OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/cert/cert_status_flags.h" | |
6 | |
7 #include "base/logging.h" | |
8 #include "net/base/net_errors.h" | |
9 | |
10 namespace net { | |
11 | |
12 bool IsCertStatusMinorError(CertStatus cert_status) { | |
13 static const CertStatus kMinorErrors = | |
14 CERT_STATUS_UNABLE_TO_CHECK_REVOCATION | | |
15 CERT_STATUS_NO_REVOCATION_MECHANISM; | |
16 cert_status &= CERT_STATUS_ALL_ERRORS; | |
17 return cert_status != 0 && (cert_status & ~kMinorErrors) == 0; | |
18 } | |
19 | |
20 CertStatus MapNetErrorToCertStatus(int error) { | |
21 switch (error) { | |
22 case ERR_CERT_COMMON_NAME_INVALID: | |
23 return CERT_STATUS_COMMON_NAME_INVALID; | |
24 case ERR_CERT_DATE_INVALID: | |
25 return CERT_STATUS_DATE_INVALID; | |
26 case ERR_CERT_AUTHORITY_INVALID: | |
27 return CERT_STATUS_AUTHORITY_INVALID; | |
28 case ERR_CERT_NO_REVOCATION_MECHANISM: | |
29 return CERT_STATUS_NO_REVOCATION_MECHANISM; | |
30 case ERR_CERT_UNABLE_TO_CHECK_REVOCATION: | |
31 return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; | |
32 case ERR_CERT_REVOKED: | |
33 return CERT_STATUS_REVOKED; | |
34 // We added the ERR_CERT_CONTAINS_ERRORS error code when we were using | |
35 // WinInet, but we never figured out how it differs from ERR_CERT_INVALID. | |
36 // We should not use ERR_CERT_CONTAINS_ERRORS in new code. | |
37 case ERR_CERT_CONTAINS_ERRORS: | |
38 NOTREACHED(); | |
39 // Falls through. | |
40 case ERR_CERT_INVALID: | |
41 return CERT_STATUS_INVALID; | |
42 case ERR_CERT_WEAK_SIGNATURE_ALGORITHM: | |
43 return CERT_STATUS_WEAK_SIGNATURE_ALGORITHM; | |
44 case ERR_CERT_NON_UNIQUE_NAME: | |
45 return CERT_STATUS_NON_UNIQUE_NAME; | |
46 case ERR_CERT_WEAK_KEY: | |
47 return CERT_STATUS_WEAK_KEY; | |
48 case ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN: | |
49 return CERT_STATUS_PINNED_KEY_MISSING; | |
50 case ERR_CERT_NAME_CONSTRAINT_VIOLATION: | |
51 return CERT_STATUS_NAME_CONSTRAINT_VIOLATION; | |
52 case ERR_CERT_VALIDITY_TOO_LONG: | |
53 return CERT_STATUS_VALIDITY_TOO_LONG; | |
54 default: | |
55 return 0; | |
56 } | |
57 } | |
58 | |
59 int MapCertStatusToNetError(CertStatus cert_status) { | |
60 // A certificate may have multiple errors. We report the most | |
61 // serious error. | |
62 | |
63 // Unrecoverable errors | |
64 if (cert_status & CERT_STATUS_REVOKED) | |
65 return ERR_CERT_REVOKED; | |
66 if (cert_status & CERT_STATUS_INVALID) | |
67 return ERR_CERT_INVALID; | |
68 if (cert_status & CERT_STATUS_PINNED_KEY_MISSING) | |
69 return ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN; | |
70 | |
71 // Recoverable errors | |
72 if (cert_status & CERT_STATUS_AUTHORITY_INVALID) | |
73 return ERR_CERT_AUTHORITY_INVALID; | |
74 if (cert_status & CERT_STATUS_COMMON_NAME_INVALID) | |
75 return ERR_CERT_COMMON_NAME_INVALID; | |
76 // CERT_STATUS_NON_UNIQUE_NAME is intentionally not mapped to an error. | |
77 // It is treated as just a warning and used to degrade the SSL UI. | |
78 if (cert_status & CERT_STATUS_NAME_CONSTRAINT_VIOLATION) | |
79 return ERR_CERT_NAME_CONSTRAINT_VIOLATION; | |
80 if (cert_status & CERT_STATUS_WEAK_SIGNATURE_ALGORITHM) | |
81 return ERR_CERT_WEAK_SIGNATURE_ALGORITHM; | |
82 if (cert_status & CERT_STATUS_WEAK_KEY) | |
83 return ERR_CERT_WEAK_KEY; | |
84 if (cert_status & CERT_STATUS_DATE_INVALID) | |
85 return ERR_CERT_DATE_INVALID; | |
86 if (cert_status & CERT_STATUS_VALIDITY_TOO_LONG) | |
87 return ERR_CERT_VALIDITY_TOO_LONG; | |
88 | |
89 // Unknown status. Give it the benefit of the doubt. | |
90 if (cert_status & CERT_STATUS_UNABLE_TO_CHECK_REVOCATION) | |
91 return ERR_CERT_UNABLE_TO_CHECK_REVOCATION; | |
92 if (cert_status & CERT_STATUS_NO_REVOCATION_MECHANISM) | |
93 return ERR_CERT_NO_REVOCATION_MECHANISM; | |
94 | |
95 NOTREACHED(); | |
96 return ERR_UNEXPECTED; | |
97 } | |
98 | |
99 } // namespace net | |
OLD | NEW |