OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/ssl/chrome_expect_ct_reporter.h" | 5 #include "chrome/browser/ssl/chrome_expect_ct_reporter.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
145 | 145 |
146 std::unique_ptr<base::ListValue> unknown_scts(new base::ListValue()); | 146 std::unique_ptr<base::ListValue> unknown_scts(new base::ListValue()); |
147 std::unique_ptr<base::ListValue> invalid_scts(new base::ListValue()); | 147 std::unique_ptr<base::ListValue> invalid_scts(new base::ListValue()); |
148 std::unique_ptr<base::ListValue> valid_scts(new base::ListValue()); | 148 std::unique_ptr<base::ListValue> valid_scts(new base::ListValue()); |
149 | 149 |
150 for (const auto& sct_and_status : ssl_info.signed_certificate_timestamps) { | 150 for (const auto& sct_and_status : ssl_info.signed_certificate_timestamps) { |
151 switch (sct_and_status.status) { | 151 switch (sct_and_status.status) { |
152 case net::ct::SCT_STATUS_LOG_UNKNOWN: | 152 case net::ct::SCT_STATUS_LOG_UNKNOWN: |
153 AddUnknownSCT(sct_and_status, unknown_scts.get()); | 153 AddUnknownSCT(sct_and_status, unknown_scts.get()); |
154 break; | 154 break; |
| 155 case net::ct::SCT_STATUS_INVALID: |
155 case net::ct::SCT_STATUS_INVALID_SIGNATURE: | 156 case net::ct::SCT_STATUS_INVALID_SIGNATURE: |
156 case net::ct::SCT_STATUS_INVALID_TIMESTAMP: | 157 case net::ct::SCT_STATUS_INVALID_TIMESTAMP: |
157 AddInvalidSCT(sct_and_status, invalid_scts.get()); | 158 AddInvalidSCT(sct_and_status, invalid_scts.get()); |
158 break; | 159 break; |
159 case net::ct::SCT_STATUS_OK: | 160 case net::ct::SCT_STATUS_OK: |
160 AddValidSCT(sct_and_status, valid_scts.get()); | 161 AddValidSCT(sct_and_status, valid_scts.get()); |
161 break; | 162 break; |
162 default: | 163 default: |
163 NOTREACHED(); | 164 NOTREACHED(); |
164 } | 165 } |
165 } | 166 } |
166 | 167 |
167 report.Set("unknown-scts", std::move(unknown_scts)); | 168 report.Set("unknown-scts", std::move(unknown_scts)); |
168 report.Set("invalid-scts", std::move(invalid_scts)); | 169 report.Set("invalid-scts", std::move(invalid_scts)); |
169 report.Set("valid-scts", std::move(valid_scts)); | 170 report.Set("valid-scts", std::move(valid_scts)); |
170 | 171 |
171 std::string serialized_report; | 172 std::string serialized_report; |
172 if (!base::JSONWriter::Write(report, &serialized_report)) { | 173 if (!base::JSONWriter::Write(report, &serialized_report)) { |
173 LOG(ERROR) << "Failed to serialize Expect CT report"; | 174 LOG(ERROR) << "Failed to serialize Expect CT report"; |
174 return; | 175 return; |
175 } | 176 } |
176 | 177 |
177 UMA_HISTOGRAM_BOOLEAN("SSL.ExpectCTReportSendingAttempt", true); | 178 UMA_HISTOGRAM_BOOLEAN("SSL.ExpectCTReportSendingAttempt", true); |
178 | 179 |
179 report_sender_->Send(report_uri, serialized_report); | 180 report_sender_->Send(report_uri, serialized_report); |
180 } | 181 } |
OLD | NEW |