure_content.html", | 1191 "/ssl/page_displays_insecure_content.html", |
| 1192 embedded_test_server()->host_port_pair(), &replacement_path); | 1192 embedded_test_server()->host_port_pair(), &replacement_path); |
| 1193 | 1193 |
| 1194 GURL mixed_content_url(https_server_.GetURL(replacement_path)); | 1194 GURL mixed_content_url(https_server_.GetURL(replacement_path)); |
| 1195 ui_test_utils::NavigateToURL(browser(), mixed_content_url); | 1195 ui_test_utils::NavigateToURL(browser(), mixed_content_url); |
| 1196 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, | 1196 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, |
| 1197 observer.latest_security_style()); | 1197 observer.latest_security_style()); |
| 1198 | 1198 |
| 1199 const content::SecurityStyleExplanations& mixed_content_explanation = | 1199 const content::SecurityStyleExplanations& mixed_content_explanation = |
| 1200 observer.latest_explanations(); | 1200 observer.latest_explanations(); |
| 1201 ASSERT_EQ(0u, mixed_content_explanation.unauthenticated_explanations.size()); | 1201 ASSERT_EQ(0u, mixed_content_explanation.unauthenticated_explanations.size()); |
| 1202 ASSERT_EQ(0u, mixed_content_explanation.broken_explanations.size()); | 1202 ASSERT_EQ(0u, mixed_content_explanation.broken_explanations.size()); |
| 1203 CheckSecureExplanations(mixed_content_explanation.secure_explanations, | 1203 CheckSecureExplanations(mixed_content_explanation.secure_explanations, |
| 1204 VALID_CERTIFICATE, browser(), | 1204 VALID_CERTIFICATE, browser(), |
| 1205 https_server_.GetCertificate().get()); | 1205 https_server_.GetCertificate().get()); |
| 1206 EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic); | 1206 EXPECT_TRUE(mixed_content_explanation.scheme_is_cryptographic); |
| 1207 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1207 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1208 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1208 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| 1209 EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content); | 1209 EXPECT_TRUE(mixed_content_explanation.displayed_mixed_content); |
| 1210 EXPECT_FALSE(mixed_content_explanation.ran_mixed_content); | 1210 EXPECT_FALSE(mixed_content_explanation.ran_mixed_content); |
| 1211 EXPECT_EQ(content::SECURITY_STYLE_UNAUTHENTICATED, | 1211 EXPECT_EQ(blink::WebSecurityStyleUnauthenticated, |
| 1212 mixed_content_explanation.displayed_insecure_content_style); | 1212 mixed_content_explanation.displayed_insecure_content_style); |
| 1213 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATION_BROKEN, | 1213 EXPECT_EQ(blink::WebSecurityStyleAuthenticationBroken, |
| 1214 mixed_content_explanation.ran_insecure_content_style); | 1214 mixed_content_explanation.ran_insecure_content_style); |
| 1215 | 1215 |
| 1216 // Visit a broken HTTPS url. | 1216 // Visit a broken HTTPS url. |
| 1217 GURL expired_url(https_test_server_expired.GetURL("/title1.html")); | 1217 GURL expired_url(https_test_server_expired.GetURL("/title1.html")); |
| 1218 ui_test_utils::NavigateToURL(browser(), expired_url); | 1218 ui_test_utils::NavigateToURL(browser(), expired_url); |
| 1219 | 1219 |
| 1220 // An interstitial should show, and an event for the lock icon on the | 1220 // An interstitial should show, and an event for the lock icon on the |
| 1221 // interstitial should fire. | 1221 // interstitial should fire. |
| 1222 content::WaitForInterstitialAttach(web_contents); | 1222 content::WaitForInterstitialAttach(web_contents); |
| 1223 EXPECT_TRUE(web_contents->ShowingInterstitialPage()); | 1223 EXPECT_TRUE(web_contents->ShowingInterstitialPage()); |
| 1224 CheckBrokenSecurityStyle(observer, net::ERR_CERT_DATE_INVALID, browser(), | 1224 CheckBrokenSecurityStyle(observer, net::ERR_CERT_DATE_INVALID, browser(), |
| 1225 https_test_server_expired.GetCertificate().get()); | 1225 https_test_server_expired.GetCertificate().get()); |
| 1226 CheckSecureExplanations(observer.latest_explanations().secure_explanations, | 1226 CheckSecureExplanations(observer.latest_explanations().secure_explanations, |
| 1227 INVALID_CERTIFICATE, browser(), | 1227 INVALID_CERTIFICATE, browser(), |
| 1228 https_test_server_expired.GetCertificate().get()); | 1228 https_test_server_expired.GetCertificate().get()); |
| 1229 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); | 1229 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); |
| 1230 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1230 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1231 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1231 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| 1232 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); | 1232 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| 1233 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); | 1233 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| 1234 | 1234 |
| 1235 // Before clicking through, navigate to a different page, and then go | 1235 // Before clicking through, navigate to a different page, and then go |
| 1236 // back to the interstitial. | 1236 // back to the interstitial. |
| 1237 GURL valid_https_url(https_server_.GetURL("/title1.html")); | 1237 GURL valid_https_url(https_server_.GetURL("/title1.html")); |
| 1238 ui_test_utils::NavigateToURL(browser(), valid_https_url); | 1238 ui_test_utils::NavigateToURL(browser(), valid_https_url); |
| 1239 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, | 1239 EXPECT_EQ(blink::WebSecurityStyleAuthenticated, |
| 1240 observer.latest_security_style()); | 1240 observer.latest_security_style()); |
| 1241 EXPECT_EQ(0u, | 1241 EXPECT_EQ(0u, |
| 1242 observer.latest_explanations().unauthenticated_explanations.size()); | 1242 observer.latest_explanations().unauthenticated_explanations.size()); |
| 1243 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); | 1243 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); |
| 1244 CheckSecureExplanations(observer.latest_explanations().secure_explanations, | 1244 CheckSecureExplanations(observer.latest_explanations().secure_explanations, |
| 1245 VALID_CERTIFICATE, browser(), | 1245 VALID_CERTIFICATE, browser(), |
| 1246 https_server_.GetCertificate().get()); | 1246 https_server_.GetCertificate().get()); |
| 1247 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); | 1247 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); |
| 1248 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1248 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1249 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1249 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1308 base::FilePath(kDocRoot)); | 1308 base::FilePath(kDocRoot)); |
| 1309 ASSERT_TRUE(https_test_server_expired.Start()); | 1309 ASSERT_TRUE(https_test_server_expired.Start()); |
| 1310 | 1310 |
| 1311 content::WebContents* web_contents = | 1311 content::WebContents* web_contents = |
| 1312 browser()->tab_strip_model()->GetActiveWebContents(); | 1312 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1313 SecurityStyleTestObserver observer(web_contents); | 1313 SecurityStyleTestObserver observer(web_contents); |
| 1314 | 1314 |
| 1315 // Visit a valid HTTPS url. | 1315 // Visit a valid HTTPS url. |
| 1316 GURL valid_https_url(https_server_.GetURL("/title1.html")); | 1316 GURL valid_https_url(https_server_.GetURL("/title1.html")); |
| 1317 ui_test_utils::NavigateToURL(browser(), valid_https_url); | 1317 ui_test_utils::NavigateToURL(browser(), valid_https_url); |
| 1318 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, | 1318 EXPECT_EQ(blink::WebSecurityStyleAuthenticated, |
| 1319 observer.latest_security_style()); | 1319 observer.latest_security_style()); |
| 1320 EXPECT_EQ(0u, | 1320 EXPECT_EQ(0u, |
| 1321 observer.latest_explanations().unauthenticated_explanations.size()); | 1321 observer.latest_explanations().unauthenticated_explanations.size()); |
| 1322 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); | 1322 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); |
| 1323 CheckSecureExplanations(observer.latest_explanations().secure_explanations, | 1323 CheckSecureExplanations(observer.latest_explanations().secure_explanations, |
| 1324 VALID_CERTIFICATE, browser(), | 1324 VALID_CERTIFICATE, browser(), |
| 1325 https_server_.GetCertificate().get()); | 1325 https_server_.GetCertificate().get()); |
| 1326 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); | 1326 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); |
| 1327 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1327 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1328 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1328 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| (...skipping 29 matching lines...) Expand all Loading... |
| 1358 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); | 1358 EXPECT_FALSE(observer.latest_explanations().displayed_mixed_content); |
| 1359 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); | 1359 EXPECT_FALSE(observer.latest_explanations().ran_mixed_content); |
| 1360 | 1360 |
| 1361 content::WindowedNotificationObserver back_nav_load_observer( | 1361 content::WindowedNotificationObserver back_nav_load_observer( |
| 1362 content::NOTIFICATION_LOAD_STOP, | 1362 content::NOTIFICATION_LOAD_STOP, |
| 1363 content::Source<content::NavigationController>( | 1363 content::Source<content::NavigationController>( |
| 1364 &web_contents->GetController())); | 1364 &web_contents->GetController())); |
| 1365 chrome::GoBack(browser(), WindowOpenDisposition::CURRENT_TAB); | 1365 chrome::GoBack(browser(), WindowOpenDisposition::CURRENT_TAB); |
| 1366 back_nav_load_observer.Wait(); | 1366 back_nav_load_observer.Wait(); |
| 1367 | 1367 |
| 1368 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, | 1368 EXPECT_EQ(blink::WebSecurityStyleAuthenticated, |
| 1369 observer.latest_security_style()); | 1369 observer.latest_security_style()); |
| 1370 EXPECT_EQ(0u, | 1370 EXPECT_EQ(0u, |
| 1371 observer.latest_explanations().unauthenticated_explanations.size()); | 1371 observer.latest_explanations().unauthenticated_explanations.size()); |
| 1372 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); | 1372 EXPECT_EQ(0u, observer.latest_explanations().broken_explanations.size()); |
| 1373 CheckSecureExplanations(observer.latest_explanations().secure_explanations, | 1373 CheckSecureExplanations(observer.latest_explanations().secure_explanations, |
| 1374 VALID_CERTIFICATE, browser(), | 1374 VALID_CERTIFICATE, browser(), |
| 1375 https_server_.GetCertificate().get()); | 1375 https_server_.GetCertificate().get()); |
| 1376 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); | 1376 EXPECT_TRUE(observer.latest_explanations().scheme_is_cryptographic); |
| 1377 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); | 1377 EXPECT_FALSE(observer.latest_explanations().pkp_bypassed); |
| 1378 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); | 1378 EXPECT_TRUE(observer.latest_explanations().info_explanations.empty()); |
| (...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1499 IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest, | 1499 IN_PROC_BROWSER_TEST_F(BrowserTestNonsecureURLRequest, |
| 1500 SecurityStyleChangedObserverNonsecureConnection) { | 1500 SecurityStyleChangedObserverNonsecureConnection) { |
| 1501 content::WebContents* web_contents = | 1501 content::WebContents* web_contents = |
| 1502 browser()->tab_strip_model()->GetActiveWebContents(); | 1502 browser()->tab_strip_model()->GetActiveWebContents(); |
| 1503 SecurityStyleTestObserver observer(web_contents); | 1503 SecurityStyleTestObserver observer(web_contents); |
| 1504 | 1504 |
| 1505 ui_test_utils::NavigateToURL( | 1505 ui_test_utils::NavigateToURL( |
| 1506 browser(), GURL(std::string("https://") + kMockNonsecureHostname)); | 1506 browser(), GURL(std::string("https://") + kMockNonsecureHostname)); |
| 1507 | 1507 |
| 1508 // The security style of the page doesn't get downgraded for obsolete | 1508 // The security style of the page doesn't get downgraded for obsolete |
| 1509 // TLS settings, so it should remain at SECURITY_STYLE_AUTHENTICATED. | 1509 // TLS settings, so it should remain at WebSecurityStyleAuthenticated. |
| 1510 EXPECT_EQ(content::SECURITY_STYLE_AUTHENTICATED, | 1510 EXPECT_EQ(blink::WebSecurityStyleAuthenticated, |
| 1511 observer.latest_security_style()); | 1511 observer.latest_security_style()); |
| 1512 | 1512 |
| 1513 // The messages explaining the security style do, however, get | 1513 // The messages explaining the security style do, however, get |
| 1514 // downgraded: SECURE_PROTOCOL_AND_CIPHERSUITE should not show up when | 1514 // downgraded: SECURE_PROTOCOL_AND_CIPHERSUITE should not show up when |
| 1515 // the TLS settings are obsolete. | 1515 // the TLS settings are obsolete. |
| 1516 for (const auto& explanation : | 1516 for (const auto& explanation : |
| 1517 observer.latest_explanations().secure_explanations) { | 1517 observer.latest_explanations().secure_explanations) { |
| 1518 EXPECT_NE(l10n_util::GetStringUTF8(IDS_STRONG_SSL_SUMMARY), | 1518 EXPECT_NE(l10n_util::GetStringUTF8(IDS_STRONG_SSL_SUMMARY), |
| 1519 explanation.summary); | 1519 explanation.summary); |
| 1520 } | 1520 } |
| (...skipping 151 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1672 ChromeSecurityStateModelClient* model_client = | 1672 ChromeSecurityStateModelClient* model_client = |
| 1673 ChromeSecurityStateModelClient::FromWebContents(web_contents); | 1673 ChromeSecurityStateModelClient::FromWebContents(web_contents); |
| 1674 ASSERT_TRUE(model_client); | 1674 ASSERT_TRUE(model_client); |
| 1675 SecurityStateModel::SecurityInfo security_info; | 1675 SecurityStateModel::SecurityInfo security_info; |
| 1676 model_client->GetSecurityInfo(&security_info); | 1676 model_client->GetSecurityInfo(&security_info); |
| 1677 EXPECT_EQ(SecurityStateModel::SECURE, security_info.security_level); | 1677 EXPECT_EQ(SecurityStateModel::SECURE, security_info.security_level); |
| 1678 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses); | 1678 EXPECT_EQ(kTestSCTStatuses, security_info.sct_verify_statuses); |
| 1679 } | 1679 } |
| 1680 | 1680 |
| 1681 } // namespace | 1681 } // namespace |
| OLD | NEW |