OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/tools/cert_verify_tool/verify_using_path_builder.h" | 5 #include "net/tools/cert_verify_tool/verify_using_path_builder.h" |
6 | 6 |
7 #include <iostream> | 7 #include <iostream> |
8 | 8 |
9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
10 #include "base/strings/string_number_conversions.h" | 10 #include "base/strings/string_number_conversions.h" |
(...skipping 101 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
112 // the normalized subject. | 112 // the normalized subject. |
113 if (trust_anchor->cert()) | 113 if (trust_anchor->cert()) |
114 return SubjectFromParsedCertificate(trust_anchor->cert().get()); | 114 return SubjectFromParsedCertificate(trust_anchor->cert().get()); |
115 | 115 |
116 net::RDNSequence parsed_subject; | 116 net::RDNSequence parsed_subject; |
117 if (!net::ParseNameValue(trust_anchor->normalized_subject(), &parsed_subject)) | 117 if (!net::ParseNameValue(trust_anchor->normalized_subject(), &parsed_subject)) |
118 return std::string(); | 118 return std::string(); |
119 return SubjectToString(parsed_subject); | 119 return SubjectToString(parsed_subject); |
120 } | 120 } |
121 | 121 |
122 void PrintCertErrors(const net::CertErrors& errors) { | |
123 // TODO(crbug.com/634443): Include more detailed error information. Also this | |
124 // should likely be extracted to a common location and used by unit-tests and | |
125 // other debugging needs. | |
126 for (const auto& error : errors.errors()) { | |
127 std::cout << " " << error.type << "\n"; | |
128 } | |
129 } | |
130 | |
131 // Dumps a ResultPath to std::cout. | 122 // Dumps a ResultPath to std::cout. |
132 void PrintResultPath(const net::CertPathBuilder::ResultPath* result_path, | 123 void PrintResultPath(const net::CertPathBuilder::ResultPath* result_path, |
133 size_t index, | 124 size_t index, |
134 bool is_best) { | 125 bool is_best) { |
135 std::cout << "path " << index << " " | 126 std::cout << "path " << index << " " |
136 << (result_path->valid ? "valid" : "invalid") | 127 << (result_path->valid ? "valid" : "invalid") |
137 << (is_best ? " (best)" : "") << "\n"; | 128 << (is_best ? " (best)" : "") << "\n"; |
138 | 129 |
139 // Print the certificate chain. | 130 // Print the certificate chain. |
140 for (const auto& cert : result_path->path.certs) { | 131 for (const auto& cert : result_path->path.certs) { |
141 std::cout << " " << FingerPrintParsedCertificate(cert.get()) << " " | 132 std::cout << " " << FingerPrintParsedCertificate(cert.get()) << " " |
142 << SubjectFromParsedCertificate(cert.get()) << "\n"; | 133 << SubjectFromParsedCertificate(cert.get()) << "\n"; |
143 } | 134 } |
144 | 135 |
145 // Print the trust anchor (if there was one). | 136 // Print the trust anchor (if there was one). |
146 const auto& trust_anchor = result_path->path.trust_anchor; | 137 const auto& trust_anchor = result_path->path.trust_anchor; |
147 if (trust_anchor) { | 138 if (trust_anchor) { |
148 std::string trust_anchor_cert_fingerprint = "<no cert>"; | 139 std::string trust_anchor_cert_fingerprint = "<no cert>"; |
149 if (trust_anchor->cert()) { | 140 if (trust_anchor->cert()) { |
150 trust_anchor_cert_fingerprint = | 141 trust_anchor_cert_fingerprint = |
151 FingerPrintParsedCertificate(trust_anchor->cert().get()); | 142 FingerPrintParsedCertificate(trust_anchor->cert().get()); |
152 } | 143 } |
153 std::cout << " " << trust_anchor_cert_fingerprint << " " | 144 std::cout << " " << trust_anchor_cert_fingerprint << " " |
154 << SubjectFromTrustAnchor(trust_anchor.get()) << "\n"; | 145 << SubjectFromTrustAnchor(trust_anchor.get()) << "\n"; |
155 } | 146 } |
156 | 147 |
157 // Print the errors. | 148 // Print the errors. |
158 if (!result_path->errors.errors().empty()) { | 149 if (!result_path->errors.errors().empty()) { |
159 std::cout << "Errors:\n"; | 150 std::cout << "Errors:\n"; |
160 PrintCertErrors(result_path->errors); | 151 std::cout << result_path->errors.ToDebugString() << "\n"; |
161 } | 152 } |
162 } | 153 } |
163 | 154 |
164 } // namespace | 155 } // namespace |
165 | 156 |
166 // Verifies |target_der_cert| using CertPathBuilder. | 157 // Verifies |target_der_cert| using CertPathBuilder. |
167 bool VerifyUsingPathBuilder( | 158 bool VerifyUsingPathBuilder( |
168 const CertInput& target_der_cert, | 159 const CertInput& target_der_cert, |
169 const std::vector<CertInput>& intermediate_der_certs, | 160 const std::vector<CertInput>& intermediate_der_certs, |
170 const std::vector<CertInput>& root_der_certs, | 161 const std::vector<CertInput>& root_der_certs, |
(...skipping 98 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
269 if (!DumpParsedCertificateChain( | 260 if (!DumpParsedCertificateChain( |
270 dump_prefix_path.AddExtension( | 261 dump_prefix_path.AddExtension( |
271 FILE_PATH_LITERAL(".CertPathBuilder.pem")), | 262 FILE_PATH_LITERAL(".CertPathBuilder.pem")), |
272 result.paths[result.best_result_index]->path)) { | 263 result.paths[result.best_result_index]->path)) { |
273 return false; | 264 return false; |
274 } | 265 } |
275 } | 266 } |
276 | 267 |
277 return result.HasValidPath(); | 268 return result.HasValidPath(); |
278 } | 269 } |
OLD | NEW |