Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(540)

Side by Side Diff: net/ssl/ssl_info.cc

Issue 2040513003: Implement Expect-Staple (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/ssl_info.h" 5 #include "net/ssl/ssl_info.h"
6 6
7 #include "base/pickle.h" 7 #include "base/pickle.h"
8 #include "net/cert/cert_status_flags.h" 8 #include "net/cert/cert_status_flags.h"
9 #include "net/cert/ct_policy_status.h" 9 #include "net/cert/ct_policy_status.h"
10 #include "net/cert/signed_certificate_timestamp.h" 10 #include "net/cert/signed_certificate_timestamp.h"
(...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after
59 token_binding_negotiated = false; 59 token_binding_negotiated = false;
60 token_binding_key_param = TB_PARAM_ECDSAP256; 60 token_binding_key_param = TB_PARAM_ECDSAP256;
61 handshake_type = HANDSHAKE_UNKNOWN; 61 handshake_type = HANDSHAKE_UNKNOWN;
62 public_key_hashes.clear(); 62 public_key_hashes.clear();
63 pinning_failure_log.clear(); 63 pinning_failure_log.clear();
64 signed_certificate_timestamps.clear(); 64 signed_certificate_timestamps.clear();
65 ct_compliance_details_available = false; 65 ct_compliance_details_available = false;
66 ct_ev_policy_compliance = ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY; 66 ct_ev_policy_compliance = ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
67 ct_cert_policy_compliance = 67 ct_cert_policy_compliance =
68 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; 68 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS;
69 ocsp_staples.clear();
69 } 70 }
70 71
71 void SSLInfo::SetCertError(int error) { 72 void SSLInfo::SetCertError(int error) {
72 cert_status |= MapNetErrorToCertStatus(error); 73 cert_status |= MapNetErrorToCertStatus(error);
73 } 74 }
74 75
75 void SSLInfo::UpdateCertificateTransparencyInfo( 76 void SSLInfo::UpdateCertificateTransparencyInfo(
76 const ct::CTVerifyResult& ct_verify_result) { 77 const ct::CTVerifyResult& ct_verify_result) {
77 for (const auto& sct : ct_verify_result.verified_scts) { 78 for (const auto& sct : ct_verify_result.verified_scts) {
78 signed_certificate_timestamps.push_back( 79 signed_certificate_timestamps.push_back(
79 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK)); 80 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK));
80 } 81 }
81 for (const auto& sct : ct_verify_result.invalid_scts) { 82 for (const auto& sct : ct_verify_result.invalid_scts) {
82 signed_certificate_timestamps.push_back( 83 signed_certificate_timestamps.push_back(
83 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID)); 84 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID));
84 } 85 }
85 for (const auto& sct : ct_verify_result.unknown_logs_scts) { 86 for (const auto& sct : ct_verify_result.unknown_logs_scts) {
86 signed_certificate_timestamps.push_back( 87 signed_certificate_timestamps.push_back(
87 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN)); 88 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN));
88 } 89 }
89 90
90 ct_compliance_details_available = ct_verify_result.ct_policies_applied; 91 ct_compliance_details_available = ct_verify_result.ct_policies_applied;
91 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance; 92 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance;
92 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance; 93 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance;
93 } 94 }
94 95
96 SSLInfo::OCSPStaple::OCSPStaple()
97 : is_valid_date(false),
98 is_correct_certificate(false),
99 status(OCSPCertStatus::Status::UNKNOWN) {}
100
101 SSLInfo::OCSPStaple::~OCSPStaple() {}
102
95 } // namespace net 103 } // namespace net
OLDNEW
« chrome/browser/ssl/chrome_expect_staple_reporter.cc ('K') | « net/ssl/ssl_info.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698