cygprofile: increase timeouts to allow showing web contents
[chromium-blink-merge.git] / chrome / browser / chromeos / net / cert_verify_proc_chromeos.cc
blob59f6a5b3f056f2b7f202b4ed5799c685a9b33f9c
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h"
7 #include "net/cert/test_root_certs.h"
8 #include "net/cert/x509_certificate.h"
10 // NSS doesn't currently define CERT_LIST_TAIL.
11 // See https://bugzilla.mozilla.org/show_bug.cgi?id=962413
12 // Can be removed once chrome requires NSS version 3.16 to build.
13 #ifndef CERT_LIST_TAIL
14 #define CERT_LIST_TAIL(l) ((CERTCertListNode *)PR_LIST_TAIL(&l->list))
15 #endif
17 namespace chromeos {
19 namespace {
21 struct ChainVerifyArgs {
22 CertVerifyProcChromeOS* cert_verify_proc;
23 const net::CertificateList& additional_trust_anchors;
26 } // namespace
28 CertVerifyProcChromeOS::CertVerifyProcChromeOS() {}
30 CertVerifyProcChromeOS::CertVerifyProcChromeOS(
31 crypto::ScopedPK11Slot public_slot) {
32 // Only the software slot is passed, since that is the only one where user
33 // trust settings are stored.
34 profile_filter_.Init(
35 public_slot.Pass(), crypto::ScopedPK11Slot(), crypto::ScopedPK11Slot());
38 CertVerifyProcChromeOS::~CertVerifyProcChromeOS() {}
40 int CertVerifyProcChromeOS::VerifyInternal(
41 net::X509Certificate* cert,
42 const std::string& hostname,
43 const std::string& ocsp_response,
44 int flags,
45 net::CRLSet* crl_set,
46 const net::CertificateList& additional_trust_anchors,
47 net::CertVerifyResult* verify_result) {
48 ChainVerifyArgs chain_verify_args = {this, additional_trust_anchors};
50 CERTChainVerifyCallback chain_verify_callback;
51 chain_verify_callback.isChainValid =
52 &CertVerifyProcChromeOS::IsChainValidFunc;
53 chain_verify_callback.isChainValidArg =
54 static_cast<void*>(&chain_verify_args);
56 return VerifyInternalImpl(cert, hostname, ocsp_response, flags, crl_set,
57 additional_trust_anchors, &chain_verify_callback,
58 verify_result);
61 // static
62 SECStatus CertVerifyProcChromeOS::IsChainValidFunc(
63 void* is_chain_valid_arg,
64 const CERTCertList* current_chain,
65 PRBool* chain_ok) {
66 ChainVerifyArgs* args = static_cast<ChainVerifyArgs*>(is_chain_valid_arg);
67 CERTCertificate* cert = CERT_LIST_TAIL(current_chain)->cert;
69 if (net::TestRootCerts::HasInstance()) {
70 if (net::TestRootCerts::GetInstance()->Contains(cert)) {
71 // Certs in the TestRootCerts are not stored in any slot, and thus would
72 // not be allowed by the profile_filter. This should only be hit in tests.
73 DVLOG(3) << cert->subjectName << " is a TestRootCert";
74 *chain_ok = PR_TRUE;
75 return SECSuccess;
79 for (net::CertificateList::const_iterator i =
80 args->additional_trust_anchors.begin();
81 i != args->additional_trust_anchors.end();
82 ++i) {
83 if (net::X509Certificate::IsSameOSCert(cert, (*i)->os_cert_handle())) {
84 // Certs in the additional_trust_anchors should always be allowed, even if
85 // they aren't stored in a slot that would be allowed by the
86 // profile_filter.
87 DVLOG(3) << cert->subjectName << " is an additional_trust_anchor";
88 *chain_ok = PR_TRUE;
89 return SECSuccess;
93 // TODO(mattm): If crbug.com/334384 is fixed to allow setting trust
94 // properly when the same cert is in multiple slots, this would also need
95 // updating to check the per-slot trust values.
96 *chain_ok = args->cert_verify_proc->profile_filter_.IsCertAllowed(cert)
97 ? PR_TRUE
98 : PR_FALSE;
99 DVLOG(3) << cert->subjectName << " is " << (*chain_ok ? "ok" : "not ok");
100 return SECSuccess;
103 } // namespace chromeos