Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(8)

Unified Diff: net/http/transport_security_state.cc

Issue 1213783005: Send HPKP violation reports when a pin check fails (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rsleevi comments Created 5 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/http/transport_security_state.cc
diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc
index f8bd18d2bd1de4797540babe662ed83846bf6aee..9c8e9897bbd01e6ce0b58971bba21249264194e5 100644
--- a/net/http/transport_security_state.cc
+++ b/net/http/transport_security_state.cc
@@ -513,6 +513,10 @@ bool TransportSecurityState::CheckPublicKeyPins(
const std::string& host,
bool is_issued_by_known_root,
const HashValueVector& public_key_hashes,
+ uint16_t port,
+ const X509Certificate* served_certificate_chain,
+ const X509Certificate* validated_certificate_chain,
+ const PublicKeyPinReportStatus report_status,
std::string* pinning_failure_log) {
// Perform pin validation if, and only if, all these conditions obtain:
//
@@ -523,8 +527,9 @@ bool TransportSecurityState::CheckPublicKeyPins(
return true;
}
- bool pins_are_valid =
- CheckPublicKeyPinsImpl(host, public_key_hashes, pinning_failure_log);
+ bool pins_are_valid = CheckPublicKeyPinsImpl(
+ host, public_key_hashes, port, served_certificate_chain,
+ validated_certificate_chain, report_status, pinning_failure_log);
if (!pins_are_valid) {
LOG(ERROR) << *pinning_failure_log;
ReportUMAOnPinFailure(host);
@@ -821,10 +826,36 @@ bool TransportSecurityState::IsBuildTimely() {
bool TransportSecurityState::CheckPublicKeyPinsImpl(
const std::string& host,
const HashValueVector& hashes,
+ uint16_t port,
+ const X509Certificate* served_certificate_chain,
+ const X509Certificate* validated_certificate_chain,
+ const PublicKeyPinReportStatus report_status,
std::string* failure_log) {
PKPState dynamic_state;
- if (GetDynamicPKPState(host, &dynamic_state))
- return dynamic_state.CheckPublicKeyPins(hashes, failure_log);
+ if (GetDynamicPKPState(host, &dynamic_state)) {
+ bool result = dynamic_state.CheckPublicKeyPins(hashes, failure_log);
+
+ if (result || !reporter_ ||
+ report_status == DO_NOT_SEND_PUBLIC_KEY_PIN_REPORT)
+ return result;
+
+ GURL report_uri;
+ std::string serialized_report;
+
+ if (!reporter_->GetHPKPReportUri(dynamic_state, &report_uri))
Ryan Sleevi 2015/07/10 16:40:00 Does this mean we can't preload report-uris? Seems
estark 2015/07/10 19:33:30 Done.
+ return result;
+
+ if (!reporter_->BuildHPKPReport(
+ host, port, dynamic_state.expiry, dynamic_state.include_subdomains,
+ dynamic_state.domain, served_certificate_chain,
+ validated_certificate_chain, dynamic_state.spki_hashes,
+ &serialized_report)) {
+ LOG(ERROR) << "Failed to build HPKP report";
+ return result;
+ }
+
+ reporter_->SendHPKPReport(report_uri, serialized_report);
+ }
PKPState static_pkp_state;
STSState unused;

Powered by Google App Engine
This is Rietveld 408576698