Index: net/socket/ssl_client_socket_openssl.cc |
diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc |
index 57aa619105d95f67269834d14736c6a917ac8e29..8f85aeeb4d80f39bd098b6e40607f91c2cbbd9ff 100644 |
--- a/net/socket/ssl_client_socket_openssl.cc |
+++ b/net/socket/ssl_client_socket_openssl.cc |
@@ -23,6 +23,7 @@ |
#include "crypto/openssl_util.h" |
#include "crypto/scoped_openssl_types.h" |
#include "net/base/net_errors.h" |
+#include "net/cert/cert_policy_enforcer.h" |
#include "net/cert/cert_verifier.h" |
#include "net/cert/ct_ev_whitelist.h" |
#include "net/cert/ct_verifier.h" |
@@ -375,6 +376,7 @@ SSLClientSocketOpenSSL::SSLClientSocketOpenSSL( |
handshake_succeeded_(false), |
marked_session_as_good_(false), |
transport_security_state_(context.transport_security_state), |
+ policy_enforcer_(context.cert_policy_enforcer), |
net_log_(transport_->socket()->NetLog()), |
weak_factory_(this) { |
} |
@@ -1129,21 +1131,6 @@ int SSLClientSocketOpenSSL::DoVerifyCertComplete(int result) { |
result = ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; |
} |
- scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = |
- SSLConfigService::GetEVCertsWhitelist(); |
- if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { |
- if (ev_whitelist.get() && ev_whitelist->IsValid()) { |
- const SHA256HashValue fingerprint( |
- X509Certificate::CalculateFingerprint256( |
- server_cert_verify_result_.verified_cert->os_cert_handle())); |
- |
- UMA_HISTOGRAM_BOOLEAN( |
- "Net.SSL_EVCertificateInWhitelist", |
- ev_whitelist->ContainsCertificateHash( |
- std::string(reinterpret_cast<const char*>(fingerprint.data), 8))); |
- } |
- } |
- |
if (result == OK) { |
// Only check Certificate Transparency if there were no other errors with |
// the connection. |
@@ -1245,6 +1232,24 @@ void SSLClientSocketOpenSSL::VerifyCT() { |
<< " Verified scts: " << ct_verify_result_.verified_scts.size() |
<< " scts from unknown logs: " |
<< ct_verify_result_.unknown_logs_scts.size(); |
Ryan Sleevi
2014/11/28 15:27:44
Already netlogged as well.
Eran Messeri
2014/12/01 13:59:03
Done.
|
+ |
+ if (!policy_enforcer_) { |
+ server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
+ } else { |
+ if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { |
+ scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = |
+ SSLConfigService::GetEVCertsWhitelist(); |
+ if (!policy_enforcer_->DoesConformToCTEVPolicy( |
+ server_cert_verify_result_.verified_cert.get(), |
+ ev_whitelist.get(), ct_verify_result_)) { |
+ VLOG(1) << "EV certificate for " |
+ << server_cert_verify_result_.verified_cert->subject() |
+ .GetDisplayName() |
+ << " does not conform to CT policy, removing EV status."; |
Ryan Sleevi
2014/11/28 15:27:45
NetLog
Eran Messeri
2014/12/01 13:59:03
Done (added TODO with bug#).
|
+ server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
+ } |
+ } |
+ } |
} |
void SSLClientSocketOpenSSL::OnHandshakeIOComplete(int result) { |