diff options
author | davidben@chromium.org <davidben@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-21 05:46:58 +0000 |
---|---|---|
committer | davidben@chromium.org <davidben@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-21 05:46:58 +0000 |
commit | 65a3b914585cee20f1c8b213c82eaa2a5da0cb25 (patch) | |
tree | 1464c826e4dd82fb68e769119964c6a6383d609a /net/http | |
parent | b3992377f4e52a205164d4da5dc7e465e749a57e (diff) | |
download | chromium_src-65a3b914585cee20f1c8b213c82eaa2a5da0cb25.zip chromium_src-65a3b914585cee20f1c8b213c82eaa2a5da0cb25.tar.gz chromium_src-65a3b914585cee20f1c8b213c82eaa2a5da0cb25.tar.bz2 |
Reintegrate certificate selection in HttpNetworkTransaction DoLoop
The HttpNetworkTransaction refactor intercepts the client auth
handling and moves it out of DoLoop. Because HandleCertificateRequest
often switches states, this caused a DCHECK and crash in some
circumstances.
This reintegrates it and adds unit tests to catch the DCHECK. We really
want to test sending a legitimate certificate, as well as more
checking interesting errors, but we cannot import temporary keys yet.
We also add a patch for tlslite to send a non-empty certificate_types.
Apple's SSL implementation raises a protocol error otherwise.
BUG=52744,51132,52778
TEST=SSLClientSocketTest.ConnectClientAuth*,URLRequestTest.ClientAuthTest
Review URL: http://codereview.chromium.org/3141026
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56983 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http')
-rw-r--r-- | net/http/http_network_transaction.cc | 11 |
1 files changed, 7 insertions, 4 deletions
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc index a79a9a4..1ff166c 100644 --- a/net/http/http_network_transaction.cc +++ b/net/http/http_network_transaction.cc @@ -442,8 +442,7 @@ void HttpNetworkTransaction::OnNeedsClientAuth( DCHECK_EQ(STATE_INIT_STREAM_COMPLETE, next_state_); response_.cert_request_info = cert_info; - int result = HandleCertificateRequest(ERR_SSL_CLIENT_AUTH_CERT_NEEDED); - DoCallback(result); + OnIOComplete(ERR_SSL_CLIENT_AUTH_CERT_NEEDED); } HttpNetworkTransaction::~HttpNetworkTransaction() { @@ -579,6 +578,8 @@ int HttpNetworkTransaction::DoInitStreamComplete(int result) { if (result == OK) { next_state_ = STATE_GENERATE_PROXY_AUTH_TOKEN; DCHECK(stream_.get()); + } else if (result == ERR_SSL_CLIENT_AUTH_CERT_NEEDED) { + result = HandleCertificateRequest(result); } // At this point we are done with the stream_request_. @@ -987,6 +988,7 @@ int HttpNetworkTransaction::HandleCertificateRequest(int error) { // long time while the user selects a certificate. // Second, even if we did keep the connection open, NSS has a bug where // restarting the handshake for ClientAuth is currently broken. + DCHECK_EQ(error, ERR_SSL_CLIENT_AUTH_CERT_NEEDED); if (stream_.get()) { // Since we already have a stream, we're being called as part of SSL @@ -999,10 +1001,8 @@ int HttpNetworkTransaction::HandleCertificateRequest(int error) { if (stream_request_.get()) { // The server is asking for a client certificate during the initial // handshake. - DCHECK_EQ(STATE_INIT_STREAM_COMPLETE, next_state_); stream_request_->Cancel(); stream_request_ = NULL; - next_state_ = STATE_INIT_STREAM; } // If the user selected one of the certificate in client_certs for this @@ -1014,6 +1014,9 @@ int HttpNetworkTransaction::HandleCertificateRequest(int error) { response_.cert_request_info->client_certs; for (size_t i = 0; i < client_certs.size(); ++i) { if (client_cert->fingerprint().Equals(client_certs[i]->fingerprint())) { + // TODO(davidben): Add a unit test which covers this path; we need to be + // able to send a legitimate certificate and also bypass/clear the + // SSL session cache. ssl_config_.client_cert = client_cert; ssl_config_.send_client_cert = true; next_state_ = STATE_INIT_STREAM; |