| OLD | NEW |
| 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/ssl/ssl_policy.h" | 5 #include "chrome/browser/ssl/ssl_policy.h" |
| 6 | 6 |
| 7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/singleton.h" | 9 #include "base/singleton.h" |
| 10 #include "base/string_piece.h" | 10 #include "base/string_piece.h" |
| (...skipping 14 matching lines...) Expand all Loading... |
| 25 #include "chrome/common/notification_service.h" | 25 #include "chrome/common/notification_service.h" |
| 26 #include "chrome/common/pref_names.h" | 26 #include "chrome/common/pref_names.h" |
| 27 #include "chrome/common/time_format.h" | 27 #include "chrome/common/time_format.h" |
| 28 #include "chrome/common/url_constants.h" | 28 #include "chrome/common/url_constants.h" |
| 29 #include "grit/browser_resources.h" | 29 #include "grit/browser_resources.h" |
| 30 #include "grit/generated_resources.h" | 30 #include "grit/generated_resources.h" |
| 31 #include "net/base/cert_status_flags.h" | 31 #include "net/base/cert_status_flags.h" |
| 32 #include "net/base/ssl_info.h" | 32 #include "net/base/ssl_info.h" |
| 33 #include "webkit/glue/resource_type.h" | 33 #include "webkit/glue/resource_type.h" |
| 34 | 34 |
| 35 namespace { |
| 36 |
| 37 static const char kDot = '.'; |
| 38 |
| 39 static bool IsIntranetHost(const std::string& host) { |
| 40 const size_t dot = host.find(kDot); |
| 41 return dot == std::string::npos || dot == host.length() - 1; |
| 42 } |
| 43 |
| 44 } // namespace |
| 45 |
| 35 SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) | 46 SSLPolicy::SSLPolicy(SSLPolicyBackend* backend) |
| 36 : backend_(backend) { | 47 : backend_(backend) { |
| 37 DCHECK(backend_); | 48 DCHECK(backend_); |
| 38 } | 49 } |
| 39 | 50 |
| 40 void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { | 51 void SSLPolicy::OnCertError(SSLCertErrorHandler* handler) { |
| 41 // First we check if we know the policy for this error. | 52 // First we check if we know the policy for this error. |
| 42 net::CertPolicy::Judgment judgment = | 53 net::CertPolicy::Judgment judgment = |
| 43 backend_->QueryPolicy(handler->ssl_info().cert, | 54 backend_->QueryPolicy(handler->ssl_info().cert, |
| 44 handler->request_url().host()); | 55 handler->request_url().host()); |
| (...skipping 99 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 144 return; | 155 return; |
| 145 | 156 |
| 146 // An HTTPS response may not have a certificate for some reason. When that | 157 // An HTTPS response may not have a certificate for some reason. When that |
| 147 // happens, use the unauthenticated (HTTP) rather than the authentication | 158 // happens, use the unauthenticated (HTTP) rather than the authentication |
| 148 // broken security style so that we can detect this error condition. | 159 // broken security style so that we can detect this error condition. |
| 149 if (!entry->ssl().cert_id()) { | 160 if (!entry->ssl().cert_id()) { |
| 150 entry->ssl().set_security_style(SECURITY_STYLE_UNAUTHENTICATED); | 161 entry->ssl().set_security_style(SECURITY_STYLE_UNAUTHENTICATED); |
| 151 return; | 162 return; |
| 152 } | 163 } |
| 153 | 164 |
| 165 if (!(entry->ssl().cert_status() & net::CERT_STATUS_COMMON_NAME_INVALID)) { |
| 166 // CAs issue certificates for intranet hosts to everyone. Therefore, we |
| 167 // mark intranet hosts as being non-unique. |
| 168 if (IsIntranetHost(entry->url().host())) { |
| 169 entry->ssl().set_cert_status(entry->ssl().cert_status() | |
| 170 net::CERT_STATUS_NON_UNIQUE_NAME); |
| 171 } |
| 172 } |
| 173 |
| 154 // If CERT_STATUS_UNABLE_TO_CHECK_REVOCATION is the only certificate error, | 174 // If CERT_STATUS_UNABLE_TO_CHECK_REVOCATION is the only certificate error, |
| 155 // don't lower the security style to SECURITY_STYLE_AUTHENTICATION_BROKEN. | 175 // don't lower the security style to SECURITY_STYLE_AUTHENTICATION_BROKEN. |
| 156 int cert_errors = entry->ssl().cert_status() & net::CERT_STATUS_ALL_ERRORS; | 176 int cert_errors = entry->ssl().cert_status() & net::CERT_STATUS_ALL_ERRORS; |
| 157 if (cert_errors) { | 177 if (cert_errors) { |
| 158 if (cert_errors != net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION) | 178 if (cert_errors != net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION) |
| 159 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); | 179 entry->ssl().set_security_style(SECURITY_STYLE_AUTHENTICATION_BROKEN); |
| 160 return; | 180 return; |
| 161 } | 181 } |
| 162 | 182 |
| 163 SiteInstance* site_instance = entry->site_instance(); | 183 SiteInstance* site_instance = entry->site_instance(); |
| (...skipping 72 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 236 | 256 |
| 237 entry->ssl().set_security_style(entry->url().SchemeIsSecure() ? | 257 entry->ssl().set_security_style(entry->url().SchemeIsSecure() ? |
| 238 SECURITY_STYLE_AUTHENTICATED : SECURITY_STYLE_UNAUTHENTICATED); | 258 SECURITY_STYLE_AUTHENTICATED : SECURITY_STYLE_UNAUTHENTICATED); |
| 239 } | 259 } |
| 240 | 260 |
| 241 void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) { | 261 void SSLPolicy::OriginRanInsecureContent(const std::string& origin, int pid) { |
| 242 GURL parsed_origin(origin); | 262 GURL parsed_origin(origin); |
| 243 if (parsed_origin.SchemeIsSecure()) | 263 if (parsed_origin.SchemeIsSecure()) |
| 244 backend_->HostRanInsecureContent(parsed_origin.host(), pid); | 264 backend_->HostRanInsecureContent(parsed_origin.host(), pid); |
| 245 } | 265 } |
| OLD | NEW |