OLD | NEW |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/internal/trust_store_nss.h" | 5 #include "net/cert/internal/trust_store_nss.h" |
6 | 6 |
7 #include <cert.h> | 7 #include <cert.h> |
8 #include <certdb.h> | 8 #include <certdb.h> |
9 | 9 |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
11 #include "base/callback_helpers.h" | 11 #include "base/callback_helpers.h" |
12 #include "base/memory/ptr_util.h" | 12 #include "base/memory/ptr_util.h" |
13 #include "base/memory/weak_ptr.h" | 13 #include "base/memory/weak_ptr.h" |
14 #include "base/task_runner.h" | 14 #include "base/task_runner.h" |
15 #include "crypto/nss_util.h" | 15 #include "crypto/nss_util.h" |
| 16 #include "net/cert/internal/cert_errors.h" |
16 #include "net/cert/internal/parsed_certificate.h" | 17 #include "net/cert/internal/parsed_certificate.h" |
17 | 18 |
18 // TODO(mattm): structure so that supporting ChromeOS multi-profile stuff is | 19 // TODO(mattm): structure so that supporting ChromeOS multi-profile stuff is |
19 // doable (Have a TrustStoreChromeOS which uses net::NSSProfileFilterChromeOS, | 20 // doable (Have a TrustStoreChromeOS which uses net::NSSProfileFilterChromeOS, |
20 // similar to CertVerifyProcChromeOS.) | 21 // similar to CertVerifyProcChromeOS.) |
21 | 22 |
22 namespace net { | 23 namespace net { |
23 | 24 |
24 namespace { | 25 namespace { |
25 | 26 |
(...skipping 23 matching lines...) Expand all Loading... |
49 !CERT_LIST_END(node, found_certs); node = CERT_LIST_NEXT(node)) { | 50 !CERT_LIST_END(node, found_certs); node = CERT_LIST_NEXT(node)) { |
50 CERTCertTrust trust; | 51 CERTCertTrust trust; |
51 if (CERT_GetCertTrust(node->cert, &trust) != SECSuccess) | 52 if (CERT_GetCertTrust(node->cert, &trust) != SECSuccess) |
52 continue; | 53 continue; |
53 | 54 |
54 // TODO(mattm): handle explicit distrust (blacklisting)? | 55 // TODO(mattm): handle explicit distrust (blacklisting)? |
55 const int ca_trust = CERTDB_TRUSTED_CA; | 56 const int ca_trust = CERTDB_TRUSTED_CA; |
56 if ((SEC_GET_TRUST_FLAGS(&trust, trust_type) & ca_trust) != ca_trust) | 57 if ((SEC_GET_TRUST_FLAGS(&trust, trust_type) & ca_trust) != ca_trust) |
57 continue; | 58 continue; |
58 | 59 |
59 scoped_refptr<ParsedCertificate> anchor_cert = | 60 CertErrors errors; |
60 ParsedCertificate::CreateFromCertificateData( | 61 scoped_refptr<ParsedCertificate> anchor_cert = ParsedCertificate::Create( |
61 node->cert->derCert.data, node->cert->derCert.len, | 62 node->cert->derCert.data, node->cert->derCert.len, {}, &errors); |
62 ParsedCertificate::DataSource::INTERNAL_COPY, {}); | |
63 if (!anchor_cert) { | 63 if (!anchor_cert) { |
64 // TODO(mattm): return errors better. | 64 // TODO(crbug.com/634443): return errors better. |
65 LOG(ERROR) << "error parsing issuer certificate"; | 65 LOG(ERROR) << "Error parsing issuer certificate:\n" |
| 66 << errors.ToDebugString(); |
66 continue; | 67 continue; |
67 } | 68 } |
68 | 69 |
69 out_anchors->push_back(TrustAnchor::CreateFromCertificateNoConstraints( | 70 out_anchors->push_back(TrustAnchor::CreateFromCertificateNoConstraints( |
70 std::move(anchor_cert))); | 71 std::move(anchor_cert))); |
71 } | 72 } |
72 CERT_DestroyCertList(found_certs); | 73 CERT_DestroyCertList(found_certs); |
73 } | 74 } |
74 | 75 |
75 class GetAnchorsRequest : public TrustStore::Request { | 76 class GetAnchorsRequest : public TrustStore::Request { |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
127 std::unique_ptr<Request>* out_req) const { | 128 std::unique_ptr<Request>* out_req) const { |
128 if (callback.is_null()) | 129 if (callback.is_null()) |
129 return; | 130 return; |
130 | 131 |
131 auto req = base::MakeUnique<GetAnchorsRequest>(callback); | 132 auto req = base::MakeUnique<GetAnchorsRequest>(callback); |
132 req->Start(cert, trust_type_, nss_task_runner_.get()); | 133 req->Start(cert, trust_type_, nss_task_runner_.get()); |
133 *out_req = std::move(req); | 134 *out_req = std::move(req); |
134 } | 135 } |
135 | 136 |
136 } // namespace net | 137 } // namespace net |
OLD | NEW |