OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived | 5 // This file includes code SSLClientSocketNSS::DoVerifyCertComplete() derived |
6 // from AuthCertificateCallback() in | 6 // from AuthCertificateCallback() in |
7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp. | 7 // mozilla/security/manager/ssl/src/nsNSSCallbacks.cpp. |
8 | 8 |
9 /* ***** BEGIN LICENSE BLOCK ***** | 9 /* ***** BEGIN LICENSE BLOCK ***** |
10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 10 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
(...skipping 3566 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3577 // from the state after verification is complete, to conserve memory. | 3577 // from the state after verification is complete, to conserve memory. |
3578 | 3578 |
3579 if (!policy_enforcer_) { | 3579 if (!policy_enforcer_) { |
3580 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; | 3580 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
3581 } else { | 3581 } else { |
3582 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { | 3582 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { |
3583 scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = | 3583 scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = |
3584 SSLConfigService::GetEVCertsWhitelist(); | 3584 SSLConfigService::GetEVCertsWhitelist(); |
3585 if (!policy_enforcer_->DoesConformToCTEVPolicy( | 3585 if (!policy_enforcer_->DoesConformToCTEVPolicy( |
3586 server_cert_verify_result_.verified_cert.get(), | 3586 server_cert_verify_result_.verified_cert.get(), |
3587 ev_whitelist.get(), ct_verify_result_)) { | 3587 ev_whitelist.get(), ct_verify_result_, net_log_)) { |
3588 // TODO(eranm): Log via the BoundNetLog, see crbug.com/437766 | 3588 // TODO(eranm): Log via the BoundNetLog, see crbug.com/437766 |
3589 VLOG(1) << "EV certificate for " | 3589 VLOG(1) << "EV certificate for " |
3590 << server_cert_verify_result_.verified_cert->subject() | 3590 << server_cert_verify_result_.verified_cert->subject() |
3591 .GetDisplayName() | 3591 .GetDisplayName() |
3592 << " does not conform to CT policy, removing EV status."; | 3592 << " does not conform to CT policy, removing EV status."; |
3593 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; | 3593 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; |
3594 } | 3594 } |
3595 } | 3595 } |
3596 } | 3596 } |
3597 } | 3597 } |
(...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3634 scoped_refptr<X509Certificate> | 3634 scoped_refptr<X509Certificate> |
3635 SSLClientSocketNSS::GetUnverifiedServerCertificateChain() const { | 3635 SSLClientSocketNSS::GetUnverifiedServerCertificateChain() const { |
3636 return core_->state().server_cert.get(); | 3636 return core_->state().server_cert.get(); |
3637 } | 3637 } |
3638 | 3638 |
3639 ChannelIDService* SSLClientSocketNSS::GetChannelIDService() const { | 3639 ChannelIDService* SSLClientSocketNSS::GetChannelIDService() const { |
3640 return channel_id_service_; | 3640 return channel_id_service_; |
3641 } | 3641 } |
3642 | 3642 |
3643 } // namespace net | 3643 } // namespace net |
OLD | NEW |