summaryrefslogtreecommitdiffstats
path: root/chrome/browser/ui/webui/quota_internals/quota_internals_proxy.cc
diff options
context:
space:
mode:
authorrsleevi <rsleevi@chromium.org>2016-03-03 14:24:59 -0800
committerCommit bot <commit-bot@chromium.org>2016-03-03 22:26:00 +0000
commitc45d7cce9017369c36ecbe3ed2d4567eea786f24 (patch)
treef956c9db5066ffc4df967e23de0e3cc20b21c580 /chrome/browser/ui/webui/quota_internals/quota_internals_proxy.cc
parent078436bd5a6b1b3ac15a56660d9e1442b462733d (diff)
downloadchromium_src-c45d7cce9017369c36ecbe3ed2d4567eea786f24.zip
chromium_src-c45d7cce9017369c36ecbe3ed2d4567eea786f24.tar.gz
chromium_src-c45d7cce9017369c36ecbe3ed2d4567eea786f24.tar.bz2
Perform CRLSet evaluation during Path Building on NSS
When using NSS for certificate verification, add CRLSet checking by injecting a revocation callback function which will examine the CRLSet and reject the certificate. If the CRLSet does not affirmatively reject it, continue invoking the originally supplied application callback (such as the ChromeOS callback) and allow it an opportunity to reject. Because of how NSS caches virtually everything, horribly so, this restructures the unittests to no longer depend on how the underlying library will select the path (since with NSS, it's fundamentally non-determistic), and instead tests that as long as a singular certificate path is still valid and un-revoked, it can be discovered. BUG=589336 TEST=CertVerifyProcTest.CRLSet* Review URL: https://codereview.chromium.org/1724413002 Cr-Commit-Position: refs/heads/master@{#379113}
Diffstat (limited to 'chrome/browser/ui/webui/quota_internals/quota_internals_proxy.cc')
0 files changed, 0 insertions, 0 deletions