OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
7 | 7 |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "net/cert/cert_status_flags.h" | 9 #include "net/cert/cert_status_flags.h" |
10 #include "net/cert/sct_status_flags.h" | 10 #include "net/cert/sct_status_flags.h" |
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
97 net::CertStatus cert_status; | 97 net::CertStatus cert_status; |
98 int cert_id; | 98 int cert_id; |
99 // The security strength, in bits, of the SSL cipher suite. In late | 99 // The security strength, in bits, of the SSL cipher suite. In late |
100 // 2015, 128 is considered the minimum. | 100 // 2015, 128 is considered the minimum. |
101 // 0 means the connection is not encrypted. | 101 // 0 means the connection is not encrypted. |
102 // -1 means the security strength is unknown. | 102 // -1 means the security strength is unknown. |
103 int security_bits; | 103 int security_bits; |
104 // Information about the SSL connection, such as protocol and | 104 // Information about the SSL connection, such as protocol and |
105 // ciphersuite. See ssl_connection_flags.h in net. | 105 // ciphersuite. See ssl_connection_flags.h in net. |
106 int connection_status; | 106 int connection_status; |
107 // True if the protocol version and ciphersuite for the connection | 107 // A mask that indicates which of the protocol version, |
108 // are considered secure. | 108 // key exchange, or cipher for the connection is considered |
109 bool is_secure_protocol_and_ciphersuite; | 109 // obsolete. See net::ObsoleteSSLMask for specific mask values. |
| 110 int obsolete_ssl_status; |
110 | 111 |
111 // True if pinning was bypassed due to a local trust anchor. | 112 // True if pinning was bypassed due to a local trust anchor. |
112 bool pkp_bypassed; | 113 bool pkp_bypassed; |
113 }; | 114 }; |
114 | 115 |
115 // Contains the security state relevant to computing the SecurityInfo | 116 // Contains the security state relevant to computing the SecurityInfo |
116 // for a page. This is the input to GetSecurityInfo() provided by the | 117 // for a page. This is the input to GetSecurityInfo() provided by the |
117 // model's client. | 118 // model's client. |
118 struct VisibleSecurityState { | 119 struct VisibleSecurityState { |
119 VisibleSecurityState(); | 120 VisibleSecurityState(); |
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
165 mutable VisibleSecurityState visible_security_state_; | 166 mutable VisibleSecurityState visible_security_state_; |
166 | 167 |
167 SecurityStateModelClient* client_; | 168 SecurityStateModelClient* client_; |
168 | 169 |
169 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); | 170 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); |
170 }; | 171 }; |
171 | 172 |
172 } // namespace security_state | 173 } // namespace security_state |
173 | 174 |
174 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ | 175 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ |
OLD | NEW |