OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/x509_certificate.h" | 5 #include "net/base/x509_certificate.h" |
6 | 6 |
7 #include <openssl/asn1.h> | 7 #include <openssl/asn1.h> |
8 #include <openssl/crypto.h> | 8 #include <openssl/crypto.h> |
9 #include <openssl/obj_mac.h> | 9 #include <openssl/obj_mac.h> |
10 #include <openssl/pem.h> | 10 #include <openssl/pem.h> |
(...skipping 457 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
468 << X509_verify_cert_error_string(x509_error) | 468 << X509_verify_cert_error_string(x509_error) |
469 << " : " << x509_error | 469 << " : " << x509_error |
470 << " : " << X509_STORE_CTX_get_error_depth(ctx.get()) | 470 << " : " << X509_STORE_CTX_get_error_depth(ctx.get()) |
471 << " : " << cert_status; | 471 << " : " << cert_status; |
472 verify_result->cert_status |= cert_status; | 472 verify_result->cert_status |= cert_status; |
473 } | 473 } |
474 | 474 |
475 if (IsCertStatusError(verify_result->cert_status)) | 475 if (IsCertStatusError(verify_result->cert_status)) |
476 return MapCertStatusToNetError(verify_result->cert_status); | 476 return MapCertStatusToNetError(verify_result->cert_status); |
477 | 477 |
| 478 // Currently we only ues OpenSSL's default root CA paths, so treat all |
| 479 // correctly verified certs as being from a known root. TODO(joth): if the |
| 480 // motivations described in http://src.chromium.org/viewvc/chrome?view=rev&rev
ision=80778 |
| 481 // become an issue on OpenSSL builds, we will need to embed a hardcoded list |
| 482 // of well known root CAs, as per the _mac and _win versions. |
| 483 verify_result->is_issued_by_known_root = true; |
| 484 |
478 return OK; | 485 return OK; |
479 } | 486 } |
480 | 487 |
481 bool X509Certificate::GetDEREncoded(std::string* encoded) { | 488 bool X509Certificate::GetDEREncoded(std::string* encoded) { |
482 // TODO(port): Implement. | 489 // TODO(port): Implement. |
483 return false; | 490 return false; |
484 } | 491 } |
485 | 492 |
486 // static | 493 // static |
487 bool X509Certificate::IsSameOSCert(X509Certificate::OSCertHandle a, | 494 bool X509Certificate::IsSameOSCert(X509Certificate::OSCertHandle a, |
488 X509Certificate::OSCertHandle b) { | 495 X509Certificate::OSCertHandle b) { |
489 DCHECK(a && b); | 496 DCHECK(a && b); |
490 if (a == b) | 497 if (a == b) |
491 return true; | 498 return true; |
492 | 499 |
493 // X509_cmp only checks the fingerprint, but we want to compare the whole | 500 // X509_cmp only checks the fingerprint, but we want to compare the whole |
494 // DER data. Encoding it from OSCertHandle is an expensive operation, so we | 501 // DER data. Encoding it from OSCertHandle is an expensive operation, so we |
495 // cache the DER (if not already cached via X509_set_ex_data). | 502 // cache the DER (if not already cached via X509_set_ex_data). |
496 DERCache der_cache_a, der_cache_b; | 503 DERCache der_cache_a, der_cache_b; |
497 | 504 |
498 return GetDERAndCacheIfNeeded(a, &der_cache_a) && | 505 return GetDERAndCacheIfNeeded(a, &der_cache_a) && |
499 GetDERAndCacheIfNeeded(b, &der_cache_b) && | 506 GetDERAndCacheIfNeeded(b, &der_cache_b) && |
500 der_cache_a.data_length == der_cache_b.data_length && | 507 der_cache_a.data_length == der_cache_b.data_length && |
501 memcmp(der_cache_a.data, der_cache_b.data, der_cache_a.data_length) == 0; | 508 memcmp(der_cache_a.data, der_cache_b.data, der_cache_a.data_length) == 0; |
502 } | 509 } |
503 | 510 |
504 } // namespace net | 511 } // namespace net |
OLD | NEW |