Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(382)

Side by Side Diff: net/ssl/ssl_info.cc

Issue 1652603002: Add information to SSLInfo about CT EV policy compliance (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: some cleanup Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« net/ssl/ssl_info.h ('K') | « net/ssl/ssl_info.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/ssl_info.h" 5 #include "net/ssl/ssl_info.h"
6 6
7 #include "base/pickle.h" 7 #include "base/pickle.h"
8 #include "net/cert/cert_status_flags.h" 8 #include "net/cert/cert_status_flags.h"
9 #include "net/cert/signed_certificate_timestamp.h" 9 #include "net/cert/signed_certificate_timestamp.h"
10 #include "net/cert/x509_certificate.h" 10 #include "net/cert/x509_certificate.h"
(...skipping 18 matching lines...) Expand all
29 security_bits = info.security_bits; 29 security_bits = info.security_bits;
30 key_exchange_info = info.key_exchange_info; 30 key_exchange_info = info.key_exchange_info;
31 connection_status = info.connection_status; 31 connection_status = info.connection_status;
32 is_issued_by_known_root = info.is_issued_by_known_root; 32 is_issued_by_known_root = info.is_issued_by_known_root;
33 client_cert_sent = info.client_cert_sent; 33 client_cert_sent = info.client_cert_sent;
34 channel_id_sent = info.channel_id_sent; 34 channel_id_sent = info.channel_id_sent;
35 token_binding_negotiated = info.token_binding_negotiated; 35 token_binding_negotiated = info.token_binding_negotiated;
36 token_binding_key_param = info.token_binding_key_param; 36 token_binding_key_param = info.token_binding_key_param;
37 handshake_type = info.handshake_type; 37 handshake_type = info.handshake_type;
38 public_key_hashes = info.public_key_hashes; 38 public_key_hashes = info.public_key_hashes;
39 pinning_failure_log = info.pinning_failure_log;
39 signed_certificate_timestamps = info.signed_certificate_timestamps; 40 signed_certificate_timestamps = info.signed_certificate_timestamps;
40 pinning_failure_log = info.pinning_failure_log; 41 ct_compliance_details_available = info.ct_compliance_details_available;
42 ct_ev_policy_compliance = info.ct_ev_policy_compliance;
41 43
42 return *this; 44 return *this;
43 } 45 }
44 46
45 void SSLInfo::Reset() { 47 void SSLInfo::Reset() {
46 cert = NULL; 48 cert = NULL;
47 unverified_cert = NULL; 49 unverified_cert = NULL;
48 cert_status = 0; 50 cert_status = 0;
49 security_bits = -1; 51 security_bits = -1;
50 key_exchange_info = 0; 52 key_exchange_info = 0;
51 connection_status = 0; 53 connection_status = 0;
52 is_issued_by_known_root = false; 54 is_issued_by_known_root = false;
53 client_cert_sent = false; 55 client_cert_sent = false;
54 channel_id_sent = false; 56 channel_id_sent = false;
55 token_binding_negotiated = false; 57 token_binding_negotiated = false;
56 token_binding_key_param = TB_PARAM_ECDSAP256; 58 token_binding_key_param = TB_PARAM_ECDSAP256;
57 handshake_type = HANDSHAKE_UNKNOWN; 59 handshake_type = HANDSHAKE_UNKNOWN;
58 public_key_hashes.clear(); 60 public_key_hashes.clear();
61 pinning_failure_log.clear();
59 signed_certificate_timestamps.clear(); 62 signed_certificate_timestamps.clear();
60 pinning_failure_log.clear(); 63 ct_compliance_details_available = false;
64 ct_ev_policy_compliance = ct::EV_POLICY_DOES_NOT_APPLY;
61 } 65 }
62 66
63 void SSLInfo::SetCertError(int error) { 67 void SSLInfo::SetCertError(int error) {
64 cert_status |= MapNetErrorToCertStatus(error); 68 cert_status |= MapNetErrorToCertStatus(error);
65 } 69 }
66 70
67 void SSLInfo::UpdateSignedCertificateTimestamps( 71 void SSLInfo::UpdateCertificateTransparencyInfo(
68 const ct::CTVerifyResult& ct_verify_result) { 72 const ct::CTVerifyResult& ct_verify_result) {
69 for (const auto& sct : ct_verify_result.verified_scts) { 73 for (const auto& sct : ct_verify_result.verified_scts) {
70 signed_certificate_timestamps.push_back( 74 signed_certificate_timestamps.push_back(
71 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK)); 75 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK));
72 } 76 }
73 for (const auto& sct : ct_verify_result.invalid_scts) { 77 for (const auto& sct : ct_verify_result.invalid_scts) {
74 signed_certificate_timestamps.push_back( 78 signed_certificate_timestamps.push_back(
75 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID)); 79 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID));
76 } 80 }
77 for (const auto& sct : ct_verify_result.unknown_logs_scts) { 81 for (const auto& sct : ct_verify_result.unknown_logs_scts) {
78 signed_certificate_timestamps.push_back( 82 signed_certificate_timestamps.push_back(
79 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN)); 83 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN));
80 } 84 }
85
86 ct_compliance_details_available = ct_verify_result.ct_policies_applied;
87 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance;
81 } 88 }
82 89
83 } // namespace net 90 } // namespace net
OLDNEW
« net/ssl/ssl_info.h ('K') | « net/ssl/ssl_info.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698