diff options
author | palmer@chromium.org <palmer@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-10-16 01:58:34 +0000 |
---|---|---|
committer | palmer@chromium.org <palmer@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-10-16 01:58:34 +0000 |
commit | 7f26918a79ab8fd9ec095ccece9b3ba3002e6207 (patch) | |
tree | f385417790f9d49ee5360628ee791d1086c821fd /net | |
parent | 2f5e4e8b4d96f34c59667eca726e83fdd7a5e183 (diff) | |
download | chromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.zip chromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.tar.gz chromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.tar.bz2 |
Enable fraudulent certificate chain reporting.
BUG=99185
Review URL: http://codereview.chromium.org/8120016
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105706 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r-- | net/url_request/url_request_http_job.cc | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/net/url_request/url_request_http_job.cc b/net/url_request/url_request_http_job.cc index 36dd61a..6a59cd8 100644 --- a/net/url_request/url_request_http_job.cc +++ b/net/url_request/url_request_http_job.cc @@ -36,6 +36,7 @@ #include "net/http/http_transaction.h" #include "net/http/http_transaction_factory.h" #include "net/http/http_util.h" +#include "net/url_request/fraudulent_certificate_reporter.h" #include "net/url_request/url_request.h" #include "net/url_request/url_request_context.h" #include "net/url_request/url_request_error_job.h" @@ -673,15 +674,18 @@ void URLRequestHttpJob::OnStartCompleted(int result) { ssl_info.is_issued_by_known_root && context_->transport_security_state()) { TransportSecurityState::DomainState domain_state; + bool sni = SSLConfigService::IsSNIAvailable(context_->ssl_config_service()); if (context_->transport_security_state()->HasPinsForHost( &domain_state, - request_->url().host(), - SSLConfigService::IsSNIAvailable( - context_->ssl_config_service()))) { + request_->url().host(), sni)) { if (!domain_state.IsChainOfPublicKeysPermitted( ssl_info.public_key_hashes)) { result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; UMA_HISTOGRAM_BOOLEAN("Net.CertificatePinSuccess", false); + FraudulentCertificateReporter* reporter = + context_->fraudulent_certificate_reporter(); + if (reporter != NULL) + reporter->SendReport(request_->url().host(), ssl_info, sni); } else { UMA_HISTOGRAM_BOOLEAN("Net.CertificatePinSuccess", true); } |