Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1037)

Unified Diff: net/base/test_root_certs_win.cc

Issue 4646001: Implement LoadTemporaryRoot for Windows (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/net/base
Patch Set: Rebase to trunk with OpenSSL fixes from joth Created 10 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/test_root_certs_win.cc
diff --git a/net/base/test_root_certs_win.cc b/net/base/test_root_certs_win.cc
new file mode 100644
index 0000000000000000000000000000000000000000..9a9c409ab1d8eb9c423e47e3de4fc5899f56261f
--- /dev/null
+++ b/net/base/test_root_certs_win.cc
@@ -0,0 +1,128 @@
+// Copyright (c) 2010 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/base/test_root_certs.h"
+
+#include "base/logging.h"
+#include "net/base/x509_certificate.h"
+
+namespace net {
+
+namespace {
+
+// Creates a new temporary memory store.
+HCERTSTORE CreateMemoryStore() {
+ return CertOpenStore(CERT_STORE_PROV_MEMORY, 0, NULL,
+ CERT_STORE_DEFER_CLOSE_UNTIL_LAST_FREE_FLAG, NULL);
+}
+
+} // namespace
+
+bool TestRootCerts::Add(X509Certificate* certificate) {
+ BOOL ok = CertAddCertificateContextToStore(
+ temporary_roots_, certificate->os_cert_handle(),
+ CERT_STORE_ADD_NEW, NULL);
+ if (!ok) {
+ // If the certificate is already added, return successfully.
+ return GetLastError() == CRYPT_E_EXISTS;
+ }
+
+ empty_ = false;
+ return true;
+}
+
+void TestRootCerts::Clear() {
+ CertCloseStore(temporary_roots_, 0);
+ temporary_roots_ = CreateMemoryStore();
+ DCHECK(temporary_roots_);
+ empty_ = true;
+}
+
+bool TestRootCerts::IsEmpty() const {
+ return empty_;
+}
+
+void TestRootCerts::FixupChainContext(
+ PCERT_CHAIN_CONTEXT chain_context) const {
+ if ((chain_context->TrustStatus.dwErrorStatus &
+ CERT_TRUST_IS_UNTRUSTED_ROOT) == 0)
+ return; // Trusted certificate - nothing to fix.
+
+ if (IsEmpty())
+ return; // No need to scan - no temporary trusted certificates.
+
+ // Until Windows 7, it is not possible for an application to mark
+ // certificates as trusted for only that application, via the
+ // CERT_CHAIN_ENGINE_CONFIG.hExclusiveRoot. Because of this deficiency,
+ // a method similar to the one employed by Outlook and EFS is used, as
+ // described at http://technet.microsoft.com/en-us/library/bb457027.aspx
+ // Unlike the behaviour of Outlook, EFS, and the PeerOrChainTrustValidator
+ // of Windows Communication Foundation, an attempt is made to build a full
+ // certificate chain, rather than merely checking for the presence of the
+ // target certificate in an application-trusted store. If the chain
+ // verification fails due to trust issues, then the individual chains and
+ // certificates are compared with |temporary_roots_|. If a matching
+ // certificate can be found, then the trust-related failure status bits
+ // are unset, causing the certificate to appear as trusted, provided there
+ // were no other verification failures.
+ //
+ // Because of how CryptoAPI is implemented, it is not possible to perform
+ // revocation checking via CRLs or OCSP for a certificate that does not
+ // chain to a certificate in "Trusted Roots", so it is not possible to
+ // test revocation checking. More information about this can be found at
+ // http://technet.microsoft.com/en-us/library/ee619754(WS.10).aspx#BKMK_BC
+ for (DWORD chain_index = 0; chain_index < chain_context->cChain;
+ ++chain_index) {
+ PCERT_SIMPLE_CHAIN chain = chain_context->rgpChain[chain_index];
+
+ // Scan through all the certificates, rather than just the root, to match
+ // Windows' behaviour of supporting trust anchors anywhere in the chain,
+ // as described in RFCs 3280/5280.
+ for (DWORD element_index = 0; element_index < chain->cElement;
+ ++element_index) {
+ PCERT_CHAIN_ELEMENT element = chain->rgpElement[element_index];
+ PCCERT_CONTEXT cert = CertFindCertificateInStore(
+ temporary_roots_, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0,
+ CERT_FIND_EXISTING, element->pCertContext, NULL);
+ if (cert != NULL) {
+ // Successfully matched a certificate in one of the chains with a
+ // certificate in |temporary_roots_|.
+ CertFreeCertificateContext(cert);
+
+ // Unset both the element status and the overall chain status. While
+ // X509Certificate only checks the TrustStatus of the chain_context,
+ // the individual chain and element TrustStatuses are also modified
+ // for subsequent CryptoAPI calls.
+ if (element->TrustStatus.dwErrorStatus &
+ CERT_TRUST_IS_UNTRUSTED_ROOT) {
+ element->TrustStatus.dwErrorStatus &=
+ ~(CERT_TRUST_IS_UNTRUSTED_ROOT |
+ CERT_TRUST_REVOCATION_STATUS_UNKNOWN |
+ CERT_TRUST_IS_OFFLINE_REVOCATION);
+ chain->TrustStatus.dwErrorStatus &=
+ ~(CERT_TRUST_IS_UNTRUSTED_ROOT |
+ CERT_TRUST_REVOCATION_STATUS_UNKNOWN |
+ CERT_TRUST_IS_OFFLINE_REVOCATION);
+ chain_context->TrustStatus.dwErrorStatus &=
+ ~(CERT_TRUST_IS_UNTRUSTED_ROOT |
+ CERT_TRUST_REVOCATION_STATUS_UNKNOWN |
+ CERT_TRUST_IS_OFFLINE_REVOCATION);
+ return;
+ }
+ }
+ }
+ }
+}
+
+TestRootCerts::TestRootCerts()
+ : temporary_roots_(CreateMemoryStore()),
+ empty_(true) {
+ DCHECK(temporary_roots_);
+}
+
+TestRootCerts::~TestRootCerts() {
+ CertCloseStore(temporary_roots_, 0);
+}
+
+} // namespace net

Powered by Google App Engine
This is Rietveld 408576698