Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(14)

Side by Side Diff: chrome/browser/ssl/captive_portal_blocking_page.cc

Issue 2526543002: Fix privacy whitepaper link (Closed)
Patch Set: add back change in captive_portal_blocking_page Created 4 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/browser/safe_browsing/safe_browsing_blocking_page.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/ssl/captive_portal_blocking_page.h" 5 #include "chrome/browser/ssl/captive_portal_blocking_page.h"
6 6
7 #include <utility> 7 #include <utility>
8 8
9 #include "base/i18n/rtl.h" 9 #include "base/i18n/rtl.h"
10 #include "base/memory/ptr_util.h" 10 #include "base/memory/ptr_util.h"
(...skipping 215 matching lines...) Expand 10 before | Expand all | Expand 10 after
226 break; 226 break;
227 case security_interstitials::CMD_DO_REPORT: 227 case security_interstitials::CMD_DO_REPORT:
228 controller()->SetReportingPreference(true); 228 controller()->SetReportingPreference(true);
229 break; 229 break;
230 case security_interstitials::CMD_DONT_REPORT: 230 case security_interstitials::CMD_DONT_REPORT:
231 controller()->SetReportingPreference(false); 231 controller()->SetReportingPreference(false);
232 break; 232 break;
233 case security_interstitials::CMD_OPEN_REPORTING_PRIVACY: 233 case security_interstitials::CMD_OPEN_REPORTING_PRIVACY:
234 controller()->OpenExtendedReportingPrivacyPolicy(); 234 controller()->OpenExtendedReportingPrivacyPolicy();
235 break; 235 break;
236 case security_interstitials::CMD_OPEN_WHITEPAPER:
237 controller()->OpenExtendedReportingWhitepaper();
238 break;
236 case security_interstitials::CMD_ERROR: 239 case security_interstitials::CMD_ERROR:
237 case security_interstitials::CMD_TEXT_FOUND: 240 case security_interstitials::CMD_TEXT_FOUND:
238 case security_interstitials::CMD_TEXT_NOT_FOUND: 241 case security_interstitials::CMD_TEXT_NOT_FOUND:
239 // Commands are for testing. 242 // Commands are for testing.
240 break; 243 break;
241 default: 244 default:
242 NOTREACHED() << "Command " << cmd 245 NOTREACHED() << "Command " << cmd
243 << " isn't handled by the captive portal interstitial."; 246 << " isn't handled by the captive portal interstitial.";
244 } 247 }
245 } 248 }
(...skipping 15 matching lines...) Expand all
261 certificate_reporting::ErrorReport::USER_DID_NOT_PROCEED); 264 certificate_reporting::ErrorReport::USER_DID_NOT_PROCEED);
262 } 265 }
263 266
264 // Need to explicity deny the certificate via the callback, otherwise memory 267 // Need to explicity deny the certificate via the callback, otherwise memory
265 // is leaked. 268 // is leaked.
266 if (!callback_.is_null()) { 269 if (!callback_.is_null()) {
267 callback_.Run(content::CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL); 270 callback_.Run(content::CERTIFICATE_REQUEST_RESULT_TYPE_CANCEL);
268 callback_.Reset(); 271 callback_.Reset();
269 } 272 }
270 } 273 }
OLDNEW
« no previous file with comments | « chrome/browser/safe_browsing/safe_browsing_blocking_page.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698