OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/browser/loader/resource_loader.h" | 5 #include "content/browser/loader/resource_loader.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "base/command_line.h" | 9 #include "base/command_line.h" |
10 #include "base/location.h" | 10 #include "base/location.h" |
(...skipping 11 matching lines...) Expand all Loading... |
22 #include "content/browser/loader/resource_request_info_impl.h" | 22 #include "content/browser/loader/resource_request_info_impl.h" |
23 #include "content/browser/service_worker/service_worker_request_handler.h" | 23 #include "content/browser/service_worker/service_worker_request_handler.h" |
24 #include "content/browser/service_worker/service_worker_response_info.h" | 24 #include "content/browser/service_worker/service_worker_response_info.h" |
25 #include "content/browser/ssl/ssl_client_auth_handler.h" | 25 #include "content/browser/ssl/ssl_client_auth_handler.h" |
26 #include "content/browser/ssl/ssl_manager.h" | 26 #include "content/browser/ssl/ssl_manager.h" |
27 #include "content/browser/ssl/ssl_policy.h" | 27 #include "content/browser/ssl/ssl_policy.h" |
28 #include "content/common/ssl_status_serialization.h" | 28 #include "content/common/ssl_status_serialization.h" |
29 #include "content/public/browser/cert_store.h" | 29 #include "content/public/browser/cert_store.h" |
30 #include "content/public/browser/resource_context.h" | 30 #include "content/public/browser/resource_context.h" |
31 #include "content/public/browser/resource_dispatcher_host_login_delegate.h" | 31 #include "content/public/browser/resource_dispatcher_host_login_delegate.h" |
32 #include "content/public/browser/signed_certificate_timestamp_store.h" | |
33 #include "content/public/common/content_client.h" | 32 #include "content/public/common/content_client.h" |
34 #include "content/public/common/content_switches.h" | 33 #include "content/public/common/content_switches.h" |
35 #include "content/public/common/process_type.h" | 34 #include "content/public/common/process_type.h" |
36 #include "content/public/common/resource_response.h" | 35 #include "content/public/common/resource_response.h" |
37 #include "content/public/common/security_style.h" | 36 #include "content/public/common/security_style.h" |
38 #include "net/base/io_buffer.h" | 37 #include "net/base/io_buffer.h" |
39 #include "net/base/load_flags.h" | 38 #include "net/base/load_flags.h" |
40 #include "net/http/http_response_headers.h" | 39 #include "net/http/http_response_headers.h" |
41 #include "net/nqe/network_quality_estimator.h" | 40 #include "net/nqe/network_quality_estimator.h" |
42 #include "net/ssl/client_cert_store.h" | 41 #include "net/ssl/client_cert_store.h" |
43 #include "net/ssl/ssl_platform_key.h" | 42 #include "net/ssl/ssl_platform_key.h" |
44 #include "net/ssl/ssl_private_key.h" | 43 #include "net/ssl/ssl_private_key.h" |
45 #include "net/url_request/redirect_info.h" | 44 #include "net/url_request/redirect_info.h" |
46 #include "net/url_request/url_request_context.h" | 45 #include "net/url_request/url_request_context.h" |
47 #include "net/url_request/url_request_status.h" | 46 #include "net/url_request/url_request_status.h" |
48 | 47 |
49 using base::TimeDelta; | 48 using base::TimeDelta; |
50 using base::TimeTicks; | 49 using base::TimeTicks; |
51 | 50 |
52 namespace content { | 51 namespace content { |
53 namespace { | 52 namespace { |
54 | 53 |
55 void StoreSignedCertificateTimestamps( | |
56 const net::SignedCertificateTimestampAndStatusList& sct_list, | |
57 int process_id, | |
58 SignedCertificateTimestampIDStatusList* sct_ids) { | |
59 SignedCertificateTimestampStore* sct_store( | |
60 SignedCertificateTimestampStore::GetInstance()); | |
61 | |
62 for (auto iter = sct_list.begin(); iter != sct_list.end(); ++iter) { | |
63 const int sct_id(sct_store->Store(iter->sct.get(), process_id)); | |
64 sct_ids->push_back( | |
65 SignedCertificateTimestampIDAndStatus(sct_id, iter->status)); | |
66 } | |
67 } | |
68 | |
69 void GetSSLStatusForRequest(const GURL& url, | 54 void GetSSLStatusForRequest(const GURL& url, |
70 const net::SSLInfo& ssl_info, | 55 const net::SSLInfo& ssl_info, |
71 int child_id, | 56 int child_id, |
72 CertStore* cert_store, | 57 CertStore* cert_store, |
73 SSLStatus* ssl_status) { | 58 SSLStatus* ssl_status) { |
74 DCHECK(ssl_info.cert); | 59 DCHECK(ssl_info.cert); |
75 int cert_id = cert_store->StoreCert(ssl_info.cert.get(), child_id); | 60 int cert_id = cert_store->StoreCert(ssl_info.cert.get(), child_id); |
76 | 61 |
77 SignedCertificateTimestampIDStatusList signed_certificate_timestamp_ids; | |
78 StoreSignedCertificateTimestamps(ssl_info.signed_certificate_timestamps, | |
79 child_id, &signed_certificate_timestamp_ids); | |
80 | |
81 *ssl_status = SSLStatus(SSLPolicy::GetSecurityStyleForResource( | 62 *ssl_status = SSLStatus(SSLPolicy::GetSecurityStyleForResource( |
82 url, cert_id, ssl_info.cert_status), | 63 url, cert_id, ssl_info.cert_status), |
83 cert_id, signed_certificate_timestamp_ids, ssl_info); | 64 cert_id, ssl_info); |
84 } | 65 } |
85 | 66 |
86 void PopulateResourceResponse(ResourceRequestInfoImpl* info, | 67 void PopulateResourceResponse(ResourceRequestInfoImpl* info, |
87 net::URLRequest* request, | 68 net::URLRequest* request, |
88 CertStore* cert_store, | 69 CertStore* cert_store, |
89 ResourceResponse* response) { | 70 ResourceResponse* response) { |
90 response->head.request_time = request->request_time(); | 71 response->head.request_time = request->request_time(); |
91 response->head.response_time = request->response_time(); | 72 response->head.response_time = request->response_time(); |
92 response->head.headers = request->response_headers(); | 73 response->head.headers = request->response_headers(); |
93 request->GetCharset(&response->head.charset); | 74 request->GetCharset(&response->head.charset); |
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
129 request->GetLoadTimingInfo(&response->head.load_timing); | 110 request->GetLoadTimingInfo(&response->head.load_timing); |
130 | 111 |
131 if (request->ssl_info().cert.get()) { | 112 if (request->ssl_info().cert.get()) { |
132 SSLStatus ssl_status; | 113 SSLStatus ssl_status; |
133 GetSSLStatusForRequest(request->url(), request->ssl_info(), | 114 GetSSLStatusForRequest(request->url(), request->ssl_info(), |
134 info->GetChildID(), cert_store, &ssl_status); | 115 info->GetChildID(), cert_store, &ssl_status); |
135 response->head.security_info = SerializeSecurityInfo(ssl_status); | 116 response->head.security_info = SerializeSecurityInfo(ssl_status); |
136 response->head.has_major_certificate_errors = | 117 response->head.has_major_certificate_errors = |
137 net::IsCertStatusError(ssl_status.cert_status) && | 118 net::IsCertStatusError(ssl_status.cert_status) && |
138 !net::IsCertStatusMinorError(ssl_status.cert_status); | 119 !net::IsCertStatusMinorError(ssl_status.cert_status); |
| 120 if (info->ShouldReportRawHeaders()) { |
| 121 // Only pass the Signed Certificate Timestamps (SCTs) when the network |
| 122 // panel of the DevTools is open, i.e. ShouldReportRawHeaders() is set. |
| 123 // These data are used to populate the requests in the security panel too. |
| 124 response->head.signed_certificate_timestamps = |
| 125 request->ssl_info().signed_certificate_timestamps; |
| 126 } |
139 } else { | 127 } else { |
140 // We should not have any SSL state. | 128 // We should not have any SSL state. |
141 DCHECK(!request->ssl_info().cert_status); | 129 DCHECK(!request->ssl_info().cert_status); |
142 DCHECK_EQ(request->ssl_info().security_bits, -1); | 130 DCHECK_EQ(request->ssl_info().security_bits, -1); |
143 DCHECK_EQ(request->ssl_info().key_exchange_info, 0); | 131 DCHECK_EQ(request->ssl_info().key_exchange_info, 0); |
144 DCHECK(!request->ssl_info().connection_status); | 132 DCHECK(!request->ssl_info().connection_status); |
145 } | 133 } |
146 } | 134 } |
147 | 135 |
148 } // namespace | 136 } // namespace |
(...skipping 609 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
758 } | 746 } |
759 | 747 |
760 UMA_HISTOGRAM_ENUMERATION("Net.Prefetch.Pattern", status, STATUS_MAX); | 748 UMA_HISTOGRAM_ENUMERATION("Net.Prefetch.Pattern", status, STATUS_MAX); |
761 } else if (request_->response_info().unused_since_prefetch) { | 749 } else if (request_->response_info().unused_since_prefetch) { |
762 TimeDelta total_time = base::TimeTicks::Now() - request_->creation_time(); | 750 TimeDelta total_time = base::TimeTicks::Now() - request_->creation_time(); |
763 UMA_HISTOGRAM_TIMES("Net.Prefetch.TimeSpentOnPrefetchHit", total_time); | 751 UMA_HISTOGRAM_TIMES("Net.Prefetch.TimeSpentOnPrefetchHit", total_time); |
764 } | 752 } |
765 } | 753 } |
766 | 754 |
767 } // namespace content | 755 } // namespace content |
OLD | NEW |