Index: net/http/transport_security_state.cc |
diff --git a/net/http/transport_security_state.cc b/net/http/transport_security_state.cc |
index 73626e0411ef194af6fa75f782c3fd6c36edc074..e5202c054e3265cb8f1d0e68b24d465fa4b6c773 100644 |
--- a/net/http/transport_security_state.cc |
+++ b/net/http/transport_security_state.cc |
@@ -891,9 +891,10 @@ TransportSecurityState::CheckCTRequirements( |
GetDynamicExpectCTState(hostname, &state)) { |
if (expect_ct_reporter_ && !state.report_uri.is_empty() && |
report_status == ENABLE_EXPECT_CT_REPORTS) { |
- MaybeNotifyExpectCTFailed( |
- host_port_pair, state.report_uri, validated_certificate_chain, |
- served_certificate_chain, signed_certificate_timestamps); |
+ MaybeNotifyExpectCTFailed(host_port_pair, state.report_uri, state.expiry, |
+ validated_certificate_chain, |
+ served_certificate_chain, |
+ signed_certificate_timestamps); |
} |
if (state.enforce) |
return CT_REQUIREMENTS_NOT_MET; |
@@ -1208,6 +1209,7 @@ bool TransportSecurityState::GetStaticExpectCTState( |
void TransportSecurityState::MaybeNotifyExpectCTFailed( |
const HostPortPair& host_port_pair, |
const GURL& report_uri, |
+ base::Time expiration, |
const X509Certificate* validated_certificate_chain, |
const X509Certificate* served_certificate_chain, |
const SignedCertificateTimestampAndStatusList& |
@@ -1228,7 +1230,7 @@ void TransportSecurityState::MaybeNotifyExpectCTFailed( |
base::TimeDelta::FromMinutes(kTimeToRememberReportsMins)); |
expect_ct_reporter_->OnExpectCTFailed( |
- host_port_pair, report_uri, validated_certificate_chain, |
+ host_port_pair, report_uri, expiration, validated_certificate_chain, |
served_certificate_chain, signed_certificate_timestamps); |
} |
@@ -1476,7 +1478,7 @@ void TransportSecurityState::ProcessExpectCTHeader( |
return; |
ExpectCTState state; |
if (GetStaticExpectCTState(host_port_pair.host(), &state)) { |
- MaybeNotifyExpectCTFailed(host_port_pair, state.report_uri, |
+ MaybeNotifyExpectCTFailed(host_port_pair, state.report_uri, base::Time(), |
ssl_info.cert.get(), |
ssl_info.unverified_cert.get(), |
ssl_info.signed_certificate_timestamps); |
@@ -1512,7 +1514,8 @@ void TransportSecurityState::ProcessExpectCTHeader( |
// processing the header. |
if (expect_ct_reporter_ && !report_uri.is_empty() && |
!GetDynamicExpectCTState(host_port_pair.host(), &state)) { |
- MaybeNotifyExpectCTFailed(host_port_pair, report_uri, ssl_info.cert.get(), |
+ MaybeNotifyExpectCTFailed(host_port_pair, report_uri, base::Time(), |
+ ssl_info.cert.get(), |
ssl_info.unverified_cert.get(), |
ssl_info.signed_certificate_timestamps); |
} |