Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(39)

Side by Side Diff: components/certificate_reporting/error_reporter.cc

Issue 2483993002: Add report_id to ErrorReporter interface. (Closed)
Patch Set: Same as patchset #2 but with the proper diff Created 4 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2015 The Chromium Authors. All rights reserved. 1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "components/certificate_reporting/error_reporter.h" 5 #include "components/certificate_reporting/error_reporter.h"
6 6
7 #include <stddef.h> 7 #include <stddef.h>
8 8
9 #include <set> 9 #include <set>
10 #include <utility> 10 #include <utility>
11 11
12 #include "base/logging.h" 12 #include "base/logging.h"
13 #include "base/memory/ptr_util.h" 13 #include "base/memory/ptr_util.h"
14 #include "base/metrics/histogram_macros.h"
15 #include "base/metrics/sparse_histogram.h"
16 #include "components/certificate_reporting/encrypted_cert_logger.pb.h" 14 #include "components/certificate_reporting/encrypted_cert_logger.pb.h"
17 #include "crypto/aead.h" 15 #include "crypto/aead.h"
18 #include "crypto/curve25519.h" 16 #include "crypto/curve25519.h"
19 #include "crypto/hkdf.h" 17 #include "crypto/hkdf.h"
20 #include "crypto/random.h" 18 #include "crypto/random.h"
21 #include "net/url_request/report_sender.h" 19 #include "net/url_request/report_sender.h"
22 20
23 namespace certificate_reporting { 21 namespace certificate_reporting {
24 22
25 namespace { 23 namespace {
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after
93 91
94 encrypted_report->set_encrypted_report(ciphertext); 92 encrypted_report->set_encrypted_report(ciphertext);
95 encrypted_report->set_server_public_key_version(server_public_key_version); 93 encrypted_report->set_server_public_key_version(server_public_key_version);
96 encrypted_report->set_client_public_key(reinterpret_cast<char*>(public_key), 94 encrypted_report->set_client_public_key(reinterpret_cast<char*>(public_key),
97 sizeof(public_key)); 95 sizeof(public_key));
98 encrypted_report->set_algorithm( 96 encrypted_report->set_algorithm(
99 EncryptedCertLoggerRequest::AEAD_ECDH_AES_128_CTR_HMAC_SHA256); 97 EncryptedCertLoggerRequest::AEAD_ECDH_AES_128_CTR_HMAC_SHA256);
100 return true; 98 return true;
101 } 99 }
102 100
103 // Records an UMA histogram of the net errors when certificate reports
104 // fail to send.
105 void RecordUMAOnFailure(const GURL& report_uri, int net_error, int report_id) {
106 UMA_HISTOGRAM_SPARSE_SLOWLY("SSL.CertificateErrorReportFailure", -net_error);
107 }
108
109 } // namespace 101 } // namespace
110 102
111 ErrorReporter::ErrorReporter( 103 ErrorReporter::ErrorReporter(
112 net::URLRequestContext* request_context, 104 net::URLRequestContext* request_context,
113 const GURL& upload_url, 105 const GURL& upload_url,
114 net::ReportSender::CookiesPreference cookies_preference) 106 net::ReportSender::CookiesPreference cookies_preference)
115 : ErrorReporter( 107 : ErrorReporter(upload_url,
116 upload_url, 108 kServerPublicKey,
117 kServerPublicKey, 109 kServerPublicKeyVersion,
118 kServerPublicKeyVersion, 110 base::MakeUnique<net::ReportSender>(request_context,
119 base::MakeUnique<net::ReportSender>(request_context, 111 cookies_preference)) {}
120 cookies_preference,
121 base::Bind(RecordUMAOnFailure),
122 base::Callback<void(int)>())) {}
123 112
124 ErrorReporter::ErrorReporter( 113 ErrorReporter::ErrorReporter(
125 const GURL& upload_url, 114 const GURL& upload_url,
126 const uint8_t server_public_key[/* 32 */], 115 const uint8_t server_public_key[/* 32 */],
127 const uint32_t server_public_key_version, 116 const uint32_t server_public_key_version,
128 std::unique_ptr<net::ReportSender> certificate_report_sender) 117 std::unique_ptr<net::ReportSender> certificate_report_sender)
129 : certificate_report_sender_(std::move(certificate_report_sender)), 118 : certificate_report_sender_(std::move(certificate_report_sender)),
130 upload_url_(upload_url), 119 upload_url_(upload_url),
131 server_public_key_(server_public_key), 120 server_public_key_(server_public_key),
132 server_public_key_version_(server_public_key_version) { 121 server_public_key_version_(server_public_key_version) {
133 DCHECK(certificate_report_sender_); 122 DCHECK(certificate_report_sender_);
134 DCHECK(!upload_url.is_empty()); 123 DCHECK(!upload_url.is_empty());
135 } 124 }
136 125
137 ErrorReporter::~ErrorReporter() {} 126 ErrorReporter::~ErrorReporter() {}
138 127
139 void ErrorReporter::SendExtendedReportingReport( 128 void ErrorReporter::SendExtendedReportingReport(
140 const std::string& serialized_report) { 129 const std::string& serialized_report,
130 int report_id) {
141 if (upload_url_.SchemeIsCryptographic()) { 131 if (upload_url_.SchemeIsCryptographic()) {
142 certificate_report_sender_->Send(upload_url_, "application/octet-stream", 132 certificate_report_sender_->Send(upload_url_, "application/octet-stream",
143 serialized_report, 0); 133 serialized_report, report_id);
144 } else { 134 return;
145 EncryptedCertLoggerRequest encrypted_report;
146 if (!EncryptSerializedReport(server_public_key_, server_public_key_version_,
147 serialized_report, &encrypted_report)) {
148 LOG(ERROR) << "Failed to encrypt serialized report.";
149 return;
150 }
151 std::string serialized_encrypted_report;
152 encrypted_report.SerializeToString(&serialized_encrypted_report);
153 certificate_report_sender_->Send(upload_url_, "application/octet-stream",
154 serialized_encrypted_report, 0);
155 } 135 }
136 EncryptedCertLoggerRequest encrypted_report;
137 if (!EncryptSerializedReport(server_public_key_, server_public_key_version_,
138 serialized_report, &encrypted_report)) {
139 LOG(ERROR) << "Failed to encrypt serialized report.";
140 return;
141 }
142 std::string serialized_encrypted_report;
143 encrypted_report.SerializeToString(&serialized_encrypted_report);
144 certificate_report_sender_->Send(upload_url_, "application/octet-stream",
145 serialized_encrypted_report, report_id);
156 } 146 }
157 147
158 // Used only by tests. 148 // Used only by tests.
159 bool ErrorReporter::DecryptErrorReport( 149 bool ErrorReporter::DecryptErrorReport(
160 const uint8_t server_private_key[32], 150 const uint8_t server_private_key[32],
161 const EncryptedCertLoggerRequest& encrypted_report, 151 const EncryptedCertLoggerRequest& encrypted_report,
162 std::string* decrypted_serialized_report) { 152 std::string* decrypted_serialized_report) {
163 crypto::Aead aead(crypto::Aead::AES_128_CTR_HMAC_SHA256); 153 crypto::Aead aead(crypto::Aead::AES_128_CTR_HMAC_SHA256);
164 std::string key; 154 std::string key;
165 if (!GetHkdfSubkeySecret(aead.KeyLength(), server_private_key, 155 if (!GetHkdfSubkeySecret(aead.KeyLength(), server_private_key,
166 reinterpret_cast<const uint8_t*>( 156 reinterpret_cast<const uint8_t*>(
167 encrypted_report.client_public_key().data()), 157 encrypted_report.client_public_key().data()),
168 &key)) { 158 &key)) {
169 LOG(ERROR) << "Error getting subkey secret."; 159 LOG(ERROR) << "Error getting subkey secret.";
170 return false; 160 return false;
171 } 161 }
172 aead.Init(&key); 162 aead.Init(&key);
173 163
174 // Use an all-zero nonce because the key is random per-message. 164 // Use an all-zero nonce because the key is random per-message.
175 std::string nonce(aead.NonceLength(), 0); 165 std::string nonce(aead.NonceLength(), 0);
176 166
177 return aead.Open(encrypted_report.encrypted_report(), nonce, std::string(), 167 return aead.Open(encrypted_report.encrypted_report(), nonce, std::string(),
178 decrypted_serialized_report); 168 decrypted_serialized_report);
179 } 169 }
180 170
171 void ErrorReporter::SetErrorCallback(
172 const base::Callback<void(const GURL&, int, int)>& callback) {
173 certificate_report_sender_->SetErrorCallback(callback);
174 }
175
176 void ErrorReporter::SetSuccessCallback(
177 const base::Callback<void(int)>& callback) {
178 certificate_report_sender_->SetSuccessCallback(callback);
179 }
180
181 } // namespace certificate_reporting 181 } // namespace certificate_reporting
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698