Index: net/socket/ssl_client_socket_nss.cc |
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
index 7fee91b5e2c5d485f9a69c17cec3dffcbd55a4ab..d06c38a0ade43cebf184362554f592194fdff4d3 100644 |
--- a/net/socket/ssl_client_socket_nss.cc |
+++ b/net/socket/ssl_client_socket_nss.cc |
@@ -94,6 +94,7 @@ |
#include "net/cert/cert_status_flags.h" |
#include "net/cert/cert_verifier.h" |
#include "net/cert/ct_verifier.h" |
+#include "net/cert/sct_status_flags.h" |
#include "net/cert/single_request_cert_verifier.h" |
#include "net/cert/x509_certificate_net_log_param.h" |
#include "net/cert/x509_util.h" |
@@ -2775,6 +2776,21 @@ void SSLClientSocket::ClearSessionCache() { |
SSL_ClearSessionCache(); |
} |
+void SSLClientSocketNSS::AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const { |
+ // XXX(alcutter): set status properly for unknown logs etc. too. |
+ for (ct::SCTList::const_iterator iter = |
+ ct_verify_result_.verified_scts.begin(); |
+ iter != ct_verify_result_.verified_scts.end(); ++iter) { |
+ ssl_info->scts.push_back(std::make_pair(*iter, net::kSctStatusOk)); |
+ } |
+ for (ct::SCTList::const_iterator iter = |
+ ct_verify_result_.unverified_scts.begin(); |
+ iter != ct_verify_result_.unverified_scts.end(); ++iter) { |
+ ssl_info->scts.push_back(std::make_pair(*iter, |
+ net::kSctStatusInvalid)); |
+ } |
+} |
+ |
bool SSLClientSocketNSS::GetSSLInfo(SSLInfo* ssl_info) { |
EnterFunction(""); |
ssl_info->Reset(); |
@@ -2785,6 +2801,9 @@ bool SSLClientSocketNSS::GetSSLInfo(SSLInfo* ssl_info) { |
ssl_info->cert_status = server_cert_verify_result_.cert_status; |
ssl_info->cert = server_cert_verify_result_.verified_cert; |
+ |
+ AddSCTInfoToSSLInfo(ssl_info); |
+ |
ssl_info->connection_status = |
core_->state().ssl_connection_status; |
ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes; |