summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authorpalmer@chromium.org <palmer@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-10-16 01:58:34 +0000
committerpalmer@chromium.org <palmer@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-10-16 01:58:34 +0000
commit7f26918a79ab8fd9ec095ccece9b3ba3002e6207 (patch)
treef385417790f9d49ee5360628ee791d1086c821fd /net
parent2f5e4e8b4d96f34c59667eca726e83fdd7a5e183 (diff)
downloadchromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.zip
chromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.tar.gz
chromium_src-7f26918a79ab8fd9ec095ccece9b3ba3002e6207.tar.bz2
Enable fraudulent certificate chain reporting.
BUG=99185 Review URL: http://codereview.chromium.org/8120016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105706 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/url_request/url_request_http_job.cc10
1 files changed, 7 insertions, 3 deletions
diff --git a/net/url_request/url_request_http_job.cc b/net/url_request/url_request_http_job.cc
index 36dd61a..6a59cd8 100644
--- a/net/url_request/url_request_http_job.cc
+++ b/net/url_request/url_request_http_job.cc
@@ -36,6 +36,7 @@
#include "net/http/http_transaction.h"
#include "net/http/http_transaction_factory.h"
#include "net/http/http_util.h"
+#include "net/url_request/fraudulent_certificate_reporter.h"
#include "net/url_request/url_request.h"
#include "net/url_request/url_request_context.h"
#include "net/url_request/url_request_error_job.h"
@@ -673,15 +674,18 @@ void URLRequestHttpJob::OnStartCompleted(int result) {
ssl_info.is_issued_by_known_root &&
context_->transport_security_state()) {
TransportSecurityState::DomainState domain_state;
+ bool sni = SSLConfigService::IsSNIAvailable(context_->ssl_config_service());
if (context_->transport_security_state()->HasPinsForHost(
&domain_state,
- request_->url().host(),
- SSLConfigService::IsSNIAvailable(
- context_->ssl_config_service()))) {
+ request_->url().host(), sni)) {
if (!domain_state.IsChainOfPublicKeysPermitted(
ssl_info.public_key_hashes)) {
result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN;
UMA_HISTOGRAM_BOOLEAN("Net.CertificatePinSuccess", false);
+ FraudulentCertificateReporter* reporter =
+ context_->fraudulent_certificate_reporter();
+ if (reporter != NULL)
+ reporter->SendReport(request_->url().host(), ssl_info, sni);
} else {
UMA_HISTOGRAM_BOOLEAN("Net.CertificatePinSuccess", true);
}