Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(227)

Unified Diff: ios/web/net/crw_cert_verification_controller.mm

Issue 1322193003: WKWebView(iOS9): correctly update SSL status for current navigation item (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@reland_cert_verification
Patch Set: Updated comments Created 5 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: ios/web/net/crw_cert_verification_controller.mm
diff --git a/ios/web/net/crw_cert_verification_controller.mm b/ios/web/net/crw_cert_verification_controller.mm
index a0180d0f978a7f525bcb3ad8fff64a55669586e0..ad478ae55b1a963ceb49532c69bc97479bd75d99 100644
--- a/ios/web/net/crw_cert_verification_controller.mm
+++ b/ios/web/net/crw_cert_verification_controller.mm
@@ -9,9 +9,11 @@
#import "base/memory/ref_counted.h"
#import "base/memory/scoped_ptr.h"
#include "base/strings/sys_string_conversions.h"
+#include "base/threading/worker_pool.h"
#include "ios/web/net/cert_verifier_block_adapter.h"
#include "ios/web/public/browser_state.h"
#include "ios/web/public/web_thread.h"
+#import "ios/web/web_state/wk_web_view_security_util.h"
#include "net/cert/cert_verify_result.h"
#include "net/ssl/ssl_config_service.h"
#include "net/url_request/url_request_context.h"
@@ -73,13 +75,20 @@ class BlockHolder : public base::RefCountedThreadSafe<BlockHolder<T>> {
// Creates _certVerifier object on IO thread.
- (void)createCertVerifier;
-// Verifies the given |cert| for the given |host| and calls |completionHandler|
-// on completion. |completionHandler| cannot be null and will be called
-// synchronously or asynchronously on IO thread.
+// Verifies the given |cert| for the given |host| using |net::CertVerifier| and
+// calls |completionHandler| on completion. |completionHandler| cannot be null
+// and will be called asynchronously on IO thread.
- (void)verifyCert:(const scoped_refptr<net::X509Certificate>&)cert
forHost:(NSString*)host
completionHandler:(void (^)(net::CertVerifyResult, int))completionHandler;
+// Verifies the given |trust| using SecTrustRef API. |completionHandler| cannot
+// be null and will be either called asynchronously on Worker thread or
+// synchronously on current thread if the worker task can't start (in this
+// case |success| argument will be NO).
+- (void)verifyTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
+ completionHandler:(void (^)(SecTrustResultType, BOOL success))handler;
davidben 2015/10/12 23:21:50 If you want to keep this double-threaded thing, pe
Eugene But (OOO till 7-30) 2015/10/13 20:40:33 Done.
+
@end
@implementation CRWCertVerificationController
@@ -112,16 +121,16 @@ class BlockHolder : public base::RefCountedThreadSafe<BlockHolder<T>> {
- (void)decidePolicyForCert:(const scoped_refptr<net::X509Certificate>&)cert
host:(NSString*)host
- completionHandler:(web::PolicyDecisionHandler)handler {
+ completionHandler:(web::PolicyDecisionHandler)completionHandler {
DCHECK_CURRENTLY_ON_WEB_THREAD(web::WebThread::UI);
// completionHandler of |verifyCert:forHost:completionHandler:| is called on
// IO thread and then bounces back to UI thread. As a result all objects
// captured by completionHandler may be released on either UI or IO thread.
- // Since |handler| can potentially capture multiple thread unsafe objects
- // (like Web Controller) |handler| itself should never be released on
- // background thread and |BlockHolder| ensures that.
+ // Since |completionHandler| can potentially capture multiple thread unsafe
+ // objects (like Web Controller) |completionHandler| itself should never be
+ // released on background thread and |BlockHolder| ensures that.
__block scoped_refptr<BlockHolder<web::PolicyDecisionHandler>> handlerHolder(
- new BlockHolder<web::PolicyDecisionHandler>(handler));
+ new BlockHolder<web::PolicyDecisionHandler>(completionHandler));
[self verifyCert:cert
forHost:host
completionHandler:^(net::CertVerifyResult result, int error) {
@@ -141,6 +150,53 @@ class BlockHolder : public base::RefCountedThreadSafe<BlockHolder<T>> {
}];
}
+- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
+ host:(NSString*)host
+ completionHandler:(web::StatusQueryHandler)completionHandler {
+ DCHECK_CURRENTLY_ON_WEB_THREAD(web::WebThread::UI);
+
+ // The completion handlers of |verifyCert:forHost:completionHandler:| and
+ // |verifyTrust:completionHandler:| will be deallocated on background thread.
+ // |completionHandler| itself should never be released on background thread
+ // and |BlockHolder| ensures that.
+ __block scoped_refptr<BlockHolder<web::StatusQueryHandler>> handlerHolder(
+ new BlockHolder<web::StatusQueryHandler>(completionHandler));
+ [self verifyTrust:trust
+ completionHandler:^(SecTrustResultType trustResult, BOOL success) {
+ if (!success) {
+ dispatch_async(dispatch_get_main_queue(), ^{
+ handlerHolder->call(web::SECURITY_STYLE_UNKNOWN, net::CertStatus());
+ });
+ return;
+ }
+
+ web::SecurityStyle securityStyle =
+ web::GetSecurityStyleFromTrustResult(trustResult);
+ if (securityStyle == web::SECURITY_STYLE_AUTHENTICATED) {
+ // SecTrust API considers this cert as valid.
+ dispatch_async(dispatch_get_main_queue(), ^{
+ handlerHolder->call(securityStyle, net::CertStatus());
+ });
+ return;
+ }
+
+ // Retrieve the net::CertStatus for invalid certificates to determine
+ // the rejection reason.
+ // TODO(eugenebut): Add UMA for CertVerifier and SecTrust verification
+ // mismatch (crbug.com/535699).
+ scoped_refptr<net::X509Certificate> cert(
+ web::CreateCertFromTrust(trust));
+ [self verifyCert:cert
+ forHost:host
+ completionHandler:^(net::CertVerifyResult certVerifierResult, int) {
+ dispatch_async(dispatch_get_main_queue(), ^{
+ handlerHolder->call(securityStyle,
+ certVerifierResult.cert_status);
+ });
+ }];
+ }];
+}
+
- (void)shutDown {
DCHECK_CURRENTLY_ON_WEB_THREAD(web::WebThread::UI);
web::WebThread::PostTask(web::WebThread::IO, FROM_HERE, base::BindBlock(^{
@@ -197,4 +253,22 @@ class BlockHolder : public base::RefCountedThreadSafe<BlockHolder<T>> {
}));
}
+- (void)verifyTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
+ completionHandler:(void (^)(SecTrustResultType, BOOL))completionHandler {
+ DCHECK(completionHandler);
+ // SecTrustEvaluate performs trust evaluation synchronously, possibly making
+ // network requests. The UI thread should not be blocked by that operation.
+ bool result = base::WorkerPool::PostTask(FROM_HERE, base::BindBlock(^{
+ SecTrustResultType trustResult = kSecTrustResultInvalid;
+ if (SecTrustEvaluate(trust.get(), &trustResult) != errSecSuccess) {
+ trustResult = kSecTrustResultInvalid;
+ }
+ completionHandler(trustResult, YES);
+ }), false /* task_is_slow */);
+
+ if (!result) {
+ completionHandler(kSecTrustResultInvalid, NO);
+ }
+}
+
@end

Powered by Google App Engine
This is Rietveld 408576698