| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ui/website_settings/website_settings.h" | 5 #include "chrome/browser/ui/website_settings/website_settings.h" |
| 6 | 6 |
| 7 #include <stddef.h> | 7 #include <stddef.h> |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <string> | 10 #include <string> |
| (...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 75 | 75 |
| 76 #if !defined(OS_ANDROID) | 76 #if !defined(OS_ANDROID) |
| 77 #include "chrome/browser/ui/exclusive_access/exclusive_access_manager.h" | 77 #include "chrome/browser/ui/exclusive_access/exclusive_access_manager.h" |
| 78 #include "chrome/browser/ui/website_settings/website_settings_infobar_delegate.h
" | 78 #include "chrome/browser/ui/website_settings/website_settings_infobar_delegate.h
" |
| 79 #endif | 79 #endif |
| 80 | 80 |
| 81 using base::ASCIIToUTF16; | 81 using base::ASCIIToUTF16; |
| 82 using base::UTF8ToUTF16; | 82 using base::UTF8ToUTF16; |
| 83 using base::UTF16ToUTF8; | 83 using base::UTF16ToUTF8; |
| 84 using content::BrowserThread; | 84 using content::BrowserThread; |
| 85 using security_state::SecurityStateModel; | |
| 86 | 85 |
| 87 namespace { | 86 namespace { |
| 88 | 87 |
| 89 // Events for UMA. Do not reorder or change! | 88 // Events for UMA. Do not reorder or change! |
| 90 enum SSLCertificateDecisionsDidRevoke { | 89 enum SSLCertificateDecisionsDidRevoke { |
| 91 USER_CERT_DECISIONS_NOT_REVOKED = 0, | 90 USER_CERT_DECISIONS_NOT_REVOKED = 0, |
| 92 USER_CERT_DECISIONS_REVOKED, | 91 USER_CERT_DECISIONS_REVOKED, |
| 93 END_OF_SSL_CERTIFICATE_DECISIONS_DID_REVOKE_ENUM | 92 END_OF_SSL_CERTIFICATE_DECISIONS_DID_REVOKE_ENUM |
| 94 }; | 93 }; |
| 95 | 94 |
| (...skipping 23 matching lines...) Expand all Loading... |
| 119 bool ShouldShowPermission(ContentSettingsType type) { | 118 bool ShouldShowPermission(ContentSettingsType type) { |
| 120 #if !defined(OS_ANDROID) | 119 #if !defined(OS_ANDROID) |
| 121 // Autoplay is Android-only at the moment. | 120 // Autoplay is Android-only at the moment. |
| 122 if (type == CONTENT_SETTINGS_TYPE_AUTOPLAY) | 121 if (type == CONTENT_SETTINGS_TYPE_AUTOPLAY) |
| 123 return false; | 122 return false; |
| 124 #endif | 123 #endif |
| 125 | 124 |
| 126 return true; | 125 return true; |
| 127 } | 126 } |
| 128 | 127 |
| 129 void CheckContentStatus(SecurityStateModel::ContentStatus content_status, | 128 void CheckContentStatus(security_state::ContentStatus content_status, |
| 130 bool* displayed, | 129 bool* displayed, |
| 131 bool* ran) { | 130 bool* ran) { |
| 132 switch (content_status) { | 131 switch (content_status) { |
| 133 case SecurityStateModel::CONTENT_STATUS_DISPLAYED: | 132 case security_state::CONTENT_STATUS_DISPLAYED: |
| 134 *displayed = true; | 133 *displayed = true; |
| 135 break; | 134 break; |
| 136 case SecurityStateModel::CONTENT_STATUS_RAN: | 135 case security_state::CONTENT_STATUS_RAN: |
| 137 *ran = true; | 136 *ran = true; |
| 138 break; | 137 break; |
| 139 case SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN: | 138 case security_state::CONTENT_STATUS_DISPLAYED_AND_RAN: |
| 140 *displayed = true; | 139 *displayed = true; |
| 141 *ran = true; | 140 *ran = true; |
| 142 break; | 141 break; |
| 143 case SecurityStateModel::CONTENT_STATUS_UNKNOWN: | 142 case security_state::CONTENT_STATUS_UNKNOWN: |
| 144 case SecurityStateModel::CONTENT_STATUS_NONE: | 143 case security_state::CONTENT_STATUS_NONE: |
| 145 break; | 144 break; |
| 146 } | 145 } |
| 147 } | 146 } |
| 148 | 147 |
| 149 void CheckForInsecureContent( | 148 void CheckForInsecureContent( |
| 150 const SecurityStateModel::SecurityInfo& security_info, | 149 const security_state::SecurityInfo& security_info, |
| 151 bool* displayed, | 150 bool* displayed, |
| 152 bool* ran) { | 151 bool* ran) { |
| 153 CheckContentStatus(security_info.mixed_content_status, displayed, ran); | 152 CheckContentStatus(security_info.mixed_content_status, displayed, ran); |
| 154 // Only consider subresources with certificate errors if the main | 153 // Only consider subresources with certificate errors if the main |
| 155 // resource was loaded over HTTPS without major certificate errors. If | 154 // resource was loaded over HTTPS without major certificate errors. If |
| 156 // the main resource had a certificate error, then it would not be | 155 // the main resource had a certificate error, then it would not be |
| 157 // that useful (and would potentially be confusing) to warn about | 156 // that useful (and would potentially be confusing) to warn about |
| 158 // subesources that had certificate errors too. | 157 // subesources that had certificate errors too. |
| 159 if (net::IsCertStatusError(security_info.cert_status) && | 158 if (net::IsCertStatusError(security_info.cert_status) && |
| 160 !net::IsCertStatusMinorError(security_info.cert_status)) { | 159 !net::IsCertStatusMinorError(security_info.cert_status)) { |
| 161 return; | 160 return; |
| 162 } | 161 } |
| 163 CheckContentStatus(security_info.content_with_cert_errors_status, displayed, | 162 CheckContentStatus(security_info.content_with_cert_errors_status, displayed, |
| 164 ran); | 163 ran); |
| 165 } | 164 } |
| 166 | 165 |
| 167 void GetSiteIdentityByMaliciousContentStatus( | 166 void GetSiteIdentityByMaliciousContentStatus( |
| 168 security_state::SecurityStateModel::MaliciousContentStatus | 167 security_state::MaliciousContentStatus malicious_content_status, |
| 169 malicious_content_status, | |
| 170 WebsiteSettings::SiteIdentityStatus* status, | 168 WebsiteSettings::SiteIdentityStatus* status, |
| 171 base::string16* details) { | 169 base::string16* details) { |
| 172 switch (malicious_content_status) { | 170 switch (malicious_content_status) { |
| 173 case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE: | 171 case security_state::MALICIOUS_CONTENT_STATUS_NONE: |
| 174 NOTREACHED(); | 172 NOTREACHED(); |
| 175 break; | 173 break; |
| 176 case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_MALWARE: | 174 case security_state::MALICIOUS_CONTENT_STATUS_MALWARE: |
| 177 *status = WebsiteSettings::SITE_IDENTITY_STATUS_MALWARE; | 175 *status = WebsiteSettings::SITE_IDENTITY_STATUS_MALWARE; |
| 178 *details = | 176 *details = |
| 179 l10n_util::GetStringUTF16(IDS_WEBSITE_SETTINGS_MALWARE_DETAILS); | 177 l10n_util::GetStringUTF16(IDS_WEBSITE_SETTINGS_MALWARE_DETAILS); |
| 180 break; | 178 break; |
| 181 case security_state::SecurityStateModel:: | 179 case security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING: |
| 182 MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING: | |
| 183 *status = WebsiteSettings::SITE_IDENTITY_STATUS_SOCIAL_ENGINEERING; | 180 *status = WebsiteSettings::SITE_IDENTITY_STATUS_SOCIAL_ENGINEERING; |
| 184 *details = l10n_util::GetStringUTF16( | 181 *details = l10n_util::GetStringUTF16( |
| 185 IDS_WEBSITE_SETTINGS_SOCIAL_ENGINEERING_DETAILS); | 182 IDS_WEBSITE_SETTINGS_SOCIAL_ENGINEERING_DETAILS); |
| 186 break; | 183 break; |
| 187 case security_state::SecurityStateModel:: | 184 case security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE: |
| 188 MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE: | |
| 189 *status = WebsiteSettings::SITE_IDENTITY_STATUS_UNWANTED_SOFTWARE; | 185 *status = WebsiteSettings::SITE_IDENTITY_STATUS_UNWANTED_SOFTWARE; |
| 190 *details = l10n_util::GetStringUTF16( | 186 *details = l10n_util::GetStringUTF16( |
| 191 IDS_WEBSITE_SETTINGS_UNWANTED_SOFTWARE_DETAILS); | 187 IDS_WEBSITE_SETTINGS_UNWANTED_SOFTWARE_DETAILS); |
| 192 break; | 188 break; |
| 193 } | 189 } |
| 194 } | 190 } |
| 195 | 191 |
| 196 base::string16 GetSimpleSiteName(const GURL& url) { | 192 base::string16 GetSimpleSiteName(const GURL& url) { |
| 197 return url_formatter::FormatUrlForSecurityDisplay( | 193 return url_formatter::FormatUrlForSecurityDisplay( |
| 198 url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS); | 194 url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS); |
| (...skipping 13 matching lines...) Expand all Loading... |
| 212 }; | 208 }; |
| 213 | 209 |
| 214 } // namespace | 210 } // namespace |
| 215 | 211 |
| 216 WebsiteSettings::WebsiteSettings( | 212 WebsiteSettings::WebsiteSettings( |
| 217 WebsiteSettingsUI* ui, | 213 WebsiteSettingsUI* ui, |
| 218 Profile* profile, | 214 Profile* profile, |
| 219 TabSpecificContentSettings* tab_specific_content_settings, | 215 TabSpecificContentSettings* tab_specific_content_settings, |
| 220 content::WebContents* web_contents, | 216 content::WebContents* web_contents, |
| 221 const GURL& url, | 217 const GURL& url, |
| 222 const SecurityStateModel::SecurityInfo& security_info) | 218 const security_state::SecurityInfo& security_info) |
| 223 : TabSpecificContentSettings::SiteDataObserver( | 219 : TabSpecificContentSettings::SiteDataObserver( |
| 224 tab_specific_content_settings), | 220 tab_specific_content_settings), |
| 225 content::WebContentsObserver(web_contents), | 221 content::WebContentsObserver(web_contents), |
| 226 ui_(ui), | 222 ui_(ui), |
| 227 show_info_bar_(false), | 223 show_info_bar_(false), |
| 228 site_url_(url), | 224 site_url_(url), |
| 229 site_identity_status_(SITE_IDENTITY_STATUS_UNKNOWN), | 225 site_identity_status_(SITE_IDENTITY_STATUS_UNKNOWN), |
| 230 site_connection_status_(SITE_CONNECTION_STATUS_UNKNOWN), | 226 site_connection_status_(SITE_CONNECTION_STATUS_UNKNOWN), |
| 231 show_ssl_decision_revoke_button_(false), | 227 show_ssl_decision_revoke_button_(false), |
| 232 content_settings_(HostContentSettingsMapFactory::GetForProfile(profile)), | 228 content_settings_(HostContentSettingsMapFactory::GetForProfile(profile)), |
| 233 chrome_ssl_host_state_delegate_( | 229 chrome_ssl_host_state_delegate_( |
| 234 ChromeSSLHostStateDelegateFactory::GetForProfile(profile)), | 230 ChromeSSLHostStateDelegateFactory::GetForProfile(profile)), |
| 235 did_revoke_user_ssl_decisions_(false), | 231 did_revoke_user_ssl_decisions_(false), |
| 236 profile_(profile), | 232 profile_(profile), |
| 237 security_level_(security_state::SecurityStateModel::NONE) { | 233 security_level_(security_state::NONE) { |
| 238 Init(url, security_info); | 234 Init(url, security_info); |
| 239 | 235 |
| 240 PresentSitePermissions(); | 236 PresentSitePermissions(); |
| 241 PresentSiteData(); | 237 PresentSiteData(); |
| 242 PresentSiteIdentity(); | 238 PresentSiteIdentity(); |
| 243 | 239 |
| 244 // Every time the Website Settings UI is opened a |WebsiteSettings| object is | 240 // Every time the Website Settings UI is opened a |WebsiteSettings| object is |
| 245 // created. So this counts how ofter the Website Settings UI is opened. | 241 // created. So this counts how ofter the Website Settings UI is opened. |
| 246 RecordWebsiteSettingsAction(WEBSITE_SETTINGS_OPENED); | 242 RecordWebsiteSettingsAction(WEBSITE_SETTINGS_OPENED); |
| 247 } | 243 } |
| 248 | 244 |
| 249 WebsiteSettings::~WebsiteSettings() { | 245 WebsiteSettings::~WebsiteSettings() { |
| 250 } | 246 } |
| 251 | 247 |
| 252 void WebsiteSettings::RecordWebsiteSettingsAction( | 248 void WebsiteSettings::RecordWebsiteSettingsAction( |
| 253 WebsiteSettingsAction action) { | 249 WebsiteSettingsAction action) { |
| 254 UMA_HISTOGRAM_ENUMERATION("WebsiteSettings.Action", | 250 UMA_HISTOGRAM_ENUMERATION("WebsiteSettings.Action", |
| 255 action, | 251 action, |
| 256 WEBSITE_SETTINGS_COUNT); | 252 WEBSITE_SETTINGS_COUNT); |
| 257 | 253 |
| 258 std::string histogram_name; | 254 std::string histogram_name; |
| 259 | 255 |
| 260 if (site_url_.SchemeIsCryptographic()) { | 256 if (site_url_.SchemeIsCryptographic()) { |
| 261 if (security_level_ == security_state::SecurityStateModel::SECURE || | 257 if (security_level_ == security_state::SECURE || |
| 262 security_level_ == security_state::SecurityStateModel::EV_SECURE) { | 258 security_level_ == security_state::EV_SECURE) { |
| 263 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid", | 259 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid", |
| 264 action, WEBSITE_SETTINGS_COUNT); | 260 action, WEBSITE_SETTINGS_COUNT); |
| 265 } else if (security_level_ == security_state::SecurityStateModel::NONE) { | 261 } else if (security_level_ == security_state::NONE) { |
| 266 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded", | 262 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded", |
| 267 action, WEBSITE_SETTINGS_COUNT); | 263 action, WEBSITE_SETTINGS_COUNT); |
| 268 } else if (security_level_ == | 264 } else if (security_level_ == security_state::DANGEROUS) { |
| 269 security_state::SecurityStateModel::DANGEROUS) { | |
| 270 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous", | 265 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous", |
| 271 action, WEBSITE_SETTINGS_COUNT); | 266 action, WEBSITE_SETTINGS_COUNT); |
| 272 } | 267 } |
| 273 return; | 268 return; |
| 274 } | 269 } |
| 275 | 270 |
| 276 if (security_level_ == | 271 if (security_level_ == security_state::HTTP_SHOW_WARNING) { |
| 277 security_state::SecurityStateModel::HTTP_SHOW_WARNING) { | |
| 278 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning", | 272 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning", |
| 279 action, WEBSITE_SETTINGS_COUNT); | 273 action, WEBSITE_SETTINGS_COUNT); |
| 280 } else if (security_level_ == security_state::SecurityStateModel::DANGEROUS) { | 274 } else if (security_level_ == security_state::DANGEROUS) { |
| 281 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous", | 275 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous", |
| 282 action, WEBSITE_SETTINGS_COUNT); | 276 action, WEBSITE_SETTINGS_COUNT); |
| 283 } else { | 277 } else { |
| 284 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Neutral", | 278 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Neutral", |
| 285 action, WEBSITE_SETTINGS_COUNT); | 279 action, WEBSITE_SETTINGS_COUNT); |
| 286 } | 280 } |
| 287 } | 281 } |
| 288 | 282 |
| 289 void WebsiteSettings::OnSitePermissionChanged(ContentSettingsType type, | 283 void WebsiteSettings::OnSitePermissionChanged(ContentSettingsType type, |
| 290 ContentSetting setting) { | 284 ContentSetting setting) { |
| (...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 368 #endif | 362 #endif |
| 369 } | 363 } |
| 370 | 364 |
| 371 void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() { | 365 void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() { |
| 372 DCHECK(chrome_ssl_host_state_delegate_); | 366 DCHECK(chrome_ssl_host_state_delegate_); |
| 373 chrome_ssl_host_state_delegate_->RevokeUserAllowExceptionsHard( | 367 chrome_ssl_host_state_delegate_->RevokeUserAllowExceptionsHard( |
| 374 site_url().host()); | 368 site_url().host()); |
| 375 did_revoke_user_ssl_decisions_ = true; | 369 did_revoke_user_ssl_decisions_ = true; |
| 376 } | 370 } |
| 377 | 371 |
| 378 void WebsiteSettings::Init( | 372 void WebsiteSettings::Init(const GURL& url, |
| 379 const GURL& url, | 373 const security_state::SecurityInfo& security_info) { |
| 380 const SecurityStateModel::SecurityInfo& security_info) { | |
| 381 #if !defined(OS_ANDROID) && !defined(OS_IOS) | 374 #if !defined(OS_ANDROID) && !defined(OS_IOS) |
| 382 // On desktop, internal URLs aren't handled by this class. Instead, a | 375 // On desktop, internal URLs aren't handled by this class. Instead, a |
| 383 // custom and simpler popup is shown. | 376 // custom and simpler popup is shown. |
| 384 DCHECK(!url.SchemeIs(content::kChromeUIScheme) && | 377 DCHECK(!url.SchemeIs(content::kChromeUIScheme) && |
| 385 !url.SchemeIs(content::kChromeDevToolsScheme) && | 378 !url.SchemeIs(content::kChromeDevToolsScheme) && |
| 386 !url.SchemeIs(content::kViewSourceScheme) && | 379 !url.SchemeIs(content::kViewSourceScheme) && |
| 387 !url.SchemeIs(content_settings::kExtensionScheme)); | 380 !url.SchemeIs(content_settings::kExtensionScheme)); |
| 388 #endif | 381 #endif |
| 389 | 382 |
| 390 bool isChromeUINativeScheme = false; | 383 bool isChromeUINativeScheme = false; |
| (...skipping 21 matching lines...) Expand all Loading... |
| 412 site_identity_details_ = | 405 site_identity_details_ = |
| 413 l10n_util::GetStringUTF16(IDS_PAGE_INFO_INTERNAL_PAGE); | 406 l10n_util::GetStringUTF16(IDS_PAGE_INFO_INTERNAL_PAGE); |
| 414 site_connection_status_ = SITE_CONNECTION_STATUS_INTERNAL_PAGE; | 407 site_connection_status_ = SITE_CONNECTION_STATUS_INTERNAL_PAGE; |
| 415 return; | 408 return; |
| 416 } | 409 } |
| 417 | 410 |
| 418 // Identity section. | 411 // Identity section. |
| 419 certificate_ = security_info.certificate; | 412 certificate_ = security_info.certificate; |
| 420 | 413 |
| 421 if (security_info.malicious_content_status != | 414 if (security_info.malicious_content_status != |
| 422 security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE) { | 415 security_state::MALICIOUS_CONTENT_STATUS_NONE) { |
| 423 // The site has been flagged by Safe Browsing as dangerous. | 416 // The site has been flagged by Safe Browsing as dangerous. |
| 424 GetSiteIdentityByMaliciousContentStatus( | 417 GetSiteIdentityByMaliciousContentStatus( |
| 425 security_info.malicious_content_status, &site_identity_status_, | 418 security_info.malicious_content_status, &site_identity_status_, |
| 426 &site_identity_details_); | 419 &site_identity_details_); |
| 427 } else if (certificate_ && | 420 } else if (certificate_ && |
| 428 (!net::IsCertStatusError(security_info.cert_status) || | 421 (!net::IsCertStatusError(security_info.cert_status) || |
| 429 net::IsCertStatusMinorError(security_info.cert_status))) { | 422 net::IsCertStatusMinorError(security_info.cert_status))) { |
| 430 // HTTPS with no or minor errors. | 423 // HTTPS with no or minor errors. |
| 431 if (security_info.security_level == | 424 if (security_info.security_level == |
| 432 SecurityStateModel::SECURE_WITH_POLICY_INSTALLED_CERT) { | 425 security_state::SECURE_WITH_POLICY_INSTALLED_CERT) { |
| 433 site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT; | 426 site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT; |
| 434 site_identity_details_ = l10n_util::GetStringFUTF16( | 427 site_identity_details_ = l10n_util::GetStringFUTF16( |
| 435 IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host())); | 428 IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host())); |
| 436 } else if (net::IsCertStatusMinorError(security_info.cert_status)) { | 429 } else if (net::IsCertStatusMinorError(security_info.cert_status)) { |
| 437 site_identity_status_ = SITE_IDENTITY_STATUS_CERT_REVOCATION_UNKNOWN; | 430 site_identity_status_ = SITE_IDENTITY_STATUS_CERT_REVOCATION_UNKNOWN; |
| 438 base::string16 issuer_name( | 431 base::string16 issuer_name( |
| 439 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); | 432 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); |
| 440 if (issuer_name.empty()) { | 433 if (issuer_name.empty()) { |
| 441 issuer_name.assign(l10n_util::GetStringUTF16( | 434 issuer_name.assign(l10n_util::GetStringUTF16( |
| 442 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); | 435 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); |
| (...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 494 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); | 487 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); |
| 495 if (issuer_name.empty()) { | 488 if (issuer_name.empty()) { |
| 496 issuer_name.assign(l10n_util::GetStringUTF16( | 489 issuer_name.assign(l10n_util::GetStringUTF16( |
| 497 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); | 490 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); |
| 498 } | 491 } |
| 499 | 492 |
| 500 site_identity_details_.assign(l10n_util::GetStringFUTF16( | 493 site_identity_details_.assign(l10n_util::GetStringFUTF16( |
| 501 IDS_PAGE_INFO_SECURITY_TAB_SECURE_IDENTITY_VERIFIED, issuer_name)); | 494 IDS_PAGE_INFO_SECURITY_TAB_SECURE_IDENTITY_VERIFIED, issuer_name)); |
| 502 } | 495 } |
| 503 switch (security_info.sha1_deprecation_status) { | 496 switch (security_info.sha1_deprecation_status) { |
| 504 case SecurityStateModel::DEPRECATED_SHA1_MINOR: | 497 case security_state::DEPRECATED_SHA1_MINOR: |
| 505 site_identity_status_ = | 498 site_identity_status_ = |
| 506 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR; | 499 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR; |
| 507 site_identity_details_ += | 500 site_identity_details_ += |
| 508 UTF8ToUTF16("\n\n") + | 501 UTF8ToUTF16("\n\n") + |
| 509 l10n_util::GetStringUTF16( | 502 l10n_util::GetStringUTF16( |
| 510 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINO
R); | 503 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINO
R); |
| 511 break; | 504 break; |
| 512 case SecurityStateModel::DEPRECATED_SHA1_MAJOR: | 505 case security_state::DEPRECATED_SHA1_MAJOR: |
| 513 site_identity_status_ = | 506 site_identity_status_ = |
| 514 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR; | 507 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR; |
| 515 site_identity_details_ += | 508 site_identity_details_ += |
| 516 UTF8ToUTF16("\n\n") + | 509 UTF8ToUTF16("\n\n") + |
| 517 l10n_util::GetStringUTF16( | 510 l10n_util::GetStringUTF16( |
| 518 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJO
R); | 511 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJO
R); |
| 519 break; | 512 break; |
| 520 case SecurityStateModel::NO_DEPRECATED_SHA1: | 513 case security_state::NO_DEPRECATED_SHA1: |
| 521 // Nothing to do. | 514 // Nothing to do. |
| 522 break; | 515 break; |
| 523 case SecurityStateModel::UNKNOWN_SHA1: | 516 case security_state::UNKNOWN_SHA1: |
| 524 // UNKNOWN_SHA1 should only appear when certificate info has not been | 517 // UNKNOWN_SHA1 should only appear when certificate info has not been |
| 525 // initialized, in which case this if-statement should not be running | 518 // initialized, in which case this if-statement should not be running |
| 526 // because there is no other cert info. | 519 // because there is no other cert info. |
| 527 NOTREACHED(); | 520 NOTREACHED(); |
| 528 } | 521 } |
| 529 } | 522 } |
| 530 } else { | 523 } else { |
| 531 // HTTP or HTTPS with errors (not warnings). | 524 // HTTP or HTTPS with errors (not warnings). |
| 532 site_identity_details_.assign(l10n_util::GetStringUTF16( | 525 site_identity_details_.assign(l10n_util::GetStringUTF16( |
| 533 IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY)); | 526 IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY)); |
| (...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 569 // loaded over HTTP or loaded over HTTPS with no cert. | 562 // loaded over HTTP or loaded over HTTPS with no cert. |
| 570 site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED; | 563 site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED; |
| 571 | 564 |
| 572 site_connection_details_.assign(l10n_util::GetStringFUTF16( | 565 site_connection_details_.assign(l10n_util::GetStringFUTF16( |
| 573 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, | 566 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, |
| 574 subject_name)); | 567 subject_name)); |
| 575 } else if (security_info.security_bits < 0) { | 568 } else if (security_info.security_bits < 0) { |
| 576 // Security strength is unknown. Say nothing. | 569 // Security strength is unknown. Say nothing. |
| 577 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; | 570 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; |
| 578 } else if (security_info.security_bits == 0) { | 571 } else if (security_info.security_bits == 0) { |
| 579 DCHECK_NE(security_info.security_level, SecurityStateModel::NONE); | 572 DCHECK_NE(security_info.security_level, security_state::NONE); |
| 580 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; | 573 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; |
| 581 site_connection_details_.assign(l10n_util::GetStringFUTF16( | 574 site_connection_details_.assign(l10n_util::GetStringFUTF16( |
| 582 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, | 575 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, |
| 583 subject_name)); | 576 subject_name)); |
| 584 } else { | 577 } else { |
| 585 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED; | 578 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED; |
| 586 | 579 |
| 587 if (security_info.obsolete_ssl_status == net::OBSOLETE_SSL_NONE) { | 580 if (security_info.obsolete_ssl_status == net::OBSOLETE_SSL_NONE) { |
| 588 site_connection_details_.assign(l10n_util::GetStringFUTF16( | 581 site_connection_details_.assign(l10n_util::GetStringFUTF16( |
| 589 IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_CONNECTION_TEXT, | 582 IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_CONNECTION_TEXT, |
| (...skipping 209 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 799 info.connection_status = site_connection_status_; | 792 info.connection_status = site_connection_status_; |
| 800 info.connection_status_description = | 793 info.connection_status_description = |
| 801 UTF16ToUTF8(site_connection_details_); | 794 UTF16ToUTF8(site_connection_details_); |
| 802 info.identity_status = site_identity_status_; | 795 info.identity_status = site_identity_status_; |
| 803 info.identity_status_description = | 796 info.identity_status_description = |
| 804 UTF16ToUTF8(site_identity_details_); | 797 UTF16ToUTF8(site_identity_details_); |
| 805 info.certificate = certificate_; | 798 info.certificate = certificate_; |
| 806 info.show_ssl_decision_revoke_button = show_ssl_decision_revoke_button_; | 799 info.show_ssl_decision_revoke_button = show_ssl_decision_revoke_button_; |
| 807 ui_->SetIdentityInfo(info); | 800 ui_->SetIdentityInfo(info); |
| 808 } | 801 } |
| OLD | NEW |