Chromium Code Reviews| Index: net/base/cert_database.h |
| diff --git a/net/base/cert_database.h b/net/base/cert_database.h |
| index 2e95624c911c1d070f6d4d1df65a6d93fbdc9e13..190054d2438f1069f116fd481961e9b8808a41e5 100644 |
| --- a/net/base/cert_database.h |
| +++ b/net/base/cert_database.h |
| @@ -80,14 +80,18 @@ class NET_EXPORT CertDatabase { |
| // trusted as a server. |
| // For EMAIL_CERT, only TRUSTED_EMAIL makes sense, and specifies the cert is |
| // trusted for email. |
| + // For non-root certs, TRUST_TERMINAL_RECORD specifies that the cert should |
| + // not inherit trust from the issuer cert chain, and the cert will be trusted |
| + // or not based only on which TRUSTED_* flags are set. |
| // NOTE: The actual constants are defined using an enum instead of static |
| // consts due to compilation/linkage constraints with template functions. |
| typedef uint32 TrustBits; |
| enum { |
| - UNTRUSTED = 0, |
| - TRUSTED_SSL = 1 << 0, |
| - TRUSTED_EMAIL = 1 << 1, |
| - TRUSTED_OBJ_SIGN = 1 << 2, |
| + UNTRUSTED = 0, |
| + TRUSTED_SSL = 1 << 0, |
| + TRUSTED_EMAIL = 1 << 1, |
| + TRUSTED_OBJ_SIGN = 1 << 2, |
| + TRUST_TERMINAL_RECORD = 1 << 3, |
|
Ryan Sleevi
2012/03/29 23:35:13
This is unfortunately very specific to NSS, which
wtc
2012/03/30 22:00:50
We need to think this through. The low-level NSS
|
| }; |
| CertDatabase(); |
| @@ -162,6 +166,7 @@ class NET_EXPORT CertDatabase { |
| // |not_imported| should be checked for any certificates that were not |
| // imported. |
| bool ImportServerCert(const CertificateList& certificates, |
| + TrustBits trust_bits, |
|
Ryan Sleevi
2012/03/29 23:35:13
OpenSSL and Android have no such concept.
Android
wtc
2012/03/30 22:00:50
One solution might be to make ImportCACerts and
Im
mattm
2012/03/30 22:16:56
Looking at the link Ryan posted, I'm not sure andr
Ryan Sleevi
2012/03/30 22:42:36
Correct. And they'd like to fix that (and work is
|
| ImportCertFailureList* not_imported); |
| // Get trust bits for certificate. |