| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index fa85b0568c7acfd10d555f9998a361c748cc0dba..cec13d61fc4fcd28c45bd457b6efc042d7f4632f 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -94,7 +94,9 @@
|
| #include "net/cert/cert_status_flags.h"
|
| #include "net/cert/cert_verifier.h"
|
| #include "net/cert/ct_verifier.h"
|
| +#include "net/cert/ct_verify_result.h"
|
| #include "net/cert/scoped_nss_types.h"
|
| +#include "net/cert/sct_status_flags.h"
|
| #include "net/cert/single_request_cert_verifier.h"
|
| #include "net/cert/x509_certificate_net_log_param.h"
|
| #include "net/cert/x509_util.h"
|
| @@ -2823,6 +2825,9 @@ bool SSLClientSocketNSS::GetSSLInfo(SSLInfo* ssl_info) {
|
|
|
| ssl_info->cert_status = server_cert_verify_result_.cert_status;
|
| ssl_info->cert = server_cert_verify_result_.verified_cert;
|
| +
|
| + AddSCTInfoToSSLInfo(ssl_info);
|
| +
|
| ssl_info->connection_status =
|
| core_->state().ssl_connection_status;
|
| ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes;
|
| @@ -3513,7 +3518,7 @@ void SSLClientSocketNSS::VerifyCT() {
|
| &ct_verify_result_);
|
|
|
| VLOG(1) << "CT Verification complete: result " << result
|
| - << " Unverified scts: " << ct_verify_result_.unverified_scts.size()
|
| + << " Invalid scts: " << ct_verify_result_.invalid_scts.size()
|
| << " Verified scts: " << ct_verify_result_.verified_scts.size()
|
| << " scts from unknown logs: "
|
| << ct_verify_result_.unknown_logs_scts.size();
|
| @@ -3555,6 +3560,28 @@ bool SSLClientSocketNSS::CalledOnValidThread() const {
|
| return valid_thread_id_ == base::PlatformThread::CurrentId();
|
| }
|
|
|
| +void SSLClientSocketNSS::AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const {
|
| + for (ct::SCTList::const_iterator iter =
|
| + ct_verify_result_.verified_scts.begin();
|
| + iter != ct_verify_result_.verified_scts.end(); ++iter) {
|
| + ssl_info->signed_certificate_timestamps.push_back(
|
| + SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_OK));
|
| + }
|
| + for (ct::SCTList::const_iterator iter =
|
| + ct_verify_result_.invalid_scts.begin();
|
| + iter != ct_verify_result_.invalid_scts.end(); ++iter) {
|
| + ssl_info->signed_certificate_timestamps.push_back(
|
| + SignedCertificateTimestampAndStatus(*iter, ct::SCT_STATUS_INVALID));
|
| + }
|
| + for (ct::SCTList::const_iterator iter =
|
| + ct_verify_result_.unknown_logs_scts.begin();
|
| + iter != ct_verify_result_.unknown_logs_scts.end(); ++iter) {
|
| + ssl_info->signed_certificate_timestamps.push_back(
|
| + SignedCertificateTimestampAndStatus(*iter,
|
| + ct::SCT_STATUS_LOG_UNKNOWN));
|
| + }
|
| +}
|
| +
|
| ServerBoundCertService* SSLClientSocketNSS::GetServerBoundCertService() const {
|
| return server_bound_cert_service_;
|
| }
|
|
|