summaryrefslogtreecommitdiffstats
path: root/net/base/ssl_client_socket_win.cc
diff options
context:
space:
mode:
authorwtc@google.com <wtc@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-01-12 19:08:36 +0000
committerwtc@google.com <wtc@google.com@0039d316-1c4b-4281-b951-d872f2087c98>2009-01-12 19:08:36 +0000
commit5d0153c51cd317bc38673fb70c5d59314aff7b69 (patch)
treee6f028c1c727c2c74ca23932a7ce0ca2b5c61d76 /net/base/ssl_client_socket_win.cc
parent70aa77609a881545064e3df7ffa580d933c4f76f (diff)
downloadchromium_src-5d0153c51cd317bc38673fb70c5d59314aff7b69.zip
chromium_src-5d0153c51cd317bc38673fb70c5d59314aff7b69.tar.gz
chromium_src-5d0153c51cd317bc38673fb70c5d59314aff7b69.tar.bz2
Measure how often the users are encountering MD5
certificates. R=jar BUG=6102 Review URL: http://codereview.chromium.org/17471 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@7882 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/base/ssl_client_socket_win.cc')
-rw-r--r--net/base/ssl_client_socket_win.cc41
1 files changed, 41 insertions, 0 deletions
diff --git a/net/base/ssl_client_socket_win.cc b/net/base/ssl_client_socket_win.cc
index 8bd812b..d39c958 100644
--- a/net/base/ssl_client_socket_win.cc
+++ b/net/base/ssl_client_socket_win.cc
@@ -9,6 +9,7 @@
#include "base/lock.h"
#include "base/singleton.h"
#include "base/string_util.h"
+#include "net/base/connection_type_histograms.h"
#include "net/base/net_errors.h"
#include "net/base/scoped_cert_chain_context.h"
#include "net/base/ssl_info.h"
@@ -1021,6 +1022,44 @@ int SSLClientSocketWin::DidCompleteHandshake() {
return VerifyServerCert();
}
+// static
+void SSLClientSocketWin::LogConnectionTypeMetrics(
+ PCCERT_CHAIN_CONTEXT chain_context) {
+ UpdateConnectionTypeHistograms(CONNECTION_SSL);
+
+ PCERT_SIMPLE_CHAIN first_chain = chain_context->rgpChain[0];
+ int num_elements = first_chain->cElement;
+ PCERT_CHAIN_ELEMENT* element = first_chain->rgpElement;
+ bool has_md5 = false;
+ bool has_md2 = false;
+ bool has_md4 = false;
+
+ // Each chain starts with the end entity certificate and ends with the root
+ // CA certificate. Do not inspect the signature algorithm of the root CA
+ // certificate because the signature on the trust anchor is not important.
+ for (int i = 0; i < num_elements - 1; ++i) {
+ PCCERT_CONTEXT cert = element[i]->pCertContext;
+ const char* algorithm = cert->pCertInfo->SignatureAlgorithm.pszObjId;
+ if (strcmp(algorithm, szOID_RSA_MD5RSA) == 0) {
+ // md5WithRSAEncryption: 1.2.840.113549.1.1.4
+ has_md5 = true;
+ } else if (strcmp(algorithm, szOID_RSA_MD2RSA) == 0) {
+ // md2WithRSAEncryption: 1.2.840.113549.1.1.2
+ has_md2 = true;
+ } else if (strcmp(algorithm, szOID_RSA_MD4RSA) == 0) {
+ // md4WithRSAEncryption: 1.2.840.113549.1.1.3
+ has_md4 = true;
+ }
+ }
+
+ if (has_md5)
+ UpdateConnectionTypeHistograms(CONNECTION_SSL_MD5);
+ if (has_md2)
+ UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2);
+ if (has_md4)
+ UpdateConnectionTypeHistograms(CONNECTION_SSL_MD4);
+}
+
// Set server_cert_status_ and return OK or a network error.
int SSLClientSocketWin::VerifyServerCert() {
DCHECK(server_cert_);
@@ -1058,6 +1097,8 @@ int SSLClientSocketWin::VerifyServerCert() {
}
ScopedCertChainContext scoped_chain_context(chain_context);
+ LogConnectionTypeMetrics(chain_context);
+
server_cert_status_ |= MapCertChainErrorStatusToCertStatus(
chain_context->TrustStatus.dwErrorStatus);