| Index: net/tools/cert_verify_tool/verify_using_path_builder.cc
|
| diff --git a/net/tools/cert_verify_tool/verify_using_path_builder.cc b/net/tools/cert_verify_tool/verify_using_path_builder.cc
|
| index 2520e6d0a5308762ad86b9fcfb9f04b6957bbace..3aaec0e1b82a37154845ee513f9674a2a21ed7b7 100644
|
| --- a/net/tools/cert_verify_tool/verify_using_path_builder.cc
|
| +++ b/net/tools/cert_verify_tool/verify_using_path_builder.cc
|
| @@ -18,12 +18,18 @@
|
| #include "net/cert/internal/parsed_certificate.h"
|
| #include "net/cert/internal/path_builder.h"
|
| #include "net/cert/internal/signature_policy.h"
|
| -#include "net/cert/internal/trust_store.h"
|
| +#include "net/cert/internal/trust_store_static.h"
|
| #include "net/cert_net/cert_net_fetcher_impl.h"
|
| #include "net/tools/cert_verify_tool/cert_verify_tool_util.h"
|
| #include "net/url_request/url_request_context.h"
|
| #include "net/url_request/url_request_context_builder.h"
|
|
|
| +// XXX should it be defined(OS_LINUX) || defined(OS_CHROMEOS) ?
|
| +#if defined(USE_NSS_CERTS)
|
| +#include "base/threading/thread_task_runner_handle.h"
|
| +#include "net/cert/internal/trust_store_nss.h"
|
| +#endif
|
| +
|
| #if defined(OS_LINUX)
|
| #include "net/proxy/proxy_config.h"
|
| #include "net/proxy/proxy_config_service_fixed.h"
|
| @@ -93,15 +99,19 @@ bool VerifyUsingPathBuilder(
|
| const std::vector<CertInput>& root_der_certs,
|
| const base::Time at_time,
|
| const base::FilePath& dump_prefix_path) {
|
| - std::cout << "NOTE: CertPathBuilder does not currently use OS trust settings "
|
| - "(--roots must be specified).\n";
|
| std::cerr << "WARNING: --hostname is not yet verified with CertPathBuilder\n";
|
|
|
| base::Time::Exploded exploded_time;
|
| at_time.UTCExplode(&exploded_time);
|
| net::der::GeneralizedTime time = ConvertExplodedTime(exploded_time);
|
|
|
| - net::TrustStore trust_store;
|
| +#if defined(USE_NSS_CERTS)
|
| + net::TrustStoreNSS trust_store_nss(base::ThreadTaskRunnerHandle::Get());
|
| +#else
|
| + std::cout << "NOTE: CertPathBuilder does not currently use OS trust settings "
|
| + "(--roots must be specified).\n";
|
| +#endif
|
| + net::TrustStoreStatic trust_store_static;
|
| for (const auto& der_cert : root_der_certs) {
|
| scoped_refptr<net::ParsedCertificate> cert =
|
| net::ParsedCertificate::CreateFromCertificateCopy(der_cert.der_cert,
|
| @@ -109,7 +119,7 @@ bool VerifyUsingPathBuilder(
|
| if (!cert)
|
| PrintCertError("ERROR: ParsedCertificate failed:", der_cert);
|
| else
|
| - trust_store.AddTrustedCertificate(cert);
|
| + trust_store_static.AddTrustedCertificate(cert);
|
| }
|
|
|
| net::CertIssuerSourceStatic intermediate_cert_issuer_source;
|
| @@ -134,8 +144,12 @@ bool VerifyUsingPathBuilder(
|
| // Verify the chain.
|
| net::SimpleSignaturePolicy signature_policy(2048);
|
| net::CertPathBuilder::Result result;
|
| - net::CertPathBuilder path_builder(target_cert, &trust_store,
|
| - &signature_policy, time, &result);
|
| + net::CertPathBuilder path_builder(target_cert, &signature_policy, time,
|
| + &result);
|
| + path_builder.AddTrustStore(&trust_store_static);
|
| +#if defined(USE_NSS_CERTS)
|
| + path_builder.AddTrustStore(&trust_store_nss);
|
| +#endif
|
| path_builder.AddCertIssuerSource(&intermediate_cert_issuer_source);
|
|
|
| // TODO(mattm): add command line flags to configure using CertIssuerSourceAia
|
|
|