summaryrefslogtreecommitdiff
path: root/chromium/content/public/browser/ssl_status.h
blob: cc96c0ff36516126e8b87b57b6d9248105f00911 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef CONTENT_PUBLIC_BROWSER_SSL_STATUS_H_
#define CONTENT_PUBLIC_BROWSER_SSL_STATUS_H_

#include <stdint.h>

#include <vector>

#include "content/common/content_export.h"
#include "net/cert/cert_status_flags.h"
#include "net/cert/sct_status_flags.h"
#include "net/cert/x509_certificate.h"

namespace net {
class SSLInfo;
}

namespace content {

// Collects the SSL information for this NavigationEntry.
struct CONTENT_EXPORT SSLStatus {
  // Flags used for the page security content status.
  enum ContentStatusFlags {
    // HTTP page, or HTTPS page with no insecure content.
    NORMAL_CONTENT = 0,

    // HTTPS page containing "displayed" HTTP resources (e.g. images, CSS).
    DISPLAYED_INSECURE_CONTENT = 1 << 0,

    // HTTPS page containing "executed" HTTP resources (i.e. script).
    RAN_INSECURE_CONTENT = 1 << 1,

    // HTTPS page containing "displayed" HTTPS resources (e.g. images,
    // CSS) loaded with certificate errors.
    DISPLAYED_CONTENT_WITH_CERT_ERRORS = 1 << 2,

    // HTTPS page containing "executed" HTTPS resources (i.e. script)
    // loaded with certificate errors.
    RAN_CONTENT_WITH_CERT_ERRORS = 1 << 3,

    // HTTP page containing a password input. Embedders may use this to
    // adjust UI on nonsecure pages that collect sensitive data.
    DISPLAYED_PASSWORD_FIELD_ON_HTTP = 1 << 4,

    // HTTP page containing a credit card input. Embedders may use this to
    // adjust UI on nonsecure pages that collect sensitive data.
    DISPLAYED_CREDIT_CARD_FIELD_ON_HTTP = 1 << 5,

    // HTTPS page containing a form targeting an insecure action url.
    DISPLAYED_FORM_WITH_INSECURE_ACTION = 1 << 6,
  };

  SSLStatus();
  SSLStatus(const net::SSLInfo& ssl_info);
  SSLStatus(const SSLStatus& other);
  ~SSLStatus();

  bool Equals(const SSLStatus& status) const {
    return initialized == status.initialized &&
           !!certificate == !!status.certificate &&
           (certificate ? certificate->Equals(status.certificate.get())
                        : true) &&
           cert_status == status.cert_status &&
           security_bits == status.security_bits &&
           key_exchange_group == status.key_exchange_group &&
           connection_status == status.connection_status &&
           content_status == status.content_status &&
           sct_statuses == status.sct_statuses &&
           pkp_bypassed == status.pkp_bypassed;
  }

  bool initialized;
  scoped_refptr<net::X509Certificate> certificate;
  net::CertStatus cert_status;
  int security_bits;
  uint16_t key_exchange_group;
  int connection_status;
  // A combination of the ContentStatusFlags above.
  int content_status;
  // The validation statuses of the Signed Certificate Timestamps (SCTs)
  // of Certificate Transparency (CT) that were served with the
  // main resource.
  std::vector<net::ct::SCTVerifyStatus> sct_statuses;
  // True if PKP was bypassed due to a local trust anchor.
  bool pkp_bypassed;
};

}  // namespace content

#endif  // CONTENT_PUBLIC_BROWSER_SSL_STATUS_H_