Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(93)

Side by Side Diff: components/security_state/security_state_model.h

Issue 2483423002: HTTP Bad: Split out UMA metrics for password vs credit card "Not secure" warnings (Closed)
Patch Set: Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 5 #ifndef COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 6 #define COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
7 7
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include "base/macros.h" 10 #include "base/macros.h"
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after
130 // unknown (older cache entries may not store the value) or not applicable. 130 // unknown (older cache entries may not store the value) or not applicable.
131 uint16_t key_exchange_group; 131 uint16_t key_exchange_group;
132 // A mask that indicates which of the protocol version, 132 // A mask that indicates which of the protocol version,
133 // key exchange, or cipher for the connection is considered 133 // key exchange, or cipher for the connection is considered
134 // obsolete. See net::ObsoleteSSLMask for specific mask values. 134 // obsolete. See net::ObsoleteSSLMask for specific mask values.
135 int obsolete_ssl_status; 135 int obsolete_ssl_status;
136 136
137 // True if pinning was bypassed due to a local trust anchor. 137 // True if pinning was bypassed due to a local trust anchor.
138 bool pkp_bypassed; 138 bool pkp_bypassed;
139 139
140 // True if the page displayed sensitive user data inputs (like a 140 // True if the page displayed password field on an HTTP page.
141 // password or credit card) on an HTTP page. 141 bool displayed_password_field_on_http;
142 bool displayed_private_user_data_input_on_http; 142
143 // True if the page displayed credit card field on an HTTP page.
144 bool displayed_credit_card_field_on_http;
143 }; 145 };
144 146
145 // Contains the security state relevant to computing the SecurityInfo 147 // Contains the security state relevant to computing the SecurityInfo
146 // for a page. This is the input to GetSecurityInfo() provided by the 148 // for a page. This is the input to GetSecurityInfo() provided by the
147 // model's client. 149 // model's client.
148 struct VisibleSecurityState { 150 struct VisibleSecurityState {
149 VisibleSecurityState(); 151 VisibleSecurityState();
150 ~VisibleSecurityState(); 152 ~VisibleSecurityState();
151 bool operator==(const VisibleSecurityState& other) const; 153 bool operator==(const VisibleSecurityState& other) const;
152 GURL url; 154 GURL url;
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after
201 203
202 private: 204 private:
203 SecurityStateModelClient* client_; 205 SecurityStateModelClient* client_;
204 206
205 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel); 207 DISALLOW_COPY_AND_ASSIGN(SecurityStateModel);
206 }; 208 };
207 209
208 } // namespace security_state 210 } // namespace security_state
209 211
210 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_ 212 #endif // COMPONENTS_SECURITY_STATE_SECURITY_STATE_MODEL_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698