OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/ssl/chrome_expect_ct_reporter.h" | 5 #include "chrome/browser/ssl/chrome_expect_ct_reporter.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "base/base64.h" | 9 #include "base/base64.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
145 | 145 |
146 std::unique_ptr<base::ListValue> unknown_scts(new base::ListValue()); | 146 std::unique_ptr<base::ListValue> unknown_scts(new base::ListValue()); |
147 std::unique_ptr<base::ListValue> invalid_scts(new base::ListValue()); | 147 std::unique_ptr<base::ListValue> invalid_scts(new base::ListValue()); |
148 std::unique_ptr<base::ListValue> valid_scts(new base::ListValue()); | 148 std::unique_ptr<base::ListValue> valid_scts(new base::ListValue()); |
149 | 149 |
150 for (const auto& sct_and_status : ssl_info.signed_certificate_timestamps) { | 150 for (const auto& sct_and_status : ssl_info.signed_certificate_timestamps) { |
151 switch (sct_and_status.status) { | 151 switch (sct_and_status.status) { |
152 case net::ct::SCT_STATUS_LOG_UNKNOWN: | 152 case net::ct::SCT_STATUS_LOG_UNKNOWN: |
153 AddUnknownSCT(sct_and_status, unknown_scts.get()); | 153 AddUnknownSCT(sct_and_status, unknown_scts.get()); |
154 break; | 154 break; |
155 case net::ct::SCT_STATUS_INVALID: | |
156 case net::ct::SCT_STATUS_INVALID_SIGNATURE: | 155 case net::ct::SCT_STATUS_INVALID_SIGNATURE: |
157 case net::ct::SCT_STATUS_INVALID_TIMESTAMP: | 156 case net::ct::SCT_STATUS_INVALID_TIMESTAMP: |
158 AddInvalidSCT(sct_and_status, invalid_scts.get()); | 157 AddInvalidSCT(sct_and_status, invalid_scts.get()); |
159 break; | 158 break; |
160 case net::ct::SCT_STATUS_OK: | 159 case net::ct::SCT_STATUS_OK: |
161 AddValidSCT(sct_and_status, valid_scts.get()); | 160 AddValidSCT(sct_and_status, valid_scts.get()); |
162 break; | 161 break; |
163 default: | 162 default: |
164 NOTREACHED(); | 163 NOTREACHED(); |
165 } | 164 } |
166 } | 165 } |
167 | 166 |
168 report.Set("unknown-scts", std::move(unknown_scts)); | 167 report.Set("unknown-scts", std::move(unknown_scts)); |
169 report.Set("invalid-scts", std::move(invalid_scts)); | 168 report.Set("invalid-scts", std::move(invalid_scts)); |
170 report.Set("valid-scts", std::move(valid_scts)); | 169 report.Set("valid-scts", std::move(valid_scts)); |
171 | 170 |
172 std::string serialized_report; | 171 std::string serialized_report; |
173 if (!base::JSONWriter::Write(report, &serialized_report)) { | 172 if (!base::JSONWriter::Write(report, &serialized_report)) { |
174 LOG(ERROR) << "Failed to serialize Expect CT report"; | 173 LOG(ERROR) << "Failed to serialize Expect CT report"; |
175 return; | 174 return; |
176 } | 175 } |
177 | 176 |
178 UMA_HISTOGRAM_BOOLEAN("SSL.ExpectCTReportSendingAttempt", true); | 177 UMA_HISTOGRAM_BOOLEAN("SSL.ExpectCTReportSendingAttempt", true); |
179 | 178 |
180 report_sender_->Send(report_uri, serialized_report); | 179 report_sender_->Send(report_uri, serialized_report); |
181 } | 180 } |
OLD | NEW |