OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/x509_certificate.h" | 5 #include "net/base/x509_certificate.h" |
6 | 6 |
7 #include "base/lazy_instance.h" | 7 #include "base/lazy_instance.h" |
8 #include "base/logging.h" | 8 #include "base/logging.h" |
9 #include "base/pickle.h" | 9 #include "base/pickle.h" |
10 #include "base/sha1.h" | 10 #include "base/sha1.h" |
(...skipping 678 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
689 base::LeakyLazyInstanceTraits<GlobalCertStore> > | 689 base::LeakyLazyInstanceTraits<GlobalCertStore> > |
690 g_cert_store(base::LINKER_INITIALIZED); | 690 g_cert_store(base::LINKER_INITIALIZED); |
691 | 691 |
692 // static | 692 // static |
693 HCERTSTORE X509Certificate::cert_store() { | 693 HCERTSTORE X509Certificate::cert_store() { |
694 return g_cert_store.Get().cert_store(); | 694 return g_cert_store.Get().cert_store(); |
695 } | 695 } |
696 | 696 |
697 int X509Certificate::VerifyInternal(const std::string& hostname, | 697 int X509Certificate::VerifyInternal(const std::string& hostname, |
698 int flags, | 698 int flags, |
| 699 CRLSet* crl_set, |
699 CertVerifyResult* verify_result) const { | 700 CertVerifyResult* verify_result) const { |
700 if (!cert_handle_) | 701 if (!cert_handle_) |
701 return ERR_UNEXPECTED; | 702 return ERR_UNEXPECTED; |
702 | 703 |
703 // Build and validate certificate chain. | 704 // Build and validate certificate chain. |
704 CERT_CHAIN_PARA chain_para; | 705 CERT_CHAIN_PARA chain_para; |
705 memset(&chain_para, 0, sizeof(chain_para)); | 706 memset(&chain_para, 0, sizeof(chain_para)); |
706 chain_para.cbSize = sizeof(chain_para); | 707 chain_para.cbSize = sizeof(chain_para); |
707 // ExtendedKeyUsage. | 708 // ExtendedKeyUsage. |
708 // We still need to request szOID_SERVER_GATED_CRYPTO and szOID_SGC_NETSCAPE | 709 // We still need to request szOID_SERVER_GATED_CRYPTO and szOID_SGC_NETSCAPE |
(...skipping 342 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1051 if (!CertSerializeCertificateStoreElement(cert_handle, 0, &buffer[0], | 1052 if (!CertSerializeCertificateStoreElement(cert_handle, 0, &buffer[0], |
1052 &length)) { | 1053 &length)) { |
1053 return false; | 1054 return false; |
1054 } | 1055 } |
1055 | 1056 |
1056 return pickle->WriteData(reinterpret_cast<const char*>(&buffer[0]), | 1057 return pickle->WriteData(reinterpret_cast<const char*>(&buffer[0]), |
1057 length); | 1058 length); |
1058 } | 1059 } |
1059 | 1060 |
1060 } // namespace net | 1061 } // namespace net |
OLD | NEW |