Index: net/base/x509_certificate_openssl.cc |
diff --git a/net/base/x509_certificate_openssl.cc b/net/base/x509_certificate_openssl.cc |
index 0d2c12e4296a68048bc28ad2e14f52c9b10f4ab5..433ca0df3f0b8e34b107c9d46dbe140a32355a27 100644 |
--- a/net/base/x509_certificate_openssl.cc |
+++ b/net/base/x509_certificate_openssl.cc |
@@ -475,6 +475,13 @@ int X509Certificate::Verify(const std::string& hostname, |
if (IsCertStatusError(verify_result->cert_status)) |
return MapCertStatusToNetError(verify_result->cert_status); |
+ // Currently we only ues OpenSSL's default root CA paths, so treat all |
+ // correctly verified certs as being from a known root. TODO(joth): if the |
+ // motivations described in http://src.chromium.org/viewvc/chrome?view=rev&revision=80778 |
+ // become an issue on OpenSSL builds, we will need to embed a hardcoded list |
+ // of well known root CAs, as per the _mac and _win versions. |
+ verify_result->is_issued_by_known_root = true; |
+ |
return OK; |
} |