Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(25)

Side by Side Diff: net/socket/ssl_client_socket_openssl.cc

Issue 782333002: Certificate Transparency: Adding finch and NetLog logging for EV certs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Addressing all review comments. Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // OpenSSL binding for SSLClientSocket. The class layout and general principle 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle
6 // of operation is derived from SSLClientSocketNSS. 6 // of operation is derived from SSLClientSocketNSS.
7 7
8 #include "net/socket/ssl_client_socket_openssl.h" 8 #include "net/socket/ssl_client_socket_openssl.h"
9 9
10 #include <errno.h> 10 #include <errno.h>
(...skipping 1232 matching lines...) Expand 10 before | Expand all | Expand 10 after
1243 &ct_verify_result_, net_log_); 1243 &ct_verify_result_, net_log_);
1244 1244
1245 if (!policy_enforcer_) { 1245 if (!policy_enforcer_) {
1246 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; 1246 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
1247 } else { 1247 } else {
1248 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) { 1248 if (server_cert_verify_result_.cert_status & CERT_STATUS_IS_EV) {
1249 scoped_refptr<ct::EVCertsWhitelist> ev_whitelist = 1249 scoped_refptr<ct::EVCertsWhitelist> ev_whitelist =
1250 SSLConfigService::GetEVCertsWhitelist(); 1250 SSLConfigService::GetEVCertsWhitelist();
1251 if (!policy_enforcer_->DoesConformToCTEVPolicy( 1251 if (!policy_enforcer_->DoesConformToCTEVPolicy(
1252 server_cert_verify_result_.verified_cert.get(), 1252 server_cert_verify_result_.verified_cert.get(),
1253 ev_whitelist.get(), ct_verify_result_)) { 1253 ev_whitelist.get(), ct_verify_result_, net_log_)) {
1254 // TODO(eranm): Log via the BoundNetLog, see crbug.com/437766 1254 // TODO(eranm): Log via the BoundNetLog, see crbug.com/437766
1255 VLOG(1) << "EV certificate for " 1255 VLOG(1) << "EV certificate for "
1256 << server_cert_verify_result_.verified_cert->subject() 1256 << server_cert_verify_result_.verified_cert->subject()
1257 .GetDisplayName() 1257 .GetDisplayName()
1258 << " does not conform to CT policy, removing EV status."; 1258 << " does not conform to CT policy, removing EV status.";
1259 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV; 1259 server_cert_verify_result_.cert_status &= ~CERT_STATUS_IS_EV;
1260 } 1260 }
1261 } 1261 }
1262 } 1262 }
1263 } 1263 }
(...skipping 639 matching lines...) Expand 10 before | Expand all | Expand 10 after
1903 ct::SCT_STATUS_LOG_UNKNOWN)); 1903 ct::SCT_STATUS_LOG_UNKNOWN));
1904 } 1904 }
1905 } 1905 }
1906 1906
1907 scoped_refptr<X509Certificate> 1907 scoped_refptr<X509Certificate>
1908 SSLClientSocketOpenSSL::GetUnverifiedServerCertificateChain() const { 1908 SSLClientSocketOpenSSL::GetUnverifiedServerCertificateChain() const {
1909 return server_cert_; 1909 return server_cert_;
1910 } 1910 }
1911 1911
1912 } // namespace net 1912 } // namespace net
OLDNEW
« net/cert/cert_policy_enforcer.cc ('K') | « net/socket/ssl_client_socket_nss.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698