Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(393)

Unified Diff: net/base/x509_certificate_nss.cc

Issue 6874039: Return the constructed certificate chain in X509Certificate::Verify() (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Ensure the EE cert is marked as a TLS server cert, not a CA cert Created 9 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/x509_certificate_nss.cc
diff --git a/net/base/x509_certificate_nss.cc b/net/base/x509_certificate_nss.cc
index 9ec937600909307b75f7e23ad95ff0987efc0075..7c578890ce44f3000db7960015d2a2c828ff89f4 100644
--- a/net/base/x509_certificate_nss.cc
+++ b/net/base/x509_certificate_nss.cc
@@ -168,19 +168,28 @@ int MapCertErrorToCertStatus(int err) {
// Saves some information about the certificate chain cert_list in
// *verify_result. The caller MUST initialize *verify_result before calling
// this function.
-// Note that cert_list[0] is the end entity certificate and cert_list doesn't
-// contain the root CA certificate.
+// Note that cert_list[0] is the end entity certificate.
void GetCertChainInfo(CERTCertList* cert_list,
+ CERTCertificate* root_cert,
CertVerifyResult* verify_result) {
// NOTE: Using a NSS library before 3.12.3.1 will crash below. To see the
// NSS version currently in use:
// 1. use ldd on the chrome executable for NSS's location (ie. libnss3.so*)
// 2. use ident libnss3.so* for the library's version
- DCHECK(cert_list);
+ if (!cert_list)
+ return;
wtc 2011/07/26 00:16:35 Why do you want to allow cert_list to be NULL? Thi
Ryan Sleevi 2011/07/26 01:44:50 Thanks for catching this. In digging down further
+
+ CERTCertificate* verified_cert = NULL;
+ std::vector<CERTCertificate*> verified_chain;
int i = 0;
for (CERTCertListNode* node = CERT_LIST_HEAD(cert_list);
!CERT_LIST_END(node, cert_list);
- node = CERT_LIST_NEXT(node), i++) {
+ node = CERT_LIST_NEXT(node), ++i) {
+ if (i == 0) {
+ verified_cert = node->cert;
+ } else {
+ verified_chain.push_back(node->cert);
+ }
SECAlgorithmID& signature = node->cert->signature;
SECOidTag oid_tag = SECOID_FindOIDTag(&signature.algorithm);
switch (oid_tag) {
@@ -201,6 +210,15 @@ void GetCertChainInfo(CERTCertList* cert_list,
break;
}
}
+
+ if (!verified_cert)
+ return;
+
+ // If the chain was not trusted, |root_cert| may be NULL.
+ if (root_cert)
+ verified_chain.push_back(root_cert);
+ verify_result->verified_cert =
+ X509Certificate::CreateFromHandle(verified_cert, verified_chain);
}
// IsKnownRoot returns true if the given certificate is one that we believe
@@ -769,6 +787,8 @@ int X509Certificate::Verify(const std::string& hostname,
int flags,
CertVerifyResult* verify_result) const {
verify_result->Reset();
+ verify_result->verified_cert =
+ CreateFromHandle(cert_handle_, GetIntermediateCertificates());
if (IsBlacklisted()) {
verify_result->cert_status |= CERT_STATUS_REVOKED;
@@ -807,6 +827,11 @@ int X509Certificate::Verify(const std::string& hostname,
flags &= ~VERIFY_EV_CERT;
}
status = PKIXVerifyCert(cert_handle_, check_revocation, NULL, 0, cvout);
+
+ GetCertChainInfo(cvout[cvout_cert_list_index].value.pointer.chain,
+ cvout[cvout_trust_anchor_index].value.pointer.cert,
+ verify_result);
+
if (status != SECSuccess) {
int err = PORT_GetError();
LOG(ERROR) << "CERT_PKIXVerifyCert for " << hostname
@@ -825,8 +850,6 @@ int X509Certificate::Verify(const std::string& hostname,
return MapSecurityError(err);
}
- GetCertChainInfo(cvout[cvout_cert_list_index].value.pointer.chain,
- verify_result);
if (IsCertStatusError(verify_result->cert_status))
return MapCertStatusToNetError(verify_result->cert_status);

Powered by Google App Engine
This is Rietveld 408576698