| Index: net/socket/ssl_client_socket_nss.cc
|
| ===================================================================
|
| --- net/socket/ssl_client_socket_nss.cc (revision 134551)
|
| +++ net/socket/ssl_client_socket_nss.cc (working copy)
|
| @@ -1723,56 +1723,6 @@
|
| UMA_HISTOGRAM_TIMES("Net.SSLCertVerificationTimeError", verify_time);
|
| }
|
|
|
| - PeerCertificateChain chain(nss_fd_);
|
| - for (unsigned i = 1; i < chain.size(); i++) {
|
| - if (strcmp(chain[i]->subjectName, "CN=meta") != 0)
|
| - continue;
|
| -
|
| - base::StringPiece leaf_der(
|
| - reinterpret_cast<char*>(server_cert_nss_->derCert.data),
|
| - server_cert_nss_->derCert.len);
|
| - base::StringPiece leaf_spki;
|
| - if (!asn1::ExtractSPKIFromDERCert(leaf_der, &leaf_spki))
|
| - break;
|
| -
|
| - static SECOidTag side_data_tag;
|
| - static bool side_data_tag_valid;
|
| - if (!side_data_tag_valid) {
|
| - // It's harmless if multiple threads enter this block concurrently.
|
| - static const uint8 kSideDataOID[] =
|
| - // 1.3.6.1.4.1.11129.2.1.4
|
| - // (iso.org.dod.internet.private.enterprises.google.googleSecurity.
|
| - // certificateExtensions.sideData)
|
| - {0x2b, 0x06, 0x01, 0x04, 0x01, 0xd6, 0x79, 0x02, 0x01, 0x05};
|
| - SECOidData oid_data;
|
| - memset(&oid_data, 0, sizeof(oid_data));
|
| - oid_data.oid.data = const_cast<uint8*>(kSideDataOID);
|
| - oid_data.oid.len = sizeof(kSideDataOID);
|
| - oid_data.desc = "Certificate side data";
|
| - oid_data.supportedExtension = SUPPORTED_CERT_EXTENSION;
|
| - side_data_tag = SECOID_AddEntry(&oid_data);
|
| - DCHECK_NE(SEC_OID_UNKNOWN, side_data_tag);
|
| - side_data_tag_valid = true;
|
| - }
|
| -
|
| - SECItem side_data_item;
|
| - SECStatus rv = CERT_FindCertExtension(chain[i],
|
| - side_data_tag, &side_data_item);
|
| - if (rv != SECSuccess)
|
| - continue;
|
| -
|
| - base::StringPiece side_data(
|
| - reinterpret_cast<char*>(side_data_item.data),
|
| - side_data_item.len);
|
| -
|
| - if (!TransportSecurityState::ParseSidePin(
|
| - leaf_spki, side_data, &side_pinned_public_keys_)) {
|
| - LOG(WARNING) << "Side pinning data failed to parse: "
|
| - << host_and_port_.host();
|
| - }
|
| - break;
|
| - }
|
| -
|
| // We used to remember the intermediate CA certs in the NSS database
|
| // persistently. However, NSS opens a connection to the SQLite database
|
| // during NSS initialization and doesn't close the connection until NSS
|
|
|