summaryrefslogtreecommitdiffstats
path: root/net/socket
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-02-22 06:43:45 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-02-22 06:43:45 +0000
commit784832b9bec8895a71d107270b7534498921ae64 (patch)
tree88c6931200545b5c2df621733fb6452cea664c70 /net/socket
parent166437e43cdff80d53caed6ca8e1dadebb2a8155 (diff)
downloadchromium_src-784832b9bec8895a71d107270b7534498921ae64.zip
chromium_src-784832b9bec8895a71d107270b7534498921ae64.tar.gz
chromium_src-784832b9bec8895a71d107270b7534498921ae64.tar.bz2
Always log the SSL server certificate received and being verified.
Now that there is no passive NetLog interface, the overhead for always-logging is expected to be minimal. BUG=none TEST=none Review URL: http://codereview.chromium.org/9432018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@122987 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket')
-rw-r--r--net/socket/ssl_client_socket_mac.cc8
-rw-r--r--net/socket/ssl_client_socket_nss.cc2
-rw-r--r--net/socket/ssl_client_socket_openssl.cc8
-rw-r--r--net/socket/ssl_client_socket_win.cc8
4 files changed, 10 insertions, 16 deletions
diff --git a/net/socket/ssl_client_socket_mac.cc b/net/socket/ssl_client_socket_mac.cc
index 12e3f2e..aa62b96 100644
--- a/net/socket/ssl_client_socket_mac.cc
+++ b/net/socket/ssl_client_socket_mac.cc
@@ -1284,11 +1284,9 @@ int SSLClientSocketMac::DidCompleteHandshake() {
GetServerCert(ssl_context_));
if (!new_server_cert)
return ERR_UNEXPECTED;
- if (net_log_.IsLoggingBytes()) {
- net_log_.AddEvent(
- NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
- make_scoped_refptr(new X509CertificateNetLogParam(new_server_cert)));
- }
+ net_log_.AddEvent(
+ NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
+ make_scoped_refptr(new X509CertificateNetLogParam(new_server_cert)));
if (renegotiating_ &&
X509Certificate::IsSameOSCert(server_cert_->os_cert_handle(),
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
index 5175392..f3b8fa9 100644
--- a/net/socket/ssl_client_socket_nss.cc
+++ b/net/socket/ssl_client_socket_nss.cc
@@ -1073,7 +1073,7 @@ void SSLClientSocketNSS::UpdateServerCert() {
// case CreateFromDERCertChain() returns NULL.
server_cert_ = X509Certificate::CreateFromDERCertChain(
certs.AsStringPieceVector());
- if (server_cert_ && net_log_.IsLoggingBytes()) {
+ if (server_cert_) {
net_log_.AddEvent(
NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
make_scoped_refptr(new X509CertificateNetLogParam(server_cert_)));
diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
index 716b094..5039487 100644
--- a/net/socket/ssl_client_socket_openssl.cc
+++ b/net/socket/ssl_client_socket_openssl.cc
@@ -791,11 +791,9 @@ int SSLClientSocketOpenSSL::DoHandshake() {
// SSL handshake is completed. Let's verify the certificate.
const bool got_cert = !!UpdateServerCert();
DCHECK(got_cert);
- if (net_log_.IsLoggingBytes()) {
- net_log_.AddEvent(
- NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
- make_scoped_refptr(new X509CertificateNetLogParam(server_cert_)));
- }
+ net_log_.AddEvent(
+ NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
+ make_scoped_refptr(new X509CertificateNetLogParam(server_cert_)));
GotoState(STATE_VERIFY_CERT);
} else {
int ssl_error = SSL_get_error(ssl_, rv);
diff --git a/net/socket/ssl_client_socket_win.cc b/net/socket/ssl_client_socket_win.cc
index 7434305..3f3511f 100644
--- a/net/socket/ssl_client_socket_win.cc
+++ b/net/socket/ssl_client_socket_win.cc
@@ -1529,11 +1529,9 @@ int SSLClientSocketWin::DidCompleteHandshake() {
scoped_refptr<X509Certificate> new_server_cert(
X509Certificate::CreateFromHandle(server_cert_handle,
X509Certificate::OSCertHandles()));
- if (net_log_.IsLoggingBytes()) {
- net_log_.AddEvent(
- NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
- make_scoped_refptr(new X509CertificateNetLogParam(new_server_cert)));
- }
+ net_log_.AddEvent(
+ NetLog::TYPE_SSL_CERTIFICATES_RECEIVED,
+ make_scoped_refptr(new X509CertificateNetLogParam(new_server_cert)));
if (renegotiating_ &&
X509Certificate::IsSameOSCert(server_cert_->os_cert_handle(),
server_cert_handle)) {