| Index: chrome/browser/net/chrome_fraudulent_certificate_reporter.cc
|
| diff --git a/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc b/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc
|
| deleted file mode 100644
|
| index 1c6dd486a5bccec9f0b10507beba7e8eb93d1f24..0000000000000000000000000000000000000000
|
| --- a/chrome/browser/net/chrome_fraudulent_certificate_reporter.cc
|
| +++ /dev/null
|
| @@ -1,53 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/browser/net/chrome_fraudulent_certificate_reporter.h"
|
| -
|
| -#include "base/profiler/scoped_tracker.h"
|
| -#include "chrome/browser/net/certificate_error_reporter.h"
|
| -#include "net/ssl/ssl_info.h"
|
| -#include "net/url_request/url_request_context.h"
|
| -#include "url/gurl.h"
|
| -
|
| -namespace {
|
| -
|
| -// TODO(palmer): Switch to HTTPS when the error handling delegate is more
|
| -// sophisticated. Ultimately we plan to attempt the report on many transports.
|
| -const char kFraudulentCertificateUploadEndpoint[] =
|
| - "http://clients3.google.com/log_cert_error";
|
| -
|
| -} // namespace
|
| -
|
| -namespace chrome_browser_net {
|
| -
|
| -ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter(
|
| - net::URLRequestContext* request_context)
|
| - : certificate_reporter_(new CertificateErrorReporter(
|
| - request_context,
|
| - GURL(kFraudulentCertificateUploadEndpoint),
|
| - CertificateErrorReporter::DO_NOT_SEND_COOKIES)) {
|
| -}
|
| -
|
| -ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter(
|
| - scoped_ptr<CertificateErrorReporter> certificate_reporter)
|
| - : certificate_reporter_(certificate_reporter.Pass()) {
|
| -}
|
| -
|
| -ChromeFraudulentCertificateReporter::~ChromeFraudulentCertificateReporter() {
|
| -}
|
| -
|
| -void ChromeFraudulentCertificateReporter::SendReport(
|
| - const std::string& hostname,
|
| - const net::SSLInfo& ssl_info) {
|
| - // Do silent/automatic reporting ONLY for Google properties. For other
|
| - // domains (when that is supported), Chrome will ask for user permission.
|
| - if (!net::TransportSecurityState::IsGooglePinnedProperty(hostname))
|
| - return;
|
| -
|
| - certificate_reporter_->SendReport(
|
| - CertificateErrorReporter::REPORT_TYPE_PINNING_VIOLATION, hostname,
|
| - ssl_info);
|
| -}
|
| -
|
| -} // namespace chrome_browser_net
|
|
|