Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(80)

Side by Side Diff: net/cert/cert_verify_proc_whitelist.cc

Issue 1042973002: Implement the ability to whitelist certs from specific issuers (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: WIP Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright (c) 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/cert/cert_verify_proc_whitelist.h"
6
7 #include <cstdlib>
8
9 #include "net/cert/x509_certificate.h"
10
11 namespace net {
12
13 namespace {
14
15 const uint8_t kBuiltinWhitelistHashes[][crypto::kSHA256Length] = {};
16
17 const PublicKeyWhitelist kBuiltinWhitelist[] = {
18 { { 0x00 },
19 kBuiltinWhitelistHashes,
20 0 },
21 };
22 const size_t kBuiltinWhitelistSize = 0;
davidben 2015/03/31 02:02:13 I'm guessing this will later be replaced with a #i
Ryan Sleevi 2015/03/31 18:33:52 Yup. Potentially in a subsequent CL.
23
24 const PublicKeyWhitelist* g_whitelist = kBuiltinWhitelist;
25 size_t g_whitelist_size = kBuiltinWhitelistSize;
26
27 // Comparator to compare a SHA256HashValue with a uint8_t array containing a
28 // raw SHA-256 hash.
29 // Return value follows memcmp semantics.
30 int CompareHashValueToRawHash(const void* key, const void* element) {
31 const SHA256HashValue* search_key =
32 reinterpret_cast<const SHA256HashValue*>(key);
33 return memcmp(search_key->data, element, sizeof(search_key->data));
34 }
35
36 } // namespace
37
38 bool IsNonWhitelistedCertificate(
39 const X509Certificate& cert,
40 const HashValueVector& public_key_hashes) {
41 if (g_whitelist_size == 0)
42 return false;
davidben 2015/03/31 02:02:13 The for loop still works out fine. i < g_whitelist
Ryan Sleevi 2015/03/31 18:33:52 Right, it's defined, I just thought it was more re
davidben 2015/03/31 18:42:05 Mmm. I generally don't like unnecessary special-ca
43 for (size_t i = 0; i < g_whitelist_size; ++i) {
44 for (const auto& hash : public_key_hashes) {
davidben 2015/03/31 02:02:13 Potential nuisance: if a root we whitelist ever cr
Ryan Sleevi 2015/03/31 18:33:52 We already implicitly have the ability to whitelis
45 if (hash.tag != HASH_VALUE_SHA256)
46 continue;
47 if (memcmp(hash.data(), g_whitelist[i].public_key,
48 crypto::kSHA256Length) != 0) {
49 continue;
50 }
51 const SHA256HashValue leaf_hash =
52 X509Certificate::CalculateFingerprint256(cert.os_cert_handle());
53 void* result = bsearch(&leaf_hash, g_whitelist[i].whitelist,
54 g_whitelist[i].whitelist_size,
55 crypto::kSHA256Length, CompareHashValueToRawHash);
56 if (result == nullptr)
57 return true;
58 return false;
59 }
60 }
61 return false;
62 }
63
64 void SetCertificateWhitelistForTesting(
65 const PublicKeyWhitelist* whitelist,
66 size_t whitelist_size) {
67 if (whitelist == nullptr || whitelist_size == 0) {
68 g_whitelist = kBuiltinWhitelist;
69 g_whitelist_size = kBuiltinWhitelistSize;
70 return;
71 }
72
73 g_whitelist = whitelist;
74 g_whitelist_size = whitelist_size;
75 }
76
77 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698