Commit e8704be0 authored by Christopher Thompson's avatar Christopher Thompson Committed by Commit Bot

Special case CERT_STATUS_LEGACY_TLS in Page Info

This special-cases the LEGACY_TLS status in Page Info on Desktop so that
it doesn't cause the certificate to be marked as "Invalid". This also
updates the identity status logic to always check and mark legacy TLS
pages so that we use the more specific security summary text (which
refers to outdated security configurations specifically) for sites that
use legacy TLS.

Bug: 1056376
Change-Id: I399b79832ba6ffd0b82f8906bc09afe0576c198b
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2076517Reviewed-by: default avatarMustafa Emre Acer <meacer@chromium.org>
Commit-Queue: Christopher Thompson <cthomp@chromium.org>
Cr-Commit-Position: refs/heads/master@{#744883}
parent 3074fe38
...@@ -738,8 +738,13 @@ __attribute__((optnone)) void PageInfo::ComputeUIInputs( ...@@ -738,8 +738,13 @@ __attribute__((optnone)) void PageInfo::ComputeUIInputs(
// Identity section. // Identity section.
certificate_ = visible_security_state.certificate; certificate_ = visible_security_state.certificate;
// TODO(crbug.com/1044747): This conditional special-cases
// CERT_STATUS_LEGACY_TLS to avoid marking the certificate as "Invalid" in
// Page Info, but once we clean up the overloading of CertStatus for Legacy
// TLS we can remove this.
if (certificate_ && if (certificate_ &&
(!net::IsCertStatusError(visible_security_state.cert_status))) { (!net::IsCertStatusError(visible_security_state.cert_status &
~net::CERT_STATUS_LEGACY_TLS))) {
// HTTPS with no or minor errors. // HTTPS with no or minor errors.
if (security_level == security_state::SECURE_WITH_POLICY_INSTALLED_CERT) { if (security_level == security_state::SECURE_WITH_POLICY_INSTALLED_CERT) {
#if defined(OS_CHROMEOS) #if defined(OS_CHROMEOS)
...@@ -895,9 +900,7 @@ __attribute__((optnone)) void PageInfo::ComputeUIInputs( ...@@ -895,9 +900,7 @@ __attribute__((optnone)) void PageInfo::ComputeUIInputs(
subject_name)); subject_name));
} }
if (base::FeatureList::IsEnabled( if (visible_security_state.connection_used_legacy_tls &&
security_state::features::kLegacyTLSWarnings) &&
visible_security_state.connection_used_legacy_tls &&
!visible_security_state.should_suppress_legacy_tls_warning) { !visible_security_state.should_suppress_legacy_tls_warning) {
site_connection_status_ = SITE_CONNECTION_STATUS_LEGACY_TLS; site_connection_status_ = SITE_CONNECTION_STATUS_LEGACY_TLS;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment