Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(308)

Side by Side Diff: chrome/browser/ui/website_settings/website_settings.cc

Issue 2448943002: Refactor SecurityStateModel/Clients for simplicity and reusability. (Closed)
Patch Set: sync. Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ui/website_settings/website_settings.h" 5 #include "chrome/browser/ui/website_settings/website_settings.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include <string> 10 #include <string>
(...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after
75 75
76 #if !defined(OS_ANDROID) 76 #if !defined(OS_ANDROID)
77 #include "chrome/browser/ui/exclusive_access/exclusive_access_manager.h" 77 #include "chrome/browser/ui/exclusive_access/exclusive_access_manager.h"
78 #include "chrome/browser/ui/website_settings/website_settings_infobar_delegate.h " 78 #include "chrome/browser/ui/website_settings/website_settings_infobar_delegate.h "
79 #endif 79 #endif
80 80
81 using base::ASCIIToUTF16; 81 using base::ASCIIToUTF16;
82 using base::UTF8ToUTF16; 82 using base::UTF8ToUTF16;
83 using base::UTF16ToUTF8; 83 using base::UTF16ToUTF8;
84 using content::BrowserThread; 84 using content::BrowserThread;
85 using security_state::SecurityStateModel;
86 85
87 namespace { 86 namespace {
88 87
89 // Events for UMA. Do not reorder or change! 88 // Events for UMA. Do not reorder or change!
90 enum SSLCertificateDecisionsDidRevoke { 89 enum SSLCertificateDecisionsDidRevoke {
91 USER_CERT_DECISIONS_NOT_REVOKED = 0, 90 USER_CERT_DECISIONS_NOT_REVOKED = 0,
92 USER_CERT_DECISIONS_REVOKED, 91 USER_CERT_DECISIONS_REVOKED,
93 END_OF_SSL_CERTIFICATE_DECISIONS_DID_REVOKE_ENUM 92 END_OF_SSL_CERTIFICATE_DECISIONS_DID_REVOKE_ENUM
94 }; 93 };
95 94
(...skipping 23 matching lines...) Expand all
119 bool ShouldShowPermission(ContentSettingsType type) { 118 bool ShouldShowPermission(ContentSettingsType type) {
120 #if !defined(OS_ANDROID) 119 #if !defined(OS_ANDROID)
121 // Autoplay is Android-only at the moment. 120 // Autoplay is Android-only at the moment.
122 if (type == CONTENT_SETTINGS_TYPE_AUTOPLAY) 121 if (type == CONTENT_SETTINGS_TYPE_AUTOPLAY)
123 return false; 122 return false;
124 #endif 123 #endif
125 124
126 return true; 125 return true;
127 } 126 }
128 127
129 void CheckContentStatus(SecurityStateModel::ContentStatus content_status, 128 void CheckContentStatus(security_state::ContentStatus content_status,
130 bool* displayed, 129 bool* displayed,
131 bool* ran) { 130 bool* ran) {
132 switch (content_status) { 131 switch (content_status) {
133 case SecurityStateModel::CONTENT_STATUS_DISPLAYED: 132 case security_state::CONTENT_STATUS_DISPLAYED:
134 *displayed = true; 133 *displayed = true;
135 break; 134 break;
136 case SecurityStateModel::CONTENT_STATUS_RAN: 135 case security_state::CONTENT_STATUS_RAN:
137 *ran = true; 136 *ran = true;
138 break; 137 break;
139 case SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN: 138 case security_state::CONTENT_STATUS_DISPLAYED_AND_RAN:
140 *displayed = true; 139 *displayed = true;
141 *ran = true; 140 *ran = true;
142 break; 141 break;
143 case SecurityStateModel::CONTENT_STATUS_UNKNOWN: 142 case security_state::CONTENT_STATUS_UNKNOWN:
144 case SecurityStateModel::CONTENT_STATUS_NONE: 143 case security_state::CONTENT_STATUS_NONE:
145 break; 144 break;
146 } 145 }
147 } 146 }
148 147
149 void CheckForInsecureContent( 148 void CheckForInsecureContent(
150 const SecurityStateModel::SecurityInfo& security_info, 149 const security_state::SecurityInfo& security_info,
151 bool* displayed, 150 bool* displayed,
152 bool* ran) { 151 bool* ran) {
153 CheckContentStatus(security_info.mixed_content_status, displayed, ran); 152 CheckContentStatus(security_info.mixed_content_status, displayed, ran);
154 // Only consider subresources with certificate errors if the main 153 // Only consider subresources with certificate errors if the main
155 // resource was loaded over HTTPS without major certificate errors. If 154 // resource was loaded over HTTPS without major certificate errors. If
156 // the main resource had a certificate error, then it would not be 155 // the main resource had a certificate error, then it would not be
157 // that useful (and would potentially be confusing) to warn about 156 // that useful (and would potentially be confusing) to warn about
158 // subesources that had certificate errors too. 157 // subesources that had certificate errors too.
159 if (net::IsCertStatusError(security_info.cert_status) && 158 if (net::IsCertStatusError(security_info.cert_status) &&
160 !net::IsCertStatusMinorError(security_info.cert_status)) { 159 !net::IsCertStatusMinorError(security_info.cert_status)) {
161 return; 160 return;
162 } 161 }
163 CheckContentStatus(security_info.content_with_cert_errors_status, displayed, 162 CheckContentStatus(security_info.content_with_cert_errors_status, displayed,
164 ran); 163 ran);
165 } 164 }
166 165
167 void GetSiteIdentityByMaliciousContentStatus( 166 void GetSiteIdentityByMaliciousContentStatus(
168 security_state::SecurityStateModel::MaliciousContentStatus 167 security_state::MaliciousContentStatus malicious_content_status,
169 malicious_content_status,
170 WebsiteSettings::SiteIdentityStatus* status, 168 WebsiteSettings::SiteIdentityStatus* status,
171 base::string16* details) { 169 base::string16* details) {
172 switch (malicious_content_status) { 170 switch (malicious_content_status) {
173 case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE: 171 case security_state::MALICIOUS_CONTENT_STATUS_NONE:
174 NOTREACHED(); 172 NOTREACHED();
175 break; 173 break;
176 case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_MALWARE: 174 case security_state::MALICIOUS_CONTENT_STATUS_MALWARE:
177 *status = WebsiteSettings::SITE_IDENTITY_STATUS_MALWARE; 175 *status = WebsiteSettings::SITE_IDENTITY_STATUS_MALWARE;
178 *details = 176 *details =
179 l10n_util::GetStringUTF16(IDS_WEBSITE_SETTINGS_MALWARE_DETAILS); 177 l10n_util::GetStringUTF16(IDS_WEBSITE_SETTINGS_MALWARE_DETAILS);
180 break; 178 break;
181 case security_state::SecurityStateModel:: 179 case security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING:
182 MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING:
183 *status = WebsiteSettings::SITE_IDENTITY_STATUS_SOCIAL_ENGINEERING; 180 *status = WebsiteSettings::SITE_IDENTITY_STATUS_SOCIAL_ENGINEERING;
184 *details = l10n_util::GetStringUTF16( 181 *details = l10n_util::GetStringUTF16(
185 IDS_WEBSITE_SETTINGS_SOCIAL_ENGINEERING_DETAILS); 182 IDS_WEBSITE_SETTINGS_SOCIAL_ENGINEERING_DETAILS);
186 break; 183 break;
187 case security_state::SecurityStateModel:: 184 case security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE:
188 MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE:
189 *status = WebsiteSettings::SITE_IDENTITY_STATUS_UNWANTED_SOFTWARE; 185 *status = WebsiteSettings::SITE_IDENTITY_STATUS_UNWANTED_SOFTWARE;
190 *details = l10n_util::GetStringUTF16( 186 *details = l10n_util::GetStringUTF16(
191 IDS_WEBSITE_SETTINGS_UNWANTED_SOFTWARE_DETAILS); 187 IDS_WEBSITE_SETTINGS_UNWANTED_SOFTWARE_DETAILS);
192 break; 188 break;
193 } 189 }
194 } 190 }
195 191
196 base::string16 GetSimpleSiteName(const GURL& url) { 192 base::string16 GetSimpleSiteName(const GURL& url) {
197 return url_formatter::FormatUrlForSecurityDisplay( 193 return url_formatter::FormatUrlForSecurityDisplay(
198 url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS); 194 url, url_formatter::SchemeDisplay::OMIT_HTTP_AND_HTTPS);
(...skipping 13 matching lines...) Expand all
212 }; 208 };
213 209
214 } // namespace 210 } // namespace
215 211
216 WebsiteSettings::WebsiteSettings( 212 WebsiteSettings::WebsiteSettings(
217 WebsiteSettingsUI* ui, 213 WebsiteSettingsUI* ui,
218 Profile* profile, 214 Profile* profile,
219 TabSpecificContentSettings* tab_specific_content_settings, 215 TabSpecificContentSettings* tab_specific_content_settings,
220 content::WebContents* web_contents, 216 content::WebContents* web_contents,
221 const GURL& url, 217 const GURL& url,
222 const SecurityStateModel::SecurityInfo& security_info) 218 const security_state::SecurityInfo& security_info)
223 : TabSpecificContentSettings::SiteDataObserver( 219 : TabSpecificContentSettings::SiteDataObserver(
224 tab_specific_content_settings), 220 tab_specific_content_settings),
225 content::WebContentsObserver(web_contents), 221 content::WebContentsObserver(web_contents),
226 ui_(ui), 222 ui_(ui),
227 show_info_bar_(false), 223 show_info_bar_(false),
228 site_url_(url), 224 site_url_(url),
229 site_identity_status_(SITE_IDENTITY_STATUS_UNKNOWN), 225 site_identity_status_(SITE_IDENTITY_STATUS_UNKNOWN),
230 site_connection_status_(SITE_CONNECTION_STATUS_UNKNOWN), 226 site_connection_status_(SITE_CONNECTION_STATUS_UNKNOWN),
231 show_ssl_decision_revoke_button_(false), 227 show_ssl_decision_revoke_button_(false),
232 content_settings_(HostContentSettingsMapFactory::GetForProfile(profile)), 228 content_settings_(HostContentSettingsMapFactory::GetForProfile(profile)),
233 chrome_ssl_host_state_delegate_( 229 chrome_ssl_host_state_delegate_(
234 ChromeSSLHostStateDelegateFactory::GetForProfile(profile)), 230 ChromeSSLHostStateDelegateFactory::GetForProfile(profile)),
235 did_revoke_user_ssl_decisions_(false), 231 did_revoke_user_ssl_decisions_(false),
236 profile_(profile), 232 profile_(profile),
237 security_level_(security_state::SecurityStateModel::NONE) { 233 security_level_(security_state::NONE) {
238 Init(url, security_info); 234 Init(url, security_info);
239 235
240 PresentSitePermissions(); 236 PresentSitePermissions();
241 PresentSiteData(); 237 PresentSiteData();
242 PresentSiteIdentity(); 238 PresentSiteIdentity();
243 239
244 // Every time the Website Settings UI is opened a |WebsiteSettings| object is 240 // Every time the Website Settings UI is opened a |WebsiteSettings| object is
245 // created. So this counts how ofter the Website Settings UI is opened. 241 // created. So this counts how ofter the Website Settings UI is opened.
246 RecordWebsiteSettingsAction(WEBSITE_SETTINGS_OPENED); 242 RecordWebsiteSettingsAction(WEBSITE_SETTINGS_OPENED);
247 } 243 }
248 244
249 WebsiteSettings::~WebsiteSettings() { 245 WebsiteSettings::~WebsiteSettings() {
250 } 246 }
251 247
252 void WebsiteSettings::RecordWebsiteSettingsAction( 248 void WebsiteSettings::RecordWebsiteSettingsAction(
253 WebsiteSettingsAction action) { 249 WebsiteSettingsAction action) {
254 UMA_HISTOGRAM_ENUMERATION("WebsiteSettings.Action", 250 UMA_HISTOGRAM_ENUMERATION("WebsiteSettings.Action",
255 action, 251 action,
256 WEBSITE_SETTINGS_COUNT); 252 WEBSITE_SETTINGS_COUNT);
257 253
258 std::string histogram_name; 254 std::string histogram_name;
259 255
260 if (site_url_.SchemeIsCryptographic()) { 256 if (site_url_.SchemeIsCryptographic()) {
261 if (security_level_ == security_state::SecurityStateModel::SECURE || 257 if (security_level_ == security_state::SECURE ||
262 security_level_ == security_state::SecurityStateModel::EV_SECURE) { 258 security_level_ == security_state::EV_SECURE) {
263 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid", 259 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid",
264 action, WEBSITE_SETTINGS_COUNT); 260 action, WEBSITE_SETTINGS_COUNT);
265 } else if (security_level_ == security_state::SecurityStateModel::NONE) { 261 } else if (security_level_ == security_state::NONE) {
266 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded", 262 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded",
267 action, WEBSITE_SETTINGS_COUNT); 263 action, WEBSITE_SETTINGS_COUNT);
268 } else if (security_level_ == 264 } else if (security_level_ == security_state::DANGEROUS) {
269 security_state::SecurityStateModel::DANGEROUS) {
270 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous", 265 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous",
271 action, WEBSITE_SETTINGS_COUNT); 266 action, WEBSITE_SETTINGS_COUNT);
272 } 267 }
273 return; 268 return;
274 } 269 }
275 270
276 if (security_level_ == 271 if (security_level_ == security_state::HTTP_SHOW_WARNING) {
277 security_state::SecurityStateModel::HTTP_SHOW_WARNING) {
278 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning", 272 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning",
279 action, WEBSITE_SETTINGS_COUNT); 273 action, WEBSITE_SETTINGS_COUNT);
280 } else if (security_level_ == security_state::SecurityStateModel::DANGEROUS) { 274 } else if (security_level_ == security_state::DANGEROUS) {
281 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous", 275 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous",
282 action, WEBSITE_SETTINGS_COUNT); 276 action, WEBSITE_SETTINGS_COUNT);
283 } else { 277 } else {
284 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Neutral", 278 UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Neutral",
285 action, WEBSITE_SETTINGS_COUNT); 279 action, WEBSITE_SETTINGS_COUNT);
286 } 280 }
287 } 281 }
288 282
289 void WebsiteSettings::OnSitePermissionChanged(ContentSettingsType type, 283 void WebsiteSettings::OnSitePermissionChanged(ContentSettingsType type,
290 ContentSetting setting) { 284 ContentSetting setting) {
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after
368 #endif 362 #endif
369 } 363 }
370 364
371 void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() { 365 void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() {
372 DCHECK(chrome_ssl_host_state_delegate_); 366 DCHECK(chrome_ssl_host_state_delegate_);
373 chrome_ssl_host_state_delegate_->RevokeUserAllowExceptionsHard( 367 chrome_ssl_host_state_delegate_->RevokeUserAllowExceptionsHard(
374 site_url().host()); 368 site_url().host());
375 did_revoke_user_ssl_decisions_ = true; 369 did_revoke_user_ssl_decisions_ = true;
376 } 370 }
377 371
378 void WebsiteSettings::Init( 372 void WebsiteSettings::Init(const GURL& url,
379 const GURL& url, 373 const security_state::SecurityInfo& security_info) {
380 const SecurityStateModel::SecurityInfo& security_info) {
381 #if !defined(OS_ANDROID) && !defined(OS_IOS) 374 #if !defined(OS_ANDROID) && !defined(OS_IOS)
382 // On desktop, internal URLs aren't handled by this class. Instead, a 375 // On desktop, internal URLs aren't handled by this class. Instead, a
383 // custom and simpler popup is shown. 376 // custom and simpler popup is shown.
384 DCHECK(!url.SchemeIs(content::kChromeUIScheme) && 377 DCHECK(!url.SchemeIs(content::kChromeUIScheme) &&
385 !url.SchemeIs(content::kChromeDevToolsScheme) && 378 !url.SchemeIs(content::kChromeDevToolsScheme) &&
386 !url.SchemeIs(content::kViewSourceScheme) && 379 !url.SchemeIs(content::kViewSourceScheme) &&
387 !url.SchemeIs(content_settings::kExtensionScheme)); 380 !url.SchemeIs(content_settings::kExtensionScheme));
388 #endif 381 #endif
389 382
390 bool isChromeUINativeScheme = false; 383 bool isChromeUINativeScheme = false;
(...skipping 21 matching lines...) Expand all
412 site_identity_details_ = 405 site_identity_details_ =
413 l10n_util::GetStringUTF16(IDS_PAGE_INFO_INTERNAL_PAGE); 406 l10n_util::GetStringUTF16(IDS_PAGE_INFO_INTERNAL_PAGE);
414 site_connection_status_ = SITE_CONNECTION_STATUS_INTERNAL_PAGE; 407 site_connection_status_ = SITE_CONNECTION_STATUS_INTERNAL_PAGE;
415 return; 408 return;
416 } 409 }
417 410
418 // Identity section. 411 // Identity section.
419 certificate_ = security_info.certificate; 412 certificate_ = security_info.certificate;
420 413
421 if (security_info.malicious_content_status != 414 if (security_info.malicious_content_status !=
422 security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE) { 415 security_state::MALICIOUS_CONTENT_STATUS_NONE) {
423 // The site has been flagged by Safe Browsing as dangerous. 416 // The site has been flagged by Safe Browsing as dangerous.
424 GetSiteIdentityByMaliciousContentStatus( 417 GetSiteIdentityByMaliciousContentStatus(
425 security_info.malicious_content_status, &site_identity_status_, 418 security_info.malicious_content_status, &site_identity_status_,
426 &site_identity_details_); 419 &site_identity_details_);
427 } else if (certificate_ && 420 } else if (certificate_ &&
428 (!net::IsCertStatusError(security_info.cert_status) || 421 (!net::IsCertStatusError(security_info.cert_status) ||
429 net::IsCertStatusMinorError(security_info.cert_status))) { 422 net::IsCertStatusMinorError(security_info.cert_status))) {
430 // HTTPS with no or minor errors. 423 // HTTPS with no or minor errors.
431 if (security_info.security_level == 424 if (security_info.security_level ==
432 SecurityStateModel::SECURE_WITH_POLICY_INSTALLED_CERT) { 425 security_state::SECURE_WITH_POLICY_INSTALLED_CERT) {
433 site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT; 426 site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT;
434 site_identity_details_ = l10n_util::GetStringFUTF16( 427 site_identity_details_ = l10n_util::GetStringFUTF16(
435 IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host())); 428 IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host()));
436 } else if (net::IsCertStatusMinorError(security_info.cert_status)) { 429 } else if (net::IsCertStatusMinorError(security_info.cert_status)) {
437 site_identity_status_ = SITE_IDENTITY_STATUS_CERT_REVOCATION_UNKNOWN; 430 site_identity_status_ = SITE_IDENTITY_STATUS_CERT_REVOCATION_UNKNOWN;
438 base::string16 issuer_name( 431 base::string16 issuer_name(
439 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); 432 UTF8ToUTF16(certificate_->issuer().GetDisplayName()));
440 if (issuer_name.empty()) { 433 if (issuer_name.empty()) {
441 issuer_name.assign(l10n_util::GetStringUTF16( 434 issuer_name.assign(l10n_util::GetStringUTF16(
442 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); 435 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY));
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after
494 UTF8ToUTF16(certificate_->issuer().GetDisplayName())); 487 UTF8ToUTF16(certificate_->issuer().GetDisplayName()));
495 if (issuer_name.empty()) { 488 if (issuer_name.empty()) {
496 issuer_name.assign(l10n_util::GetStringUTF16( 489 issuer_name.assign(l10n_util::GetStringUTF16(
497 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY)); 490 IDS_PAGE_INFO_SECURITY_TAB_UNKNOWN_PARTY));
498 } 491 }
499 492
500 site_identity_details_.assign(l10n_util::GetStringFUTF16( 493 site_identity_details_.assign(l10n_util::GetStringFUTF16(
501 IDS_PAGE_INFO_SECURITY_TAB_SECURE_IDENTITY_VERIFIED, issuer_name)); 494 IDS_PAGE_INFO_SECURITY_TAB_SECURE_IDENTITY_VERIFIED, issuer_name));
502 } 495 }
503 switch (security_info.sha1_deprecation_status) { 496 switch (security_info.sha1_deprecation_status) {
504 case SecurityStateModel::DEPRECATED_SHA1_MINOR: 497 case security_state::DEPRECATED_SHA1_MINOR:
505 site_identity_status_ = 498 site_identity_status_ =
506 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR; 499 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR;
507 site_identity_details_ += 500 site_identity_details_ +=
508 UTF8ToUTF16("\n\n") + 501 UTF8ToUTF16("\n\n") +
509 l10n_util::GetStringUTF16( 502 l10n_util::GetStringUTF16(
510 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINO R); 503 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINO R);
511 break; 504 break;
512 case SecurityStateModel::DEPRECATED_SHA1_MAJOR: 505 case security_state::DEPRECATED_SHA1_MAJOR:
513 site_identity_status_ = 506 site_identity_status_ =
514 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR; 507 SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR;
515 site_identity_details_ += 508 site_identity_details_ +=
516 UTF8ToUTF16("\n\n") + 509 UTF8ToUTF16("\n\n") +
517 l10n_util::GetStringUTF16( 510 l10n_util::GetStringUTF16(
518 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJO R); 511 IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJO R);
519 break; 512 break;
520 case SecurityStateModel::NO_DEPRECATED_SHA1: 513 case security_state::NO_DEPRECATED_SHA1:
521 // Nothing to do. 514 // Nothing to do.
522 break; 515 break;
523 case SecurityStateModel::UNKNOWN_SHA1: 516 case security_state::UNKNOWN_SHA1:
524 // UNKNOWN_SHA1 should only appear when certificate info has not been 517 // UNKNOWN_SHA1 should only appear when certificate info has not been
525 // initialized, in which case this if-statement should not be running 518 // initialized, in which case this if-statement should not be running
526 // because there is no other cert info. 519 // because there is no other cert info.
527 NOTREACHED(); 520 NOTREACHED();
528 } 521 }
529 } 522 }
530 } else { 523 } else {
531 // HTTP or HTTPS with errors (not warnings). 524 // HTTP or HTTPS with errors (not warnings).
532 site_identity_details_.assign(l10n_util::GetStringUTF16( 525 site_identity_details_.assign(l10n_util::GetStringUTF16(
533 IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY)); 526 IDS_PAGE_INFO_SECURITY_TAB_INSECURE_IDENTITY));
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after
569 // loaded over HTTP or loaded over HTTPS with no cert. 562 // loaded over HTTP or loaded over HTTPS with no cert.
570 site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED; 563 site_connection_status_ = SITE_CONNECTION_STATUS_UNENCRYPTED;
571 564
572 site_connection_details_.assign(l10n_util::GetStringFUTF16( 565 site_connection_details_.assign(l10n_util::GetStringFUTF16(
573 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, 566 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT,
574 subject_name)); 567 subject_name));
575 } else if (security_info.security_bits < 0) { 568 } else if (security_info.security_bits < 0) {
576 // Security strength is unknown. Say nothing. 569 // Security strength is unknown. Say nothing.
577 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; 570 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR;
578 } else if (security_info.security_bits == 0) { 571 } else if (security_info.security_bits == 0) {
579 DCHECK_NE(security_info.security_level, SecurityStateModel::NONE); 572 DCHECK_NE(security_info.security_level, security_state::NONE);
580 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; 573 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR;
581 site_connection_details_.assign(l10n_util::GetStringFUTF16( 574 site_connection_details_.assign(l10n_util::GetStringFUTF16(
582 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, 575 IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT,
583 subject_name)); 576 subject_name));
584 } else { 577 } else {
585 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED; 578 site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED;
586 579
587 if (security_info.obsolete_ssl_status == net::OBSOLETE_SSL_NONE) { 580 if (security_info.obsolete_ssl_status == net::OBSOLETE_SSL_NONE) {
588 site_connection_details_.assign(l10n_util::GetStringFUTF16( 581 site_connection_details_.assign(l10n_util::GetStringFUTF16(
589 IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_CONNECTION_TEXT, 582 IDS_PAGE_INFO_SECURITY_TAB_ENCRYPTED_CONNECTION_TEXT,
(...skipping 209 matching lines...) Expand 10 before | Expand all | Expand 10 after
799 info.connection_status = site_connection_status_; 792 info.connection_status = site_connection_status_;
800 info.connection_status_description = 793 info.connection_status_description =
801 UTF16ToUTF8(site_connection_details_); 794 UTF16ToUTF8(site_connection_details_);
802 info.identity_status = site_identity_status_; 795 info.identity_status = site_identity_status_;
803 info.identity_status_description = 796 info.identity_status_description =
804 UTF16ToUTF8(site_identity_details_); 797 UTF16ToUTF8(site_identity_details_);
805 info.certificate = certificate_; 798 info.certificate = certificate_;
806 info.show_ssl_decision_revoke_button = show_ssl_decision_revoke_button_; 799 info.show_ssl_decision_revoke_button = show_ssl_decision_revoke_button_;
807 ui_->SetIdentityInfo(info); 800 ui_->SetIdentityInfo(info);
808 } 801 }
OLDNEW
« no previous file with comments | « chrome/browser/ui/website_settings/website_settings.h ('k') | chrome/browser/ui/website_settings/website_settings_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698