Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(236)

Side by Side Diff: components/security_state/security_state_model.h

Issue 2424223002: Update devtools security panel for HTTP-bad (Closed)
Patch Set: lgarron comments Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
7 7
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include "base/macros.h" 10 #include "base/macros.h"
(...skipping 118 matching lines...) Expand 10 before | Expand all | Expand 10 after
129 // The ID of the (EC)DH group used by the key exchange. The value is zero if 129 // The ID of the (EC)DH group used by the key exchange. The value is zero if
130 // unknown (older cache entries may not store the value) or not applicable. 130 // unknown (older cache entries may not store the value) or not applicable.
131 uint16_t key_exchange_group; 131 uint16_t key_exchange_group;
132 // A mask that indicates which of the protocol version, 132 // A mask that indicates which of the protocol version,
133 // key exchange, or cipher for the connection is considered 133 // key exchange, or cipher for the connection is considered
134 // obsolete. See net::ObsoleteSSLMask for specific mask values. 134 // obsolete. See net::ObsoleteSSLMask for specific mask values.
135 int obsolete_ssl_status; 135 int obsolete_ssl_status;
136 136
137 // True if pinning was bypassed due to a local trust anchor. 137 // True if pinning was bypassed due to a local trust anchor.
138 bool pkp_bypassed; 138 bool pkp_bypassed;
139
140 // True if the page displayed sensitive user data inputs (like a
141 // password or credit card) on an HTTP page.
142 bool displayed_private_user_data_input_on_http;
139 }; 143 };
140 144
141 // Contains the security state relevant to computing the SecurityInfo 145 // Contains the security state relevant to computing the SecurityInfo
142 // for a page. This is the input to GetSecurityInfo() provided by the 146 // for a page. This is the input to GetSecurityInfo() provided by the
143 // model's client. 147 // model's client.
144 struct VisibleSecurityState { 148 struct VisibleSecurityState {
145 VisibleSecurityState(); 149 VisibleSecurityState();
146 ~VisibleSecurityState(); 150 ~VisibleSecurityState();
147 bool operator==(const VisibleSecurityState& other) const; 151 bool operator==(const VisibleSecurityState& other) const;
148 GURL url; 152 GURL url;
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after
197 201
198 private: 202 private:
199 SecurityStateModelClient* client_; 203 SecurityStateModelClient* client_;
200 204
201 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); 205 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel);
202 }; 206 };
203 207
204 } // namespace security_state 208 } // namespace security_state
205 209
206 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 210 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
OLDNEW
« no previous file with comments | « chrome/browser/ssl/chrome_security_state_model_client_unittest.cc ('k') | components/security_state/security_state_model.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698