Index: net/base/cert_database.h |
diff --git a/net/base/cert_database.h b/net/base/cert_database.h |
index 2e95624c911c1d070f6d4d1df65a6d93fbdc9e13..190054d2438f1069f116fd481961e9b8808a41e5 100644 |
--- a/net/base/cert_database.h |
+++ b/net/base/cert_database.h |
@@ -80,14 +80,18 @@ class NET_EXPORT CertDatabase { |
// trusted as a server. |
// For EMAIL_CERT, only TRUSTED_EMAIL makes sense, and specifies the cert is |
// trusted for email. |
+ // For non-root certs, TRUST_TERMINAL_RECORD specifies that the cert should |
+ // not inherit trust from the issuer cert chain, and the cert will be trusted |
+ // or not based only on which TRUSTED_* flags are set. |
// NOTE: The actual constants are defined using an enum instead of static |
// consts due to compilation/linkage constraints with template functions. |
typedef uint32 TrustBits; |
enum { |
- UNTRUSTED = 0, |
- TRUSTED_SSL = 1 << 0, |
- TRUSTED_EMAIL = 1 << 1, |
- TRUSTED_OBJ_SIGN = 1 << 2, |
+ UNTRUSTED = 0, |
+ TRUSTED_SSL = 1 << 0, |
+ TRUSTED_EMAIL = 1 << 1, |
+ TRUSTED_OBJ_SIGN = 1 << 2, |
+ TRUST_TERMINAL_RECORD = 1 << 3, |
Ryan Sleevi
2012/03/29 23:35:13
This is unfortunately very specific to NSS, which
wtc
2012/03/30 22:00:50
We need to think this through. The low-level NSS
|
}; |
CertDatabase(); |
@@ -162,6 +166,7 @@ class NET_EXPORT CertDatabase { |
// |not_imported| should be checked for any certificates that were not |
// imported. |
bool ImportServerCert(const CertificateList& certificates, |
+ TrustBits trust_bits, |
Ryan Sleevi
2012/03/29 23:35:13
OpenSSL and Android have no such concept.
Android
wtc
2012/03/30 22:00:50
One solution might be to make ImportCACerts and
Im
mattm
2012/03/30 22:16:56
Looking at the link Ryan posted, I'm not sure andr
Ryan Sleevi
2012/03/30 22:42:36
Correct. And they'd like to fix that (and work is
|
ImportCertFailureList* not_imported); |
// Get trust bits for certificate. |