Chromium Code Reviews| Index: net/base/x509_certificate_nss.cc |
| diff --git a/net/base/x509_certificate_nss.cc b/net/base/x509_certificate_nss.cc |
| index 699c65502321e2dce387a8ca67328f889ee3d409..29382eea70a74dd17cae1c9bd655b4c5fb47b2b4 100644 |
| --- a/net/base/x509_certificate_nss.cc |
| +++ b/net/base/x509_certificate_nss.cc |
| @@ -764,6 +764,11 @@ void X509Certificate::GetDNSNames(std::vector<std::string>* dns_names) const { |
| dns_names->push_back(subject_.common_name); |
| } |
| +X509Certificate::OSCertListHandle |
| +X509Certificate::CreateOSCertListHandle() const { |
| + return CERT_DupCertificate(cert_handle_); |
| +} |
|
wtc
2011/10/04 00:26:34
Change VerifyInternal to use CreateOSCertListHandl
Ryan Sleevi
2011/10/04 03:38:07
I don't think this is desirable for NSS, since the
wtc
2011/10/04 18:00:51
The reason I suggested having VerifyInternal use
C
|
| + |
| int X509Certificate::VerifyInternal(const std::string& hostname, |
| int flags, |
| CertVerifyResult* verify_result) const { |
| @@ -973,6 +978,11 @@ void X509Certificate::FreeOSCertHandle(OSCertHandle cert_handle) { |
| } |
| // static |
| +void X509Certificate::FreeOSCertListHandle(OSCertListHandle cert_list) { |
|
wtc
2011/10/04 00:26:34
cert_list => cert_list_handle
|
| + CERT_DestroyCertificate(cert_list); |
| +} |
| + |
| +// static |
| SHA1Fingerprint X509Certificate::CalculateFingerprint( |
| OSCertHandle cert) { |
| SHA1Fingerprint sha1; |