| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/base/x509_certificate.h" | 5 #include "net/base/x509_certificate.h" |
| 6 | 6 |
| 7 #include "base/lazy_instance.h" | 7 #include "base/lazy_instance.h" |
| 8 #include "base/logging.h" | 8 #include "base/logging.h" |
| 9 #include "base/pickle.h" | 9 #include "base/pickle.h" |
| 10 #include "base/sha1.h" | 10 #include "base/sha1.h" |
| (...skipping 612 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 623 DCHECK(cert_handle) << "Failed to create self-signed certificate: " | 623 DCHECK(cert_handle) << "Failed to create self-signed certificate: " |
| 624 << GetLastError(); | 624 << GetLastError(); |
| 625 if (!cert_handle) | 625 if (!cert_handle) |
| 626 return NULL; | 626 return NULL; |
| 627 | 627 |
| 628 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); | 628 X509Certificate* cert = CreateFromHandle(cert_handle, OSCertHandles()); |
| 629 FreeOSCertHandle(cert_handle); | 629 FreeOSCertHandle(cert_handle); |
| 630 return cert; | 630 return cert; |
| 631 } | 631 } |
| 632 | 632 |
| 633 // static | |
| 634 X509Certificate* X509Certificate::CreateOriginBound( | |
| 635 crypto::RSAPrivateKey* key, | |
| 636 const std::string& origin, | |
| 637 uint32 serial_number, | |
| 638 base::TimeDelta valid_duration) { | |
| 639 NOTIMPLEMENTED(); | |
| 640 return NULL; | |
| 641 } | |
| 642 | |
| 643 void X509Certificate::GetSubjectAltName( | 633 void X509Certificate::GetSubjectAltName( |
| 644 std::vector<std::string>* dns_names, | 634 std::vector<std::string>* dns_names, |
| 645 std::vector<std::string>* ip_addrs) const { | 635 std::vector<std::string>* ip_addrs) const { |
| 646 if (dns_names) | 636 if (dns_names) |
| 647 dns_names->clear(); | 637 dns_names->clear(); |
| 648 if (ip_addrs) | 638 if (ip_addrs) |
| 649 ip_addrs->clear(); | 639 ip_addrs->clear(); |
| 650 | 640 |
| 651 if (!cert_handle_) | 641 if (!cert_handle_) |
| 652 return; | 642 return; |
| (...skipping 408 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1061 if (!CertSerializeCertificateStoreElement(cert_handle, 0, &buffer[0], | 1051 if (!CertSerializeCertificateStoreElement(cert_handle, 0, &buffer[0], |
| 1062 &length)) { | 1052 &length)) { |
| 1063 return false; | 1053 return false; |
| 1064 } | 1054 } |
| 1065 | 1055 |
| 1066 return pickle->WriteData(reinterpret_cast<const char*>(&buffer[0]), | 1056 return pickle->WriteData(reinterpret_cast<const char*>(&buffer[0]), |
| 1067 length); | 1057 length); |
| 1068 } | 1058 } |
| 1069 | 1059 |
| 1070 } // namespace net | 1060 } // namespace net |
| OLD | NEW |