Commit 36469737 authored by Kunihiko Sakamoto's avatar Kunihiko Sakamoto Committed by Commit Bot

Rename ct::CTPolicyCompliance::CT_POLICY_MAX to CT_POLICY_COUNT

"_MAX" suffix typically represents the last value in an enum, whereas
"_COUNT" is more commonly used to count the number of entries.

This CL should have no behavior changes.

Change-Id: I976c67473f9590a815514ac59758d3a7abc0ad8e
Reviewed-on: https://chromium-review.googlesource.com/1245022Reviewed-by: default avatarKinuko Yasuda <kinuko@chromium.org>
Reviewed-by: default avatarRyan Sleevi <rsleevi@chromium.org>
Commit-Queue: Kunihiko Sakamoto <ksakamoto@chromium.org>
Cr-Commit-Position: refs/heads/master@{#594580}
parent c38c4ec0
...@@ -148,7 +148,7 @@ void SecurityStateTabHelper::DidFinishNavigation( ...@@ -148,7 +148,7 @@ void SecurityStateTabHelper::DidFinishNavigation(
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Security.CertificateTransparency.MainFrameNavigationCompliance", "Security.CertificateTransparency.MainFrameNavigationCompliance",
entry->GetSSL().ct_policy_compliance, entry->GetSSL().ct_policy_compliance,
net::ct::CTPolicyCompliance::CT_POLICY_MAX); net::ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
logged_http_warning_on_current_navigation_ = false; logged_http_warning_on_current_navigation_ = false;
......
...@@ -87,7 +87,7 @@ const char* CTPolicyComplianceToString(CTPolicyCompliance status) { ...@@ -87,7 +87,7 @@ const char* CTPolicyComplianceToString(CTPolicyCompliance status) {
case CTPolicyCompliance::CT_POLICY_BUILD_NOT_TIMELY: case CTPolicyCompliance::CT_POLICY_BUILD_NOT_TIMELY:
return "BUILD_NOT_TIMELY"; return "BUILD_NOT_TIMELY";
case CTPolicyCompliance::CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE: case CTPolicyCompliance::CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE:
case CTPolicyCompliance::CT_POLICY_MAX: case CTPolicyCompliance::CT_POLICY_COUNT:
NOTREACHED(); NOTREACHED();
return "unknown"; return "unknown";
} }
......
...@@ -102,7 +102,7 @@ Network::CertificateTransparencyCompliance SerializeCTPolicyCompliance( ...@@ -102,7 +102,7 @@ Network::CertificateTransparencyCompliance SerializeCTPolicyCompliance(
case net::ct::CTPolicyCompliance:: case net::ct::CTPolicyCompliance::
CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE: CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE:
return Network::CertificateTransparencyComplianceEnum::Unknown; return Network::CertificateTransparencyComplianceEnum::Unknown;
case net::ct::CTPolicyCompliance::CT_POLICY_MAX: case net::ct::CTPolicyCompliance::CT_POLICY_COUNT:
NOTREACHED(); NOTREACHED();
return Network::CertificateTransparencyComplianceEnum::Unknown; return Network::CertificateTransparencyComplianceEnum::Unknown;
} }
......
...@@ -524,7 +524,7 @@ void SignedExchangeHandler::OnVerifyCert( ...@@ -524,7 +524,7 @@ void SignedExchangeHandler::OnVerifyCert(
base::UmaHistogramSparse(kHistogramCertVerificationResult, -error_code); base::UmaHistogramSparse(kHistogramCertVerificationResult, -error_code);
UMA_HISTOGRAM_ENUMERATION(kHistogramCTVerificationResult, UMA_HISTOGRAM_ENUMERATION(kHistogramCTVerificationResult,
ct_result.policy_compliance, ct_result.policy_compliance,
net::ct::CTPolicyCompliance::CT_POLICY_MAX); net::ct::CTPolicyCompliance::CT_POLICY_COUNT);
if (error_code != net::OK) { if (error_code != net::OK) {
SignedExchangeLoadResult result; SignedExchangeLoadResult result;
......
...@@ -27,7 +27,7 @@ enum class CTPolicyCompliance { ...@@ -27,7 +27,7 @@ enum class CTPolicyCompliance {
// Compliance details for the connection are not available, e.g. because a // Compliance details for the connection are not available, e.g. because a
// resource was loaded from disk cache. // resource was loaded from disk cache.
CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE = 4, CT_POLICY_COMPLIANCE_DETAILS_NOT_AVAILABLE = 4,
CT_POLICY_MAX CT_POLICY_COUNT
}; };
} // namespace ct } // namespace ct
......
...@@ -501,7 +501,7 @@ TransportSecurityState::CheckCTRequirements( ...@@ -501,7 +501,7 @@ TransportSecurityState::CheckCTRequirements(
if (IsDynamicExpectCTEnabled() && GetDynamicExpectCTState(hostname, &state)) { if (IsDynamicExpectCTEnabled() && GetDynamicExpectCTState(hostname, &state)) {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.ExpectCTHeader.PolicyComplianceOnConnectionSetup", "Net.ExpectCTHeader.PolicyComplianceOnConnectionSetup",
policy_compliance, ct::CTPolicyCompliance::CT_POLICY_MAX); policy_compliance, ct::CTPolicyCompliance::CT_POLICY_COUNT);
if (!complies && expect_ct_reporter_ && !state.report_uri.is_empty() && if (!complies && expect_ct_reporter_ && !state.report_uri.is_empty() &&
report_status == ENABLE_EXPECT_CT_REPORTS) { report_status == ENABLE_EXPECT_CT_REPORTS) {
MaybeNotifyExpectCTFailed(host_port_pair, state.report_uri, state.expiry, MaybeNotifyExpectCTFailed(host_port_pair, state.report_uri, state.expiry,
...@@ -1106,7 +1106,7 @@ void TransportSecurityState::ProcessExpectCTHeader( ...@@ -1106,7 +1106,7 @@ void TransportSecurityState::ProcessExpectCTHeader(
return; return;
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.ExpectCTHeader.PolicyComplianceOnHeaderProcessing", "Net.ExpectCTHeader.PolicyComplianceOnHeaderProcessing",
ssl_info.ct_policy_compliance, ct::CTPolicyCompliance::CT_POLICY_MAX); ssl_info.ct_policy_compliance, ct::CTPolicyCompliance::CT_POLICY_COUNT);
if (ssl_info.ct_policy_compliance != if (ssl_info.ct_policy_compliance !=
ct::CTPolicyCompliance::CT_POLICY_COMPLIES_VIA_SCTS) { ct::CTPolicyCompliance::CT_POLICY_COMPLIES_VIA_SCTS) {
// If an Expect-CT header is observed over a non-compliant connection, the // If an Expect-CT header is observed over a non-compliant connection, the
......
...@@ -412,7 +412,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) { ...@@ -412,7 +412,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.CertificateTransparency.EVCompliance2.QUIC", "Net.CertificateTransparency.EVCompliance2.QUIC",
verify_details_->ct_verify_result.policy_compliance, verify_details_->ct_verify_result.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
} }
...@@ -422,7 +422,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) { ...@@ -422,7 +422,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.CertificateTransparency.ConnectionComplianceStatus2.QUIC", "Net.CertificateTransparency.ConnectionComplianceStatus2.QUIC",
verify_details_->ct_verify_result.policy_compliance, verify_details_->ct_verify_result.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
int ct_result = OK; int ct_result = OK;
...@@ -446,7 +446,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) { ...@@ -446,7 +446,7 @@ int ProofVerifierChromium::Job::DoVerifyCertComplete(int result) {
"Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2." "Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2."
"QUIC", "QUIC",
verify_details_->ct_verify_result.policy_compliance, verify_details_->ct_verify_result.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
} else { } else {
verify_details_->ct_verify_result.policy_compliance_required = false; verify_details_->ct_verify_result.policy_compliance_required = false;
......
...@@ -1547,7 +1547,7 @@ int SSLClientSocketImpl::VerifyCT() { ...@@ -1547,7 +1547,7 @@ int SSLClientSocketImpl::VerifyCT() {
if (server_cert_verify_result_.is_issued_by_known_root) { if (server_cert_verify_result_.is_issued_by_known_root) {
UMA_HISTOGRAM_ENUMERATION("Net.CertificateTransparency.EVCompliance2.SSL", UMA_HISTOGRAM_ENUMERATION("Net.CertificateTransparency.EVCompliance2.SSL",
ct_verify_result_.policy_compliance, ct_verify_result_.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
} }
...@@ -1557,7 +1557,7 @@ int SSLClientSocketImpl::VerifyCT() { ...@@ -1557,7 +1557,7 @@ int SSLClientSocketImpl::VerifyCT() {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.CertificateTransparency.ConnectionComplianceStatus2.SSL", "Net.CertificateTransparency.ConnectionComplianceStatus2.SSL",
ct_verify_result_.policy_compliance, ct_verify_result_.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
TransportSecurityState::CTRequirementsStatus ct_requirement_status = TransportSecurityState::CTRequirementsStatus ct_requirement_status =
...@@ -1578,7 +1578,7 @@ int SSLClientSocketImpl::VerifyCT() { ...@@ -1578,7 +1578,7 @@ int SSLClientSocketImpl::VerifyCT() {
"Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2." "Net.CertificateTransparency.CTRequiredConnectionComplianceStatus2."
"SSL", "SSL",
ct_verify_result_.policy_compliance, ct_verify_result_.policy_compliance,
ct::CTPolicyCompliance::CT_POLICY_MAX); ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
} else { } else {
ct_verify_result_.policy_compliance_required = false; ct_verify_result_.policy_compliance_required = false;
......
...@@ -131,7 +131,7 @@ void RecordCTHistograms(const net::SSLInfo& ssl_info) { ...@@ -131,7 +131,7 @@ void RecordCTHistograms(const net::SSLInfo& ssl_info) {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.CertificateTransparency.RequestComplianceStatus", "Net.CertificateTransparency.RequestComplianceStatus",
ssl_info.ct_policy_compliance, ssl_info.ct_policy_compliance,
net::ct::CTPolicyCompliance::CT_POLICY_MAX); net::ct::CTPolicyCompliance::CT_POLICY_COUNT);
// Record the CT compliance of each request which was required to be CT // Record the CT compliance of each request which was required to be CT
// compliant. This gives a picture of the sites that are supposed to be // compliant. This gives a picture of the sites that are supposed to be
// compliant and how well they do at actually being compliant. // compliant and how well they do at actually being compliant.
...@@ -139,7 +139,7 @@ void RecordCTHistograms(const net::SSLInfo& ssl_info) { ...@@ -139,7 +139,7 @@ void RecordCTHistograms(const net::SSLInfo& ssl_info) {
UMA_HISTOGRAM_ENUMERATION( UMA_HISTOGRAM_ENUMERATION(
"Net.CertificateTransparency.CTRequiredRequestComplianceStatus", "Net.CertificateTransparency.CTRequiredRequestComplianceStatus",
ssl_info.ct_policy_compliance, ssl_info.ct_policy_compliance,
net::ct::CTPolicyCompliance::CT_POLICY_MAX); net::ct::CTPolicyCompliance::CT_POLICY_COUNT);
} }
} }
......
...@@ -249,7 +249,7 @@ void WebURLResponse::SetCTPolicyCompliance( ...@@ -249,7 +249,7 @@ void WebURLResponse::SetCTPolicyCompliance(
resource_response_->SetCTPolicyCompliance( resource_response_->SetCTPolicyCompliance(
ResourceResponse::kCTPolicyComplies); ResourceResponse::kCTPolicyComplies);
break; break;
case net::ct::CTPolicyCompliance::CT_POLICY_MAX: case net::ct::CTPolicyCompliance::CT_POLICY_COUNT:
NOTREACHED(); NOTREACHED();
resource_response_->SetCTPolicyCompliance( resource_response_->SetCTPolicyCompliance(
ResourceResponse::kCTPolicyComplianceDetailsNotAvailable); ResourceResponse::kCTPolicyComplianceDetailsNotAvailable);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment