Index: net/cert/multi_threaded_cert_verifier.cc |
diff --git a/net/cert/multi_threaded_cert_verifier.cc b/net/cert/multi_threaded_cert_verifier.cc |
index f1b9bb8d1faf19c95a9b231314bebeb6528bc3fd..8034ad608bc32e0d085164d7adf57af941497c7e 100644 |
--- a/net/cert/multi_threaded_cert_verifier.cc |
+++ b/net/cert/multi_threaded_cert_verifier.cc |
@@ -5,6 +5,8 @@ |
#include "net/cert/multi_threaded_cert_verifier.h" |
#include <algorithm> |
+#include <cstdlib> |
+#include <iostream> |
Ryan Sleevi
2014/05/30 22:46:24
Unnecessary includes, I suspect?
mshelley
2014/05/31 00:38:19
Done.
|
#include "base/bind.h" |
#include "base/bind_helpers.h" |
@@ -15,8 +17,9 @@ |
#include "base/synchronization/lock.h" |
#include "base/threading/worker_pool.h" |
#include "base/time/time.h" |
+#include "net/base/hash_value.h" |
#include "net/base/net_errors.h" |
-#include "net/base/net_log.h" |
+#include "net/cert/cert_status_flags.h" |
#include "net/cert/cert_trust_anchor_provider.h" |
#include "net/cert/cert_verify_proc.h" |
#include "net/cert/crl_set.h" |
@@ -27,6 +30,8 @@ |
#include <private/pprthred.h> // PR_DetachThread |
#endif |
+using namespace std; |
Ryan Sleevi
2014/05/30 22:46:24
STYLE: This is forbidden by the style guide.
See
mshelley
2014/05/31 00:38:19
Done.
|
+ |
namespace net { |
//////////////////////////////////////////////////////////////////////////// |
@@ -350,6 +355,12 @@ class CertVerifierJob { |
void HandleResult( |
const MultiThreadedCertVerifier::CachedResult& verify_result, |
bool is_first_job) { |
+ net_log_.AddEvent(NetLog::TYPE_CERT_VERIFIER_JOB, |
+ base::Bind(&NetLogX509CertificateCallback, |
+ verify_result.result.verified_cert)); |
Ryan Sleevi
2014/05/30 22:46:24
Instead of logging this as a distinct event, use b
mshelley
2014/05/31 00:38:19
When I explicitly call NetLogX509CC, I have to pas
|
+ net_log_.AddEvent( |
+ NetLog::TYPE_CERT_VERIFIER_JOB, |
+ base::Bind(&CertVerifyResultCallback, verify_result.result)); |
Ryan Sleevi
2014/05/30 22:46:24
Instead of using AddEvent to do this, update the E
mshelley
2014/05/31 00:38:19
Done.
|
worker_ = NULL; |
net_log_.EndEvent(NetLog::TYPE_CERT_VERIFIER_JOB); |
base::TimeDelta latency = base::TimeTicks::Now() - start_time_; |
@@ -583,3 +594,68 @@ void MultiThreadedCertVerifier::OnCACertChanged( |
} |
} // namespace net |
+ |
+namespace { |
Ryan Sleevi
2014/05/30 22:46:24
STYLE: Add a newline between 598 and 599.
Long An
mshelley
2014/05/31 00:38:19
Done.
|
+base::Value* CertVerifyResultCallback(net::CertVerifyResult verify_result, |
+ net::NetLog::LogLevel log_level) { |
+ base::DictionaryValue* results = new base::DictionaryValue(); |
+ results->SetBoolean("has_md5", verify_result.has_md5); |
+ results->SetBoolean("has_md2", verify_result.has_md2); |
+ results->SetBoolean("has_md4", verify_result.has_md4); |
+ results->SetBoolean("is_issued_by_known_root", |
+ verify_result.is_issued_by_known_root); |
+ results->SetBoolean("is_issued_by_additional_trust_anchor", |
+ verify_result.is_issued_by_additional_trust_anchor); |
+ results->SetBoolean("common_name_fallback_used", |
+ verify_result.common_name_fallback_used); |
+ results->SetInteger("cert_status.value", verify_result.cert_status); |
Ryan Sleevi
2014/05/30 22:46:24
Just call this
results->SetInteger("cert_status",
mshelley
2014/05/31 00:38:19
Done.
|
+ base::ListValue* flags = new base::ListValue(); |
+ |
+ // Parse bitmasked value into individual flags |
+ if (verify_result.cert_status & (0xFFFF == 15)) |
+ flags->AppendString("CERT_STATUS_ALL_ERRORS"); |
Ryan Sleevi
2014/05/30 22:46:24
This is a mask value for processing in conditional
mshelley
2014/05/31 00:38:19
Done.
|
+ else { |
+ if (verify_result.cert_status & net::CERT_STATUS_COMMON_NAME_INVALID) |
+ flags->AppendString("CERT_STATUS_COMMON_NAME_INVALID"); |
Ryan Sleevi
2014/05/30 22:46:24
So, turns out I steered you wrong, and this partic
|
+ if (verify_result.cert_status & net::CERT_STATUS_DATE_INVALID) |
+ flags->AppendString("CERT_STATUS_DATE_INVALID"); |
+ if (verify_result.cert_status & net::CERT_STATUS_AUTHORITY_INVALID) |
+ flags->AppendString("CERT_STATUS_AUTHORITY_INVALID"); |
+ if (verify_result.cert_status & net::CERT_STATUS_NO_REVOCATION_MECHANISM) |
+ flags->AppendString("CERT_STATUS_NO_REVOCATION_MECHANISM"); |
+ if (verify_result.cert_status & net::CERT_STATUS_UNABLE_TO_CHECK_REVOCATION) |
+ flags->AppendString("CERT_STATUS_UNABLE_TO_CHECK_REVOCATION"); |
+ if (verify_result.cert_status & net::CERT_STATUS_REVOKED) |
+ flags->AppendString("CERT_STATUS_REVOKED"); |
+ if (verify_result.cert_status & net::CERT_STATUS_INVALID) |
+ flags->AppendString("CERT_STATUS_INVALID"); |
+ if (verify_result.cert_status & net::CERT_STATUS_WEAK_SIGNATURE_ALGORITHM) |
+ flags->AppendString("CERT_STATUS_WEAK_SIGNATURE_ALGORITHM"); |
+ if (verify_result.cert_status & net::CERT_STATUS_NON_UNIQUE_NAME) |
+ flags->AppendString("CERT_STATUS_NON_UNIQUE_NAME"); |
+ if (verify_result.cert_status & net::CERT_STATUS_WEAK_KEY) |
+ flags->AppendString("CERT_STATUS_WEAK_KEY"); |
+ if (verify_result.cert_status & net::CERT_STATUS_PINNED_KEY_MISSING) |
+ flags->AppendString("CERT_STATUS_PINNED_KEY_MISSING"); |
+ if (verify_result.cert_status & net::CERT_STATUS_NAME_CONSTRAINT_VIOLATION) |
+ flags->AppendString("CERT_STATUS_NAME_CONSTRAINT_VIOLATION"); |
+ } |
+ if (verify_result.cert_status & net::CERT_STATUS_IS_EV) |
+ flags->AppendString("CERT_STATUS_IS_EV"); |
+ if (verify_result.cert_status & net::CERT_STATUS_REV_CHECKING_ENABLED) |
+ flags->AppendString("CERT_STATUS_REV_CHECKING_ENABLED"); |
+ results->Set("cert_status.flags_set", flags); |
+ |
+ base::ListValue* hashes = new base::ListValue(); |
+ for (vector<net::HashValue>::iterator it = |
Ryan Sleevi
2014/05/30 22:46:24
When iterating in loops, prefer a const_iterator t
mshelley
2014/05/31 00:38:19
Done.
|
+ verify_result.public_key_hashes.begin(); |
+ it != verify_result.public_key_hashes.end(); |
+ it++) { |
+ hashes->AppendString(it->ToString()); |
+ } |
+ |
+ results->Set("public_key_hashes", hashes); |
+ |
+ return results; |
+} |
+} |