| OLD | NEW |
| 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ssl_manager.h" | 5 #include "chrome/browser/ssl_manager.h" |
| 6 | 6 |
| 7 #include "base/message_loop.h" | 7 #include "base/message_loop.h" |
| 8 #include "base/string_util.h" | 8 #include "base/string_util.h" |
| 9 #include "chrome/app/theme/theme_resources.h" | 9 #include "chrome/app/theme/theme_resources.h" |
| 10 #include "chrome/browser/browser_process.h" | 10 #include "chrome/browser/browser_process.h" |
| (...skipping 639 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 650 if (net::IsCertStatusError(details->ssl_cert_status())) | 650 if (net::IsCertStatusError(details->ssl_cert_status())) |
| 651 changed |= SetMaxSecurityStyle(SECURITY_STYLE_AUTHENTICATION_BROKEN); | 651 changed |= SetMaxSecurityStyle(SECURITY_STYLE_AUTHENTICATION_BROKEN); |
| 652 else if (details->url().SchemeIsSecure() && !details->ssl_cert_id()) | 652 else if (details->url().SchemeIsSecure() && !details->ssl_cert_id()) |
| 653 changed |= SetMaxSecurityStyle(SECURITY_STYLE_UNAUTHENTICATED); | 653 changed |= SetMaxSecurityStyle(SECURITY_STYLE_UNAUTHENTICATED); |
| 654 | 654 |
| 655 if (changed) { | 655 if (changed) { |
| 656 // Only send the notification when something actually changed. | 656 // Only send the notification when something actually changed. |
| 657 NotificationService::current()->Notify( | 657 NotificationService::current()->Notify( |
| 658 NOTIFY_SSL_STATE_CHANGED, | 658 NOTIFY_SSL_STATE_CHANGED, |
| 659 Source<NavigationController>(controller_), | 659 Source<NavigationController>(controller_), |
| 660 Details<NavigationEntry>(controller_->GetActiveEntry())); | 660 NotificationService::NoDetails()); |
| 661 } | 661 } |
| 662 } | 662 } |
| 663 | 663 |
| 664 void SSLManager::DidFailProvisionalLoadWithError( | 664 void SSLManager::DidFailProvisionalLoadWithError( |
| 665 ProvisionalLoadDetails* details) { | 665 ProvisionalLoadDetails* details) { |
| 666 DCHECK(details); | 666 DCHECK(details); |
| 667 // A transitional page is not expected to fail. | 667 // A transitional page is not expected to fail. |
| 668 DCHECK(!details->interstitial_page()); | 668 DCHECK(!details->interstitial_page()); |
| 669 | 669 |
| 670 // Ignore in-page navigations. | 670 // Ignore in-page navigations. |
| (...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 760 | 760 |
| 761 if (ca_name) { | 761 if (ca_name) { |
| 762 // TODO(wtc): should we show the root CA's name instead? | 762 // TODO(wtc): should we show the root CA's name instead? |
| 763 *ca_name = l10n_util::GetStringF( | 763 *ca_name = l10n_util::GetStringF( |
| 764 IDS_SECURE_CONNECTION_EV_CA, | 764 IDS_SECURE_CONNECTION_EV_CA, |
| 765 UTF8ToWide(cert.issuer().organization_names[0])); | 765 UTF8ToWide(cert.issuer().organization_names[0])); |
| 766 } | 766 } |
| 767 return true; | 767 return true; |
| 768 } | 768 } |
| 769 | 769 |
| OLD | NEW |