| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
| 6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
| 7 | 7 |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include "base/macros.h" | 10 #include "base/macros.h" |
| (...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 129 // The ID of the (EC)DH group used by the key exchange. The value is zero if | 129 // The ID of the (EC)DH group used by the key exchange. The value is zero if |
| 130 // unknown (older cache entries may not store the value) or not applicable. | 130 // unknown (older cache entries may not store the value) or not applicable. |
| 131 uint16_t key_exchange_group; | 131 uint16_t key_exchange_group; |
| 132 // A mask that indicates which of the protocol version, | 132 // A mask that indicates which of the protocol version, |
| 133 // key exchange, or cipher for the connection is considered | 133 // key exchange, or cipher for the connection is considered |
| 134 // obsolete. See net::ObsoleteSSLMask for specific mask values. | 134 // obsolete. See net::ObsoleteSSLMask for specific mask values. |
| 135 int obsolete_ssl_status; | 135 int obsolete_ssl_status; |
| 136 | 136 |
| 137 // True if pinning was bypassed due to a local trust anchor. | 137 // True if pinning was bypassed due to a local trust anchor. |
| 138 bool pkp_bypassed; | 138 bool pkp_bypassed; |
| 139 |
| 140 // True if the page displayed sensitive user data inputs (like a |
| 141 // password or credit card) on an HTTP page. |
| 142 bool displayed_private_user_data_input_on_http; |
| 139 }; | 143 }; |
| 140 | 144 |
| 141 // Contains the security state relevant to computing the SecurityInfo | 145 // Contains the security state relevant to computing the SecurityInfo |
| 142 // for a page. This is the input to GetSecurityInfo() provided by the | 146 // for a page. This is the input to GetSecurityInfo() provided by the |
| 143 // model's client. | 147 // model's client. |
| 144 struct VisibleSecurityState { | 148 struct VisibleSecurityState { |
| 145 VisibleSecurityState(); | 149 VisibleSecurityState(); |
| 146 ~VisibleSecurityState(); | 150 ~VisibleSecurityState(); |
| 147 bool operator==(const VisibleSecurityState& other) const; | 151 bool operator==(const VisibleSecurityState& other) const; |
| 148 GURL url; | 152 GURL url; |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 197 | 201 |
| 198 private: | 202 private: |
| 199 SecurityStateModelClient* client_; | 203 SecurityStateModelClient* client_; |
| 200 | 204 |
| 201 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); | 205 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); |
| 202 }; | 206 }; |
| 203 | 207 |
| 204 } // namespace security_state | 208 } // namespace security_state |
| 205 | 209 |
| 206 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 210 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
| OLD | NEW |