| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/ssl/ssl_info.h" | 5 #include "net/ssl/ssl_info.h" |
| 6 | 6 |
| 7 #include "base/pickle.h" | 7 #include "base/pickle.h" |
| 8 #include "net/cert/cert_status_flags.h" | 8 #include "net/cert/cert_status_flags.h" |
| 9 #include "net/cert/ct_policy_status.h" | 9 #include "net/cert/ct_policy_status.h" |
| 10 #include "net/cert/signed_certificate_timestamp.h" | 10 #include "net/cert/signed_certificate_timestamp.h" |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 59 token_binding_negotiated = false; | 59 token_binding_negotiated = false; |
| 60 token_binding_key_param = TB_PARAM_ECDSAP256; | 60 token_binding_key_param = TB_PARAM_ECDSAP256; |
| 61 handshake_type = HANDSHAKE_UNKNOWN; | 61 handshake_type = HANDSHAKE_UNKNOWN; |
| 62 public_key_hashes.clear(); | 62 public_key_hashes.clear(); |
| 63 pinning_failure_log.clear(); | 63 pinning_failure_log.clear(); |
| 64 signed_certificate_timestamps.clear(); | 64 signed_certificate_timestamps.clear(); |
| 65 ct_compliance_details_available = false; | 65 ct_compliance_details_available = false; |
| 66 ct_ev_policy_compliance = ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; | 66 ct_ev_policy_compliance = ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; |
| 67 ct_cert_policy_compliance = | 67 ct_cert_policy_compliance = |
| 68 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; | 68 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
| 69 ocsp_staples.clear(); |
| 69 } | 70 } |
| 70 | 71 |
| 71 void SSLInfo::SetCertError(int error) { | 72 void SSLInfo::SetCertError(int error) { |
| 72 cert_status |= MapNetErrorToCertStatus(error); | 73 cert_status |= MapNetErrorToCertStatus(error); |
| 73 } | 74 } |
| 74 | 75 |
| 75 void SSLInfo::UpdateCertificateTransparencyInfo( | 76 void SSLInfo::UpdateCertificateTransparencyInfo( |
| 76 const ct::CTVerifyResult& ct_verify_result) { | 77 const ct::CTVerifyResult& ct_verify_result) { |
| 77 for (const auto& sct : ct_verify_result.verified_scts) { | 78 for (const auto& sct : ct_verify_result.verified_scts) { |
| 78 signed_certificate_timestamps.push_back( | 79 signed_certificate_timestamps.push_back( |
| 79 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK)); | 80 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK)); |
| 80 } | 81 } |
| 81 for (const auto& sct : ct_verify_result.invalid_scts) { | 82 for (const auto& sct : ct_verify_result.invalid_scts) { |
| 82 signed_certificate_timestamps.push_back( | 83 signed_certificate_timestamps.push_back( |
| 83 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID)); | 84 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID)); |
| 84 } | 85 } |
| 85 for (const auto& sct : ct_verify_result.unknown_logs_scts) { | 86 for (const auto& sct : ct_verify_result.unknown_logs_scts) { |
| 86 signed_certificate_timestamps.push_back( | 87 signed_certificate_timestamps.push_back( |
| 87 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN)); | 88 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN)); |
| 88 } | 89 } |
| 89 | 90 |
| 90 ct_compliance_details_available = ct_verify_result.ct_policies_applied; | 91 ct_compliance_details_available = ct_verify_result.ct_policies_applied; |
| 91 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance; | 92 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance; |
| 92 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance; | 93 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance; |
| 93 } | 94 } |
| 94 | 95 |
| 96 SSLInfo::OCSPStaple::OCSPStaple() |
| 97 : is_valid_date(false), |
| 98 is_correct_certificate(false), |
| 99 status(OCSPCertStatus::Status::UNKNOWN) {} |
| 100 |
| 101 SSLInfo::OCSPStaple::~OCSPStaple() {} |
| 102 |
| 95 } // namespace net | 103 } // namespace net |
| OLD | NEW |