Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(5)

Issue 11458012: SSLCertRequestInfo: Add |valid_cas| and |valid_key_types| (Closed)

Created:
8 years ago by digit1
Modified:
7 years, 10 months ago
CC:
chromium-reviews, joi+watch-content_chromium.org, darin-cc_chromium.org, cbentzel+watch_chromium.org, jam
Base URL:
http://git.chromium.org/chromium/src.git@master
Visibility:
Public.

Description

SSLCertRequestInfo: Add |valid_cas| and |valid_key_types| On Android, it is not possible to determine the list of compatible client certificates from a given server CertificateRequest message without prompting the user. Due to this, add new fields to SSLCertRequestInfo: - |no_client_certs| to indicate that |client_certs| should be ignored. Note that |client_certs| is not removed to keep existing unit tests working. - |valid_cas| the list of valid certificate authorities passed by the server. - |valid_key_types| the list of valid certificate signing key types passed by the server. This patch introduces a new X509Certificate method (IsValidClientCertificate) to check a given certificate against a given SSLCertRequestInfo. This uses either the |client_certs| list of the |valid_cas|/|valid_key_types| one. Future patches will use these new fields to query the Android platform APIs for the right certificate chain and private key alias. BUG=134418

Patch Set 1 #

Total comments: 19

Patch Set 2 : trivial fix for Linux build #

Total comments: 7
Unified diffs Side-by-side diffs Delta from patch set Stats (+198 lines, -51 lines) Patch
M chrome/browser/chrome_content_browser_client.cc View 1 chunk +24 lines, -22 lines 0 comments Download
M chrome/browser/ssl/ssl_client_certificate_selector_test.cc View 1 chunk +1 line, -0 lines 0 comments Download
M content/browser/loader/resource_loader.cc View 1 chunk +1 line, -1 line 0 comments Download
M net/base/ssl_cert_request_info.h View 3 chunks +17 lines, -0 lines 4 comments Download
M net/base/ssl_cert_request_info.cc View 1 chunk +4 lines, -1 line 0 comments Download
A + net/base/ssl_cert_request_info_openssl.cc View 1 chunk +6 lines, -1 line 0 comments Download
M net/base/x509_cert_types.h View 1 chunk +1 line, -1 line 1 comment Download
M net/base/x509_certificate.h View 2 chunks +5 lines, -0 lines 2 comments Download
M net/base/x509_certificate.cc View 1 2 chunks +20 lines, -0 lines 0 comments Download
M net/base/x509_certificate_openssl.cc View 1 2 chunks +77 lines, -0 lines 0 comments Download
M net/http/http_network_transaction.cc View 1 chunk +2 lines, -10 lines 0 comments Download
M net/net.gyp View 3 chunks +3 lines, -0 lines 0 comments Download
M net/socket/ssl_client_socket_openssl.h View 1 chunk +0 lines, -3 lines 0 comments Download
M net/socket/ssl_client_socket_openssl.cc View 2 chunks +36 lines, -2 lines 0 comments Download
M net/socket_stream/socket_stream.cc View 1 chunk +1 line, -10 lines 0 comments Download

Messages

Total messages: 9 (0 generated)
digit1
This definitely is a first try to implement the changes that were discussed recently to ...
8 years ago (2012-12-11 17:50:51 UTC) #1
Ryan Sleevi
My biggest concern here is the shared-code that is having #if defined(USE_OPENSSL) introduced to it. ...
8 years ago (2012-12-11 21:30:24 UTC) #2
digit1
On 2012/12/11 21:30:24, Ryan Sleevi wrote: > My biggest concern here is the shared-code that ...
8 years ago (2012-12-11 22:48:20 UTC) #3
digit1
https://chromiumcodereview.appspot.com/11458012/diff/1/net/base/ssl_cert_request_info.h File net/base/ssl_cert_request_info.h (right): https://chromiumcodereview.appspot.com/11458012/diff/1/net/base/ssl_cert_request_info.h#newcode39 net/base/ssl_cert_request_info.h:39: bool no_client_certs; On 2012/12/11 21:30:24, Ryan Sleevi wrote: > ...
8 years ago (2012-12-11 23:05:31 UTC) #4
Ryan Sleevi
On 2012/12/11 22:48:20, digit1 wrote: > On 2012/12/11 21:30:24, Ryan Sleevi wrote: > > My ...
8 years ago (2012-12-11 23:42:19 UTC) #5
Ryan Sleevi
https://chromiumcodereview.appspot.com/11458012/diff/1/net/base/x509_certificate.h File net/base/x509_certificate.h (right): https://chromiumcodereview.appspot.com/11458012/diff/1/net/base/x509_certificate.h#newcode310 net/base/x509_certificate.h:310: bool IsValidClientCertificate(const SSLCertRequestInfo& cert_info); On 2012/12/11 23:05:31, digit1 wrote: ...
8 years ago (2012-12-12 00:05:40 UTC) #6
wtc1
Review comments on patch set 2: Sorry about the delay. I only reviewed the header ...
8 years ago (2012-12-15 00:56:18 UTC) #7
digit1
https://chromiumcodereview.appspot.com/11458012/diff/8001/net/base/ssl_cert_request_info.h File net/base/ssl_cert_request_info.h (right): https://chromiumcodereview.appspot.com/11458012/diff/8001/net/base/ssl_cert_request_info.h#newcode39 net/base/ssl_cert_request_info.h:39: bool no_client_certs; Yes, this is now the plan, first ...
8 years ago (2012-12-18 15:19:14 UTC) #8
digit1
7 years, 10 months ago (2013-02-07 09:45:44 UTC) #9
This patch is now obsolete, thanks to ppi's work. I'm going to abandon it.

Powered by Google App Engine
This is Rietveld 408576698