Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(832)

Side by Side Diff: net/socket/ssl_client_socket_nss.cc

Issue 2605007: Fix a regression on Windows introduced by r48650.... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 10 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/socket/ssl_client_socket_nss.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived 5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived
6 // from AuthCertificateCallback() in 6 // from AuthCertificateCallback() in
7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp. 7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp.
8 8
9 /* ***** BEGIN LICENSE BLOCK ***** 9 /* ***** BEGIN LICENSE BLOCK *****
10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
(...skipping 638 matching lines...) Expand 10 before | Expand all | Expand 10 after
649 } 649 }
650 650
651 bool SSLClientSocketNSS::SetReceiveBufferSize(int32 size) { 651 bool SSLClientSocketNSS::SetReceiveBufferSize(int32 size) {
652 return transport_->SetReceiveBufferSize(size); 652 return transport_->SetReceiveBufferSize(size);
653 } 653 }
654 654
655 bool SSLClientSocketNSS::SetSendBufferSize(int32 size) { 655 bool SSLClientSocketNSS::SetSendBufferSize(int32 size) {
656 return transport_->SetSendBufferSize(size); 656 return transport_->SetSendBufferSize(size);
657 } 657 }
658 658
659 #if defined(OS_WIN)
660 // static
661 X509Certificate::OSCertHandle SSLClientSocketNSS::CreateOSCert(
662 const SECItem& der_cert) {
663 // TODO(wtc): close cert_store_ at shutdown.
664 if (!cert_store_)
665 cert_store_ = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, NULL, 0, NULL);
666
667 X509Certificate::OSCertHandle cert_handle = NULL;
668 BOOL ok = CertAddEncodedCertificateToStore(
669 cert_store_, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
670 der_cert.data, der_cert.len, CERT_STORE_ADD_USE_EXISTING, &cert_handle);
671 return ok ? cert_handle : NULL;
672 }
673 #elif defined(OS_MACOSX)
674 // static
675 X509Certificate::OSCertHandle SSLClientSocketNSS::CreateOSCert(
676 const SECItem& der_cert) {
677 return X509Certificate::CreateOSCertHandleFromBytes(
678 reinterpret_cast<char*>(der_cert.data), der_cert.len);
679 }
680 #endif
681
659 X509Certificate *SSLClientSocketNSS::UpdateServerCert() { 682 X509Certificate *SSLClientSocketNSS::UpdateServerCert() {
660 // We set the server_cert_ from OwnAuthCertHandler(), but this handler 683 // We set the server_cert_ from OwnAuthCertHandler(), but this handler
661 // does not necessarily get called if we are continuing a cached SSL 684 // does not necessarily get called if we are continuing a cached SSL
662 // session. 685 // session.
663 if (server_cert_ == NULL) { 686 if (server_cert_ == NULL) {
664 server_cert_nss_ = SSL_PeerCertificate(nss_fd_); 687 server_cert_nss_ = SSL_PeerCertificate(nss_fd_);
665 if (server_cert_nss_) { 688 if (server_cert_nss_) {
666 #if defined(OS_MACOSX) || defined(OS_WIN) 689 #if defined(OS_MACOSX) || defined(OS_WIN)
667 // Get each of the intermediate certificates in the server's chain. 690 // Get each of the intermediate certificates in the server's chain.
668 // These will be added to the server's X509Certificate object, making 691 // These will be added to the server's X509Certificate object, making
(...skipping 10 matching lines...) Expand all
679 continue; 702 continue;
680 #if defined(OS_WIN) 703 #if defined(OS_WIN)
681 // Work around http://crbug.com/43538 by not importing the 704 // Work around http://crbug.com/43538 by not importing the
682 // problematic COMODO EV SGC CA certificate. CryptoAPI will 705 // problematic COMODO EV SGC CA certificate. CryptoAPI will
683 // download a good certificate for that CA, issued by COMODO 706 // download a good certificate for that CA, issued by COMODO
684 // Certification Authority, using the AIA extension in the server 707 // Certification Authority, using the AIA extension in the server
685 // certificate. 708 // certificate.
686 if (IsProblematicComodoEVCACert(*node->cert)) 709 if (IsProblematicComodoEVCACert(*node->cert))
687 continue; 710 continue;
688 #endif 711 #endif
689 cert_handle = X509Certificate::CreateOSCertHandleFromBytes( 712 cert_handle = CreateOSCert(node->cert->derCert);
690 reinterpret_cast<char*>(node->cert->derCert.data),
691 node->cert->derCert.len);
692 DCHECK(cert_handle); 713 DCHECK(cert_handle);
693 intermediate_ca_certs.push_back(cert_handle); 714 intermediate_ca_certs.push_back(cert_handle);
694 } 715 }
695 CERT_DestroyCertList(cert_list); 716 CERT_DestroyCertList(cert_list);
696 } 717 }
697 718
698 // Finally create the X509Certificate object. 719 // Finally create the X509Certificate object.
699 cert_handle = X509Certificate::CreateOSCertHandleFromBytes( 720 cert_handle = CreateOSCert(server_cert_nss_->derCert);
700 reinterpret_cast<char*>(server_cert_nss_->derCert.data),
701 server_cert_nss_->derCert.len);
702 DCHECK(cert_handle); 721 DCHECK(cert_handle);
703 server_cert_ = X509Certificate::CreateFromHandle( 722 server_cert_ = X509Certificate::CreateFromHandle(
704 cert_handle, 723 cert_handle,
705 X509Certificate::SOURCE_FROM_NETWORK, 724 X509Certificate::SOURCE_FROM_NETWORK,
706 intermediate_ca_certs); 725 intermediate_ca_certs);
707 for (size_t i = 0; i < intermediate_ca_certs.size(); ++i) 726 for (size_t i = 0; i < intermediate_ca_certs.size(); ++i)
708 X509Certificate::FreeOSCertHandle(intermediate_ca_certs[i]); 727 X509Certificate::FreeOSCertHandle(intermediate_ca_certs[i]);
709 #else 728 #else
710 server_cert_ = X509Certificate::CreateFromHandle( 729 server_cert_ = X509Certificate::CreateFromHandle(
711 CERT_DupCertificate(server_cert_nss_), 730 CERT_DupCertificate(server_cert_nss_),
(...skipping 785 matching lines...) Expand 10 before | Expand all | Expand 10 after
1497 PRErrorCode prerr = PR_GetError(); 1516 PRErrorCode prerr = PR_GetError();
1498 if (prerr == PR_WOULD_BLOCK_ERROR) { 1517 if (prerr == PR_WOULD_BLOCK_ERROR) {
1499 LeaveFunction(""); 1518 LeaveFunction("");
1500 return ERR_IO_PENDING; 1519 return ERR_IO_PENDING;
1501 } 1520 }
1502 LeaveFunction(""); 1521 LeaveFunction("");
1503 return MapNSPRError(prerr); 1522 return MapNSPRError(prerr);
1504 } 1523 }
1505 1524
1506 } // namespace net 1525 } // namespace net
OLDNEW
« no previous file with comments | « net/socket/ssl_client_socket_nss.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698