office-gobmx/xmlsecurity/source/xmlsec/nss/secerror.cxx

167 lines
5.4 KiB
C++
Raw Normal View History

/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
2009-10-29 05:31:59 -05:00
/*************************************************************************
*
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* Copyright 2008 by Sun Microsystems, Inc.
*
* OpenOffice.org - a multi-platform office productivity suite
*
* This file is part of OpenOffice.org.
*
* OpenOffice.org is free software: you can redistribute it and/or modify
* it under the terms of the GNU Lesser General Public License version 3
* only, as published by the Free Software Foundation.
*
* OpenOffice.org is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Lesser General Public License version 3 for more details
* (a copy is included in the LICENSE file that accompanied this code).
*
* You should have received a copy of the GNU Lesser General Public License
* version 3 along with OpenOffice.org. If not, see
* <http://www.openoffice.org/license.html>
* for a copy of the LGPLv3 License.
*
************************************************************************/
2009-10-29 05:31:59 -05:00
#include "secerr.h"
#include "sslerr.h"
#include "nspr.h"
#include "certt.h"
2010-12-03 07:59:47 -06:00
#include <sal/macros.h>
2009-10-29 05:31:59 -05:00
#include "../diagnose.hxx"
using namespace xmlsecurity;
2009-10-29 05:31:59 -05:00
struct ErrDesc {
PRErrorCode errNum;
const char * errString;
};
const ErrDesc allDesc[] = {
#include "certerrors.h"
};
/* Returns a UTF-8 encoded constant error string for "errNum".
* Returns NULL of errNum is unknown.
*/
const char *
getCertError(PRErrorCode errNum)
{
static char sEmpty[] = "";
2010-12-03 07:59:47 -06:00
const int numDesc = SAL_N_ELEMENTS(allDesc);
2009-10-29 05:31:59 -05:00
for (int i = 0; i < numDesc; i++)
{
if (allDesc[i].errNum == errNum)
return allDesc[i].errString;
}
return sEmpty;
}
void
printChainFailure(CERTVerifyLog *log)
2009-10-29 05:31:59 -05:00
{
unsigned int depth = (unsigned int)-1;
2009-11-05 09:55:26 -06:00
const char * specificError = NULL;
const char * issuer = NULL;
2009-10-29 05:31:59 -05:00
CERTVerifyLogNode *node = NULL;
if (log->count > 0)
{
xmlsec_trace("Bad certifcation path:");
2011-01-11 15:06:19 -06:00
unsigned long errorFlags = 0;
2009-10-29 05:31:59 -05:00
for (node = log->head; node; node = node->next)
{
if (depth != node->depth)
{
depth = node->depth;
xmlsec_trace("Certificate: %d. %s %s:", depth,
2009-10-29 05:31:59 -05:00
node->cert->subjectName,
depth ? "[Certificate Authority]": "");
}
xmlsec_trace(" ERROR %ld: %s", node->error,
2009-10-29 05:31:59 -05:00
getCertError(node->error));
specificError = NULL;
2009-11-05 09:55:26 -06:00
issuer = NULL;
2009-10-29 05:31:59 -05:00
switch (node->error)
{
case SEC_ERROR_INADEQUATE_KEY_USAGE:
errorFlags = (unsigned long)node->arg;
2009-10-29 05:31:59 -05:00
switch (errorFlags)
{
case KU_DIGITAL_SIGNATURE:
specificError = "Certificate cannot sign.";
break;
case KU_KEY_ENCIPHERMENT:
specificError = "Certificate cannot encrypt.";
break;
case KU_KEY_CERT_SIGN:
specificError = "Certificate cannot sign other certs.";
break;
default:
specificError = "[unknown usage].";
break;
}
case SEC_ERROR_INADEQUATE_CERT_TYPE:
errorFlags = (unsigned long)node->arg;
2009-10-29 05:31:59 -05:00
switch (errorFlags)
{
case NS_CERT_TYPE_SSL_CLIENT:
case NS_CERT_TYPE_SSL_SERVER:
specificError = "Certificate cannot be used for SSL.";
break;
case NS_CERT_TYPE_SSL_CA:
specificError = "Certificate cannot be used as an SSL CA.";
break;
case NS_CERT_TYPE_EMAIL:
specificError = "Certificate cannot be used for SMIME.";
break;
case NS_CERT_TYPE_EMAIL_CA:
specificError = "Certificate cannot be used as an SMIME CA.";
break;
case NS_CERT_TYPE_OBJECT_SIGNING:
specificError = "Certificate cannot be used for object signing.";
break;
case NS_CERT_TYPE_OBJECT_SIGNING_CA:
specificError = "Certificate cannot be used as an object signing CA.";
break;
default:
specificError = "[unknown usage].";
break;
}
case SEC_ERROR_UNKNOWN_ISSUER:
2009-11-05 09:55:26 -06:00
specificError = "Unknown issuer:";
issuer = node->cert->issuerName;
break;
2009-10-29 05:31:59 -05:00
case SEC_ERROR_UNTRUSTED_ISSUER:
2009-11-05 09:55:26 -06:00
specificError = "Untrusted issuer:";
issuer = node->cert->issuerName;
break;
2009-10-29 05:31:59 -05:00
case SEC_ERROR_EXPIRED_ISSUER_CERTIFICATE:
2009-11-05 09:55:26 -06:00
specificError = "Expired issuer certificate:";
issuer = node->cert->issuerName;
2009-10-29 05:31:59 -05:00
break;
default:
break;
}
if (specificError)
xmlsec_trace("%s", specificError);
2009-11-05 09:55:26 -06:00
if (issuer)
xmlsec_trace("%s", issuer);
2009-10-29 05:31:59 -05:00
}
}
}
/* vim:set shiftwidth=4 softtabstop=4 expandtab: */