blob: b460005af065f10f4903477f1d15565d5cfe0e51 [file] [log] [blame]
// Copyright 2014 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/ssl/ssl_config.h"
#include "net/cert/cert_verifier.h"
namespace net {
// Note these lines must be kept in sync with
// services/network/public/mojom/ssl_config.mojom.
const uint16_t kDefaultSSLVersionMin = SSL_PROTOCOL_VERSION_TLS1_2;
const uint16_t kDefaultSSLVersionMax = SSL_PROTOCOL_VERSION_TLS1_3;
SSLConfig::CertAndStatus::CertAndStatus() = default;
SSLConfig::CertAndStatus::CertAndStatus(scoped_refptr<X509Certificate> cert_arg,
CertStatus status)
: cert(std::move(cert_arg)), cert_status(status) {}
SSLConfig::CertAndStatus::CertAndStatus(const CertAndStatus& other) = default;
SSLConfig::CertAndStatus::~CertAndStatus() = default;
SSLConfig::SSLConfig() = default;
SSLConfig::SSLConfig(const SSLConfig& other) = default;
SSLConfig::SSLConfig(SSLConfig&& other) = default;
SSLConfig::~SSLConfig() = default;
SSLConfig& SSLConfig::operator=(const SSLConfig&) = default;
SSLConfig& SSLConfig::operator=(SSLConfig&&) = default;
bool SSLConfig::IsAllowedBadCert(X509Certificate* cert,
CertStatus* cert_status) const {
for (const auto& allowed_bad_cert : allowed_bad_certs) {
if (cert->EqualsExcludingChain(allowed_bad_cert.cert.get())) {
if (cert_status)
*cert_status = allowed_bad_cert.cert_status;
return true;
}
}
return false;
}
int SSLConfig::GetCertVerifyFlags() const {
int flags = 0;
if (disable_cert_verification_network_fetches)
flags |= CertVerifier::VERIFY_DISABLE_NETWORK_FETCHES;
return flags;
}
// static
std::vector<uint8_t> SSLConfig::SelectTrustAnchorIDs(
const std::vector<std::vector<uint8_t>>& server_advertised_trust_anchor_ids,
const absl::flat_hash_set<std::vector<uint8_t>>& trusted_trust_anchor_ids) {
std::vector<uint8_t> selected_trust_anchor_ids;
for (const auto& server_advertised_tai : server_advertised_trust_anchor_ids) {
if (trusted_trust_anchor_ids.contains(server_advertised_tai)) {
selected_trust_anchor_ids.emplace_back(
base::checked_cast<uint8_t>(server_advertised_tai.size()));
selected_trust_anchor_ids.insert(selected_trust_anchor_ids.end(),
server_advertised_tai.begin(),
server_advertised_tai.end());
}
}
return selected_trust_anchor_ids;
}
} // namespace net