Commit 2fb4408c authored by eroman's avatar eroman Committed by Commit bot

Remove CertErrors::Add(); use CertErrors::AddError() instead.

BUG=634443

Review-Url: https://codereview.chromium.org/2341803002
Cr-Commit-Position: refs/heads/master@{#418671}
parent dce171b5
...@@ -96,10 +96,6 @@ void CertErrors::Add(CertErrorNodeType node_type, ...@@ -96,10 +96,6 @@ void CertErrors::Add(CertErrorNodeType node_type,
AddNode(base::MakeUnique<CertErrorNode>(node_type, id, std::move(params))); AddNode(base::MakeUnique<CertErrorNode>(node_type, id, std::move(params)));
} }
void CertErrors::Add(CertErrorId id) {
AddError(id);
}
void CertErrors::AddError(CertErrorId id, void CertErrors::AddError(CertErrorId id,
std::unique_ptr<CertErrorParams> params) { std::unique_ptr<CertErrorParams> params) {
Add(CertErrorNodeType::TYPE_ERROR, id, std::move(params)); Add(CertErrorNodeType::TYPE_ERROR, id, std::move(params));
......
...@@ -24,7 +24,7 @@ ...@@ -24,7 +24,7 @@
// //
// * [optional] Child nodes. // * [optional] Child nodes.
// //
// Error nodes are arranged in a tree. The parent/child hiearchy is used to // Error nodes are arranged in a tree. The parent/child hierarchy is used to
// group errors that share some common state. // group errors that share some common state.
// For instance during path processing it is useful to group the // For instance during path processing it is useful to group the
// errors/warnings that happened while processing certificate "i" as // errors/warnings that happened while processing certificate "i" as
...@@ -125,10 +125,6 @@ class NET_EXPORT CertErrors { ...@@ -125,10 +125,6 @@ class NET_EXPORT CertErrors {
CertErrorId id, CertErrorId id,
std::unique_ptr<CertErrorParams> params); std::unique_ptr<CertErrorParams> params);
// TODO(crbug.com/634443): Eliminate this and use AddError() instead (which
// is less ambiguous).
void Add(CertErrorId id);
void AddError(CertErrorId id, std::unique_ptr<CertErrorParams> params); void AddError(CertErrorId id, std::unique_ptr<CertErrorParams> params);
void AddError(CertErrorId id); void AddError(CertErrorId id);
......
...@@ -36,7 +36,7 @@ bool SignaturePolicy::IsAcceptableCurveForEcdsa(int curve_nid, ...@@ -36,7 +36,7 @@ bool SignaturePolicy::IsAcceptableCurveForEcdsa(int curve_nid,
return true; return true;
} }
errors->Add(kUnacceptableCurveForEcdsa); errors->AddError(kUnacceptableCurveForEcdsa);
return false; return false;
} }
...@@ -45,7 +45,7 @@ bool SignaturePolicy::IsAcceptableModulusLengthForRsa( ...@@ -45,7 +45,7 @@ bool SignaturePolicy::IsAcceptableModulusLengthForRsa(
CertErrors* errors) const { CertErrors* errors) const {
if (modulus_length_bits < 2048) { if (modulus_length_bits < 2048) {
// TODO(crbug.com/634443): Add a parameter for actual modulus size. // TODO(crbug.com/634443): Add a parameter for actual modulus size.
errors->Add(kRsaModulusLessThan2048); errors->AddError(kRsaModulusLessThan2048);
return false; return false;
} }
...@@ -61,7 +61,7 @@ bool SimpleSignaturePolicy::IsAcceptableModulusLengthForRsa( ...@@ -61,7 +61,7 @@ bool SimpleSignaturePolicy::IsAcceptableModulusLengthForRsa(
if (modulus_length_bits < min_rsa_modulus_length_bits_) { if (modulus_length_bits < min_rsa_modulus_length_bits_) {
// TODO(crbug.com/634443): Add parameters for actual and expected modulus // TODO(crbug.com/634443): Add parameters for actual and expected modulus
// size. // size.
errors->Add(kRsaModulusTooSmall); errors->AddError(kRsaModulusTooSmall);
return false; return false;
} }
......
...@@ -93,12 +93,12 @@ WARN_UNUSED_RESULT bool VerifyTimeValidity(const ParsedCertificate& cert, ...@@ -93,12 +93,12 @@ WARN_UNUSED_RESULT bool VerifyTimeValidity(const ParsedCertificate& cert,
const der::GeneralizedTime time, const der::GeneralizedTime time,
CertErrors* errors) { CertErrors* errors) {
if (time < cert.tbs().validity_not_before) { if (time < cert.tbs().validity_not_before) {
errors->Add(kValidityFailedNotBefore); errors->AddError(kValidityFailedNotBefore);
return false; return false;
} }
if (cert.tbs().validity_not_after < time) { if (cert.tbs().validity_not_after < time) {
errors->Add(kValidityFailedNotAfter); errors->AddError(kValidityFailedNotAfter);
return false; return false;
} }
...@@ -194,7 +194,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing( ...@@ -194,7 +194,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing(
if (!VerifySignedData(cert.signature_algorithm(), cert.tbs_certificate_tlv(), if (!VerifySignedData(cert.signature_algorithm(), cert.tbs_certificate_tlv(),
cert.signature_value(), working_spki, signature_policy, cert.signature_value(), working_spki, signature_policy,
errors)) { errors)) {
errors->Add(kVerifySignedDataFailed); errors->AddError(kVerifySignedDataFailed);
return false; return false;
} }
...@@ -209,7 +209,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing( ...@@ -209,7 +209,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing(
// Verify the certificate's issuer name matches the issuing certificate's // Verify the certificate's issuer name matches the issuing certificate's
// subject name. (RFC 5280 section 6.1.3 step a.4) // subject name. (RFC 5280 section 6.1.3 step a.4)
if (cert.normalized_issuer() != working_normalized_issuer_name) { if (cert.normalized_issuer() != working_normalized_issuer_name) {
errors->Add(kSubjectDoesNotMatchIssuer); errors->AddError(kSubjectDoesNotMatchIssuer);
return false; return false;
} }
...@@ -221,7 +221,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing( ...@@ -221,7 +221,7 @@ WARN_UNUSED_RESULT bool BasicCertificateProcessing(
for (const NameConstraints* nc : name_constraints_list) { for (const NameConstraints* nc : name_constraints_list) {
if (!nc->IsPermittedCert(cert.normalized_subject(), if (!nc->IsPermittedCert(cert.normalized_subject(),
cert.subject_alt_names())) { cert.subject_alt_names())) {
errors->Add(kNotPermittedByNameConstraints); errors->AddError(kNotPermittedByNameConstraints);
return false; return false;
} }
} }
...@@ -280,12 +280,12 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate( ...@@ -280,12 +280,12 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate(
// This code implicitly rejects non version 3 intermediates, since they // This code implicitly rejects non version 3 intermediates, since they
// can't contain a BasicConstraints extension. // can't contain a BasicConstraints extension.
if (!cert.has_basic_constraints()) { if (!cert.has_basic_constraints()) {
errors->Add(kMissingBasicConstraints); errors->AddError(kMissingBasicConstraints);
return false; return false;
} }
if (!cert.basic_constraints().is_ca) { if (!cert.basic_constraints().is_ca) {
errors->Add(kBasicConstraintsIndicatesNotCa); errors->AddError(kBasicConstraintsIndicatesNotCa);
return false; return false;
} }
...@@ -296,7 +296,7 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate( ...@@ -296,7 +296,7 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate(
// max_path_length by 1. // max_path_length by 1.
if (!IsSelfIssued(cert)) { if (!IsSelfIssued(cert)) {
if (*max_path_length_ptr == 0) { if (*max_path_length_ptr == 0) {
errors->Add(kMaxPathLengthViolated); errors->AddError(kMaxPathLengthViolated);
return false; return false;
} }
--(*max_path_length_ptr); --(*max_path_length_ptr);
...@@ -318,7 +318,7 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate( ...@@ -318,7 +318,7 @@ WARN_UNUSED_RESULT bool PrepareForNextCertificate(
// keyCertSign bit is set. // keyCertSign bit is set.
if (cert.has_key_usage() && if (cert.has_key_usage() &&
!cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) { !cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) {
errors->Add(kKeyCertSignBitNotSet); errors->AddError(kKeyCertSignBitNotSet);
return false; return false;
} }
...@@ -376,7 +376,7 @@ WARN_UNUSED_RESULT bool VerifyTargetCertHasConsistentCaBits( ...@@ -376,7 +376,7 @@ WARN_UNUSED_RESULT bool VerifyTargetCertHasConsistentCaBits(
cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)); cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN));
if (!success) { if (!success) {
// TODO(eroman): Add DER for basic constraints and key usage. // TODO(eroman): Add DER for basic constraints and key usage.
errors->Add(kTargetCertInconsistentCaBits); errors->AddError(kTargetCertInconsistentCaBits);
} }
return success; return success;
...@@ -493,7 +493,7 @@ bool VerifyCertificateChain(const ParsedCertificateList& certs, ...@@ -493,7 +493,7 @@ bool VerifyCertificateChain(const ParsedCertificateList& certs,
// An empty chain is necessarily invalid. // An empty chain is necessarily invalid.
if (certs.empty()) { if (certs.empty()) {
errors->Add(kChainIsEmpty); errors->AddError(kChainIsEmpty);
return false; return false;
} }
......
...@@ -167,7 +167,7 @@ WARN_UNUSED_RESULT bool ParseRsaKeyFromSpki(const der::Input& public_key_spki, ...@@ -167,7 +167,7 @@ WARN_UNUSED_RESULT bool ParseRsaKeyFromSpki(const der::Input& public_key_spki,
unsigned int modulus_length_bits = BN_num_bits(rsa->n); unsigned int modulus_length_bits = BN_num_bits(rsa->n);
if (!policy->IsAcceptableModulusLengthForRsa(modulus_length_bits, errors)) { if (!policy->IsAcceptableModulusLengthForRsa(modulus_length_bits, errors)) {
errors->Add(kUnacceptableRsaModulusLength); errors->AddError(kUnacceptableRsaModulusLength);
return false; return false;
} }
...@@ -276,7 +276,7 @@ WARN_UNUSED_RESULT bool ParseEcKeyFromSpki(const der::Input& public_key_spki, ...@@ -276,7 +276,7 @@ WARN_UNUSED_RESULT bool ParseEcKeyFromSpki(const der::Input& public_key_spki,
int curve_nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec.get())); int curve_nid = EC_GROUP_get_curve_name(EC_KEY_get0_group(ec.get()));
if (!policy->IsAcceptableCurveForEcdsa(curve_nid, errors)) { if (!policy->IsAcceptableCurveForEcdsa(curve_nid, errors)) {
errors->Add(kUnacceptableEcdsaCurve); errors->AddError(kUnacceptableEcdsaCurve);
return false; return false;
} }
...@@ -292,7 +292,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm, ...@@ -292,7 +292,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
const SignaturePolicy* policy, const SignaturePolicy* policy,
CertErrors* errors) { CertErrors* errors) {
if (!policy->IsAcceptableSignatureAlgorithm(signature_algorithm, errors)) { if (!policy->IsAcceptableSignatureAlgorithm(signature_algorithm, errors)) {
errors->Add(kUnacceptableSignatureAlgorithm); errors->AddError(kUnacceptableSignatureAlgorithm);
return false; return false;
} }
...@@ -313,7 +313,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm, ...@@ -313,7 +313,7 @@ bool VerifySignedData(const SignatureAlgorithm& signature_algorithm,
if (!DoVerify(signature_algorithm, signed_data, signature_value, if (!DoVerify(signature_algorithm, signed_data, signature_value,
public_key.get())) { public_key.get())) {
errors->Add(kSignatureVerificationFailed); errors->AddError(kSignatureVerificationFailed);
return false; return false;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment