Index: chrome/browser/net/chrome_fraudulent_certificate_reporter.cc |
diff --git a/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc b/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc |
deleted file mode 100644 |
index 1c6dd486a5bccec9f0b10507beba7e8eb93d1f24..0000000000000000000000000000000000000000 |
--- a/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc |
+++ /dev/null |
@@ -1,53 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h" |
- |
-#include "base/profiler/scoped_tracker.h" |
-#include "chrome/browser/net/certificate_error_reporter.h" |
-#include "net/ssl/ssl_info.h" |
-#include "net/url_request/url_request_context.h" |
-#include "url/gurl.h" |
- |
-namespace { |
- |
-// TODO(palmer): Switch to HTTPS when the error handling delegate is more |
-// sophisticated. Ultimately we plan to attempt the report on many transports. |
-const char kFraudulentCertificateUploadEndpoint[] = |
- "http://clients3.google.com/log_cert_error"; |
- |
-} // namespace |
- |
-namespace chrome_browser_net { |
- |
-ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
- net::URLRequestContext* request_context) |
- : certificate_reporter_(new CertificateErrorReporter( |
- request_context, |
- GURL(kFraudulentCertificateUploadEndpoint), |
- CertificateErrorReporter::DO_NOT_SEND_COOKIES)) { |
-} |
- |
-ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter( |
- scoped_ptr<CertificateErrorReporter> certificate_reporter) |
- : certificate_reporter_(certificate_reporter.Pass()) { |
-} |
- |
-ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() { |
-} |
- |
-void ChromeFraudulentCertificateReporter::SendReport( |
- const std::string& hostname, |
- const net::SSLInfo& ssl_info) { |
- // Do silent/automatic reporting ONLY for Google properties. For other |
- // domains (when that is supported), Chrome will ask for user permission. |
- if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname)) |
- return; |
- |
- certificate_reporter_->SendReport( |
- CertificateErrorReporter::REPORT_TYPE_PINNING_VIOLATION, hostname, |
- ssl_info); |
-} |
- |
-} // namespace chrome_browser_net |