OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/cert_verify_proc_openssl.h" | 5 #include "net/base/cert_verify_proc_openssl.h" |
6 | 6 |
7 #include <openssl/x509v3.h> | 7 #include <openssl/x509v3.h> |
8 | 8 |
9 #include "base/logging.h" | 9 #include "base/logging.h" |
10 #include "base/sha1.h" | 10 #include "base/sha1.h" |
(...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
43 case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER: | 43 case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER: |
44 case X509_V_ERR_INVALID_NON_CA: | 44 case X509_V_ERR_INVALID_NON_CA: |
45 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: | 45 case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT: |
46 case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: | 46 case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: |
47 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: | 47 case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY: |
48 return CERT_STATUS_AUTHORITY_INVALID; | 48 return CERT_STATUS_AUTHORITY_INVALID; |
49 #if 0 | 49 #if 0 |
50 // TODO(bulach): what should we map to these status? | 50 // TODO(bulach): what should we map to these status? |
51 return CERT_STATUS_NO_REVOCATION_MECHANISM; | 51 return CERT_STATUS_NO_REVOCATION_MECHANISM; |
52 return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; | 52 return CERT_STATUS_UNABLE_TO_CHECK_REVOCATION; |
53 return CERT_STATUS_NOT_IN_DNS; | |
54 #endif | 53 #endif |
55 case X509_V_ERR_CERT_REVOKED: | 54 case X509_V_ERR_CERT_REVOKED: |
56 return CERT_STATUS_REVOKED; | 55 return CERT_STATUS_REVOKED; |
57 // All these status are mapped to CERT_STATUS_INVALID. | 56 // All these status are mapped to CERT_STATUS_INVALID. |
58 case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: | 57 case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE: |
59 case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: | 58 case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE: |
60 case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: | 59 case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY: |
61 case X509_V_ERR_CERT_SIGNATURE_FAILURE: | 60 case X509_V_ERR_CERT_SIGNATURE_FAILURE: |
62 case X509_V_ERR_CRL_SIGNATURE_FAILURE: | 61 case X509_V_ERR_CRL_SIGNATURE_FAILURE: |
63 case X509_V_ERR_OUT_OF_MEM: | 62 case X509_V_ERR_OUT_OF_MEM: |
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
269 // TODO(joth): if the motivations described in | 268 // TODO(joth): if the motivations described in |
270 // http://src.chromium.org/viewvc/chrome?view=rev&revision=80778 become an | 269 // http://src.chromium.org/viewvc/chrome?view=rev&revision=80778 become an |
271 // issue on OpenSSL builds, we will need to embed a hardcoded list of well | 270 // issue on OpenSSL builds, we will need to embed a hardcoded list of well |
272 // known root CAs, as per the _mac and _win versions. | 271 // known root CAs, as per the _mac and _win versions. |
273 verify_result->is_issued_by_known_root = true; | 272 verify_result->is_issued_by_known_root = true; |
274 | 273 |
275 return OK; | 274 return OK; |
276 } | 275 } |
277 | 276 |
278 } // namespace net | 277 } // namespace net |
OLD | NEW |