summaryrefslogtreecommitdiffstats
path: root/chrome/browser/ssl/ssl_manager.cc
diff options
context:
space:
mode:
authorpkasting@chromium.org <pkasting@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-18 18:28:48 +0000
committerpkasting@chromium.org <pkasting@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-05-18 18:28:48 +0000
commitb4e75c12dacc0922694b12b687a48dd2d973b595 (patch)
tree23d65e13ccf2fd9535ffb7ad965c5f2826efd6cc /chrome/browser/ssl/ssl_manager.cc
parent15ad5dcb44ab2049103f738625e4e5f2483d85da (diff)
downloadchromium_src-b4e75c12dacc0922694b12b687a48dd2d973b595.zip
chromium_src-b4e75c12dacc0922694b12b687a48dd2d973b595.tar.gz
chromium_src-b4e75c12dacc0922694b12b687a48dd2d973b595.tar.bz2
Rename "mixed content" to "insecure content" in as many places as possible, to standardize on a consistent naming scheme.
BUG=none TEST=none Review URL: http://codereview.chromium.org/2069005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@47531 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/ssl/ssl_manager.cc')
-rw-r--r--chrome/browser/ssl/ssl_manager.cc16
1 files changed, 5 insertions, 11 deletions
diff --git a/chrome/browser/ssl/ssl_manager.cc b/chrome/browser/ssl/ssl_manager.cc
index 99729b6..333d8b2 100644
--- a/chrome/browser/ssl/ssl_manager.cc
+++ b/chrome/browser/ssl/ssl_manager.cc
@@ -23,12 +23,6 @@
#include "net/base/cert_status_flags.h"
// static
-void SSLManager::RegisterUserPrefs(PrefService* prefs) {
- prefs->RegisterIntegerPref(prefs::kMixedContentFiltering,
- FilterPolicy::DONT_FILTER);
-}
-
-// static
void SSLManager::OnSSLCertificateError(ResourceDispatcherHost* rdh,
URLRequest* request,
int cert_error,
@@ -256,11 +250,11 @@ void SSLManager::DidStartResourceResponse(ResourceRequestDetails* details) {
}
void SSLManager::DidReceiveResourceRedirect(ResourceRedirectDetails* details) {
- // TODO(abarth): Make sure our redirect behavior is correct. If we ever see
- // a non-HTTPS resource in the redirect chain, we want to
- // trigger mixed content, even if the redirect chain goes back
- // to HTTPS. This is because the network attacker can redirect
- // the HTTP request to https://attacker.com/payload.js.
+ // TODO(abarth): Make sure our redirect behavior is correct. If we ever see a
+ // non-HTTPS resource in the redirect chain, we want to trigger
+ // insecure content, even if the redirect chain goes back to
+ // HTTPS. This is because the network attacker can redirect the
+ // HTTP request to https://attacker.com/payload.js.
}
void SSLManager::DidChangeSSLInternalState() {