| Index: components/security_state/content/content_utils.cc
|
| diff --git a/components/security_state/content/content_utils.cc b/components/security_state/content/content_utils.cc
|
| index 8fd95ea24825c849373a4394ec518338b0a8535d..2f0df63eb978f20b4fed13d8c4bc7cadb2db21f7 100644
|
| --- a/components/security_state/content/content_utils.cc
|
| +++ b/components/security_state/content/content_utils.cc
|
| @@ -37,15 +37,15 @@ blink::WebSecurityStyle SecurityLevelToSecurityStyle(
|
| switch (security_level) {
|
| case security_state::NONE:
|
| case security_state::HTTP_SHOW_WARNING:
|
| - return blink::WebSecurityStyleUnauthenticated;
|
| + return blink::WebSecurityStyleNeutral;
|
| case security_state::SECURITY_WARNING:
|
| case security_state::SECURE_WITH_POLICY_INSTALLED_CERT:
|
| return blink::WebSecurityStyleWarning;
|
| case security_state::EV_SECURE:
|
| case security_state::SECURE:
|
| - return blink::WebSecurityStyleAuthenticated;
|
| + return blink::WebSecurityStyleSecure;
|
| case security_state::DANGEROUS:
|
| - return blink::WebSecurityStyleAuthenticationBroken;
|
| + return blink::WebSecurityStyleInsecure;
|
| }
|
|
|
| NOTREACHED();
|
| @@ -188,7 +188,7 @@ blink::WebSecurityStyle GetSecurityStyle(
|
| if (security_info.security_level == security_state::HTTP_SHOW_WARNING &&
|
| (security_info.displayed_password_field_on_http ||
|
| security_info.displayed_credit_card_field_on_http)) {
|
| - security_style_explanations->unauthenticated_explanations.push_back(
|
| + security_style_explanations->neutral_explanations.push_back(
|
| content::SecurityStyleExplanation(
|
| l10n_util::GetStringUTF8(IDS_PRIVATE_USER_DATA_INPUT),
|
| l10n_util::GetStringUTF8(IDS_PRIVATE_USER_DATA_INPUT_DESCRIPTION)));
|
| @@ -219,7 +219,7 @@ blink::WebSecurityStyle GetSecurityStyle(
|
| }
|
|
|
| if (security_info.sha1_in_chain) {
|
| - security_style_explanations->unauthenticated_explanations.push_back(
|
| + security_style_explanations->neutral_explanations.push_back(
|
| content::SecurityStyleExplanation(
|
| l10n_util::GetStringUTF8(IDS_SHA1),
|
| l10n_util::GetStringUTF8(IDS_SHA1_DESCRIPTION),
|
| @@ -227,7 +227,7 @@ blink::WebSecurityStyle GetSecurityStyle(
|
| }
|
|
|
| if (security_info.cert_missing_subject_alt_name) {
|
| - security_style_explanations->broken_explanations.push_back(
|
| + security_style_explanations->insecure_explanations.push_back(
|
| content::SecurityStyleExplanation(
|
| l10n_util::GetStringUTF8(IDS_SUBJECT_ALT_NAME_MISSING),
|
| l10n_util::GetStringUTF8(IDS_SUBJECT_ALT_NAME_MISSING_DESCRIPTION),
|
| @@ -281,10 +281,9 @@ blink::WebSecurityStyle GetSecurityStyle(
|
| !!security_info.certificate);
|
|
|
| if (is_cert_status_minor_error) {
|
| - security_style_explanations->unauthenticated_explanations.push_back(
|
| - explanation);
|
| + security_style_explanations->neutral_explanations.push_back(explanation);
|
| } else {
|
| - security_style_explanations->broken_explanations.push_back(explanation);
|
| + security_style_explanations->insecure_explanations.push_back(explanation);
|
| }
|
| } else {
|
| // If the certificate does not have errors and is not using SHA1, then add
|
|
|