Index: chrome/browser/ui/website_settings/website_settings.cc |
diff --git a/chrome/browser/ui/website_settings/website_settings.cc b/chrome/browser/ui/website_settings/website_settings.cc |
index d47438908130ae9f0d28540ed0eeebb3586b47a0..c9f7f05187311c4fbace39e27234ef45b01db070 100644 |
--- a/chrome/browser/ui/website_settings/website_settings.cc |
+++ b/chrome/browser/ui/website_settings/website_settings.cc |
@@ -82,7 +82,6 @@ using base::ASCIIToUTF16; |
using base::UTF8ToUTF16; |
using base::UTF16ToUTF8; |
using content::BrowserThread; |
-using security_state::SecurityStateModel; |
namespace { |
@@ -126,28 +125,28 @@ bool ShouldShowPermission(ContentSettingsType type) { |
return true; |
} |
-void CheckContentStatus(SecurityStateModel::ContentStatus content_status, |
+void CheckContentStatus(security_state::ContentStatus content_status, |
bool* displayed, |
bool* ran) { |
switch (content_status) { |
- case SecurityStateModel::CONTENT_STATUS_DISPLAYED: |
+ case security_state::CONTENT_STATUS_DISPLAYED: |
*displayed = true; |
break; |
- case SecurityStateModel::CONTENT_STATUS_RAN: |
+ case security_state::CONTENT_STATUS_RAN: |
*ran = true; |
break; |
- case SecurityStateModel::CONTENT_STATUS_DISPLAYED_AND_RAN: |
+ case security_state::CONTENT_STATUS_DISPLAYED_AND_RAN: |
*displayed = true; |
*ran = true; |
break; |
- case SecurityStateModel::CONTENT_STATUS_UNKNOWN: |
- case SecurityStateModel::CONTENT_STATUS_NONE: |
+ case security_state::CONTENT_STATUS_UNKNOWN: |
+ case security_state::CONTENT_STATUS_NONE: |
break; |
} |
} |
void CheckForInsecureContent( |
- const SecurityStateModel::SecurityInfo& security_info, |
+ const security_state::SecurityInfo& security_info, |
bool* displayed, |
bool* ran) { |
CheckContentStatus(security_info.mixed_content_status, displayed, ran); |
@@ -165,27 +164,24 @@ void CheckForInsecureContent( |
} |
void GetSiteIdentityByMaliciousContentStatus( |
- security_state::SecurityStateModel::MaliciousContentStatus |
- malicious_content_status, |
+ security_state::MaliciousContentStatus malicious_content_status, |
WebsiteSettings::SiteIdentityStatus* status, |
base::string16* details) { |
switch (malicious_content_status) { |
- case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE: |
+ case security_state::MALICIOUS_CONTENT_STATUS_NONE: |
NOTREACHED(); |
break; |
- case security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_MALWARE: |
+ case security_state::MALICIOUS_CONTENT_STATUS_MALWARE: |
*status = WebsiteSettings::SITE_IDENTITY_STATUS_MALWARE; |
*details = |
l10n_util::GetStringUTF16(IDS_WEBSITE_SETTINGS_MALWARE_DETAILS); |
break; |
- case security_state::SecurityStateModel:: |
- MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING: |
+ case security_state::MALICIOUS_CONTENT_STATUS_SOCIAL_ENGINEERING: |
*status = WebsiteSettings::SITE_IDENTITY_STATUS_SOCIAL_ENGINEERING; |
*details = l10n_util::GetStringUTF16( |
IDS_WEBSITE_SETTINGS_SOCIAL_ENGINEERING_DETAILS); |
break; |
- case security_state::SecurityStateModel:: |
- MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE: |
+ case security_state::MALICIOUS_CONTENT_STATUS_UNWANTED_SOFTWARE: |
*status = WebsiteSettings::SITE_IDENTITY_STATUS_UNWANTED_SOFTWARE; |
*details = l10n_util::GetStringUTF16( |
IDS_WEBSITE_SETTINGS_UNWANTED_SOFTWARE_DETAILS); |
@@ -219,7 +215,7 @@ WebsiteSettings::WebsiteSettings( |
TabSpecificContentSettings* tab_specific_content_settings, |
content::WebContents* web_contents, |
const GURL& url, |
- const SecurityStateModel::SecurityInfo& security_info) |
+ const security_state::SecurityInfo& security_info) |
: TabSpecificContentSettings::SiteDataObserver( |
tab_specific_content_settings), |
content::WebContentsObserver(web_contents), |
@@ -234,7 +230,7 @@ WebsiteSettings::WebsiteSettings( |
ChromeSSLHostStateDelegateFactory::GetForProfile(profile)), |
did_revoke_user_ssl_decisions_(false), |
profile_(profile), |
- security_level_(security_state::SecurityStateModel::NONE) { |
+ security_level_(security_state::NONE) { |
Init(url, security_info); |
PresentSitePermissions(); |
@@ -258,26 +254,24 @@ void WebsiteSettings::RecordWebsiteSettingsAction( |
std::string histogram_name; |
if (site_url_.SchemeIsCryptographic()) { |
- if (security_level_ == security_state::SecurityStateModel::SECURE || |
- security_level_ == security_state::SecurityStateModel::EV_SECURE) { |
+ if (security_level_ == security_state::SECURE || |
+ security_level_ == security_state::EV_SECURE) { |
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Valid", |
action, WEBSITE_SETTINGS_COUNT); |
- } else if (security_level_ == security_state::SecurityStateModel::NONE) { |
+ } else if (security_level_ == security_state::NONE) { |
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Downgraded", |
action, WEBSITE_SETTINGS_COUNT); |
- } else if (security_level_ == |
- security_state::SecurityStateModel::DANGEROUS) { |
+ } else if (security_level_ == security_state::DANGEROUS) { |
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpsUrl.Dangerous", |
action, WEBSITE_SETTINGS_COUNT); |
} |
return; |
} |
- if (security_level_ == |
- security_state::SecurityStateModel::HTTP_SHOW_WARNING) { |
+ if (security_level_ == security_state::HTTP_SHOW_WARNING) { |
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Warning", |
action, WEBSITE_SETTINGS_COUNT); |
- } else if (security_level_ == security_state::SecurityStateModel::DANGEROUS) { |
+ } else if (security_level_ == security_state::DANGEROUS) { |
UMA_HISTOGRAM_ENUMERATION("Security.PageInfo.Action.HttpUrl.Dangerous", |
action, WEBSITE_SETTINGS_COUNT); |
} else { |
@@ -375,9 +369,8 @@ void WebsiteSettings::OnRevokeSSLErrorBypassButtonPressed() { |
did_revoke_user_ssl_decisions_ = true; |
} |
-void WebsiteSettings::Init( |
- const GURL& url, |
- const SecurityStateModel::SecurityInfo& security_info) { |
+void WebsiteSettings::Init(const GURL& url, |
+ const security_state::SecurityInfo& security_info) { |
#if !defined(OS_ANDROID) && !defined(OS_IOS) |
// On desktop, internal URLs aren't handled by this class. Instead, a |
// custom and simpler popup is shown. |
@@ -419,7 +412,7 @@ void WebsiteSettings::Init( |
certificate_ = security_info.certificate; |
if (security_info.malicious_content_status != |
- security_state::SecurityStateModel::MALICIOUS_CONTENT_STATUS_NONE) { |
+ security_state::MALICIOUS_CONTENT_STATUS_NONE) { |
// The site has been flagged by Safe Browsing as dangerous. |
GetSiteIdentityByMaliciousContentStatus( |
security_info.malicious_content_status, &site_identity_status_, |
@@ -429,7 +422,7 @@ void WebsiteSettings::Init( |
net::IsCertStatusMinorError(security_info.cert_status))) { |
// HTTPS with no or minor errors. |
if (security_info.security_level == |
- SecurityStateModel::SECURE_WITH_POLICY_INSTALLED_CERT) { |
+ security_state::SECURE_WITH_POLICY_INSTALLED_CERT) { |
site_identity_status_ = SITE_IDENTITY_STATUS_ADMIN_PROVIDED_CERT; |
site_identity_details_ = l10n_util::GetStringFUTF16( |
IDS_CERT_POLICY_PROVIDED_CERT_MESSAGE, UTF8ToUTF16(url.host())); |
@@ -501,7 +494,7 @@ void WebsiteSettings::Init( |
IDS_PAGE_INFO_SECURITY_TAB_SECURE_IDENTITY_VERIFIED, issuer_name)); |
} |
switch (security_info.sha1_deprecation_status) { |
- case SecurityStateModel::DEPRECATED_SHA1_MINOR: |
+ case security_state::DEPRECATED_SHA1_MINOR: |
site_identity_status_ = |
SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MINOR; |
site_identity_details_ += |
@@ -509,7 +502,7 @@ void WebsiteSettings::Init( |
l10n_util::GetStringUTF16( |
IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MINOR); |
break; |
- case SecurityStateModel::DEPRECATED_SHA1_MAJOR: |
+ case security_state::DEPRECATED_SHA1_MAJOR: |
site_identity_status_ = |
SITE_IDENTITY_STATUS_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR; |
site_identity_details_ += |
@@ -517,10 +510,10 @@ void WebsiteSettings::Init( |
l10n_util::GetStringUTF16( |
IDS_PAGE_INFO_SECURITY_TAB_DEPRECATED_SIGNATURE_ALGORITHM_MAJOR); |
break; |
- case SecurityStateModel::NO_DEPRECATED_SHA1: |
+ case security_state::NO_DEPRECATED_SHA1: |
// Nothing to do. |
break; |
- case SecurityStateModel::UNKNOWN_SHA1: |
+ case security_state::UNKNOWN_SHA1: |
// UNKNOWN_SHA1 should only appear when certificate info has not been |
// initialized, in which case this if-statement should not be running |
// because there is no other cert info. |
@@ -576,7 +569,7 @@ void WebsiteSettings::Init( |
// Security strength is unknown. Say nothing. |
site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; |
} else if (security_info.security_bits == 0) { |
- DCHECK_NE(security_info.security_level, SecurityStateModel::NONE); |
+ DCHECK_NE(security_info.security_level, security_state::NONE); |
site_connection_status_ = SITE_CONNECTION_STATUS_ENCRYPTED_ERROR; |
site_connection_details_.assign(l10n_util::GetStringFUTF16( |
IDS_PAGE_INFO_SECURITY_TAB_NOT_ENCRYPTED_CONNECTION_TEXT, |