OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/cert_verify_proc_mac.h" | 5 #include "net/cert/cert_verify_proc_mac.h" |
6 | 6 |
7 #include <CommonCrypto/CommonDigest.h> | 7 #include <CommonCrypto/CommonDigest.h> |
8 #include <CoreServices/CoreServices.h> | 8 #include <CoreServices/CoreServices.h> |
9 #include <Security/Security.h> | 9 #include <Security/Security.h> |
10 | 10 |
(...skipping 455 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
466 } // namespace | 466 } // namespace |
467 | 467 |
468 CertVerifyProcMac::CertVerifyProcMac() {} | 468 CertVerifyProcMac::CertVerifyProcMac() {} |
469 | 469 |
470 CertVerifyProcMac::~CertVerifyProcMac() {} | 470 CertVerifyProcMac::~CertVerifyProcMac() {} |
471 | 471 |
472 bool CertVerifyProcMac::SupportsAdditionalTrustAnchors() const { | 472 bool CertVerifyProcMac::SupportsAdditionalTrustAnchors() const { |
473 return false; | 473 return false; |
474 } | 474 } |
475 | 475 |
| 476 bool CertVerifyProcMac::SupportsOCSPStapling() const { |
| 477 // TODO(rsleevi): Plumb an OCSP response into the Mac system library. |
| 478 // https://crbug.com/430714 |
| 479 return false; |
| 480 } |
| 481 |
476 int CertVerifyProcMac::VerifyInternal( | 482 int CertVerifyProcMac::VerifyInternal( |
477 X509Certificate* cert, | 483 X509Certificate* cert, |
478 const std::string& hostname, | 484 const std::string& hostname, |
| 485 const std::string& ocsp_response, |
479 int flags, | 486 int flags, |
480 CRLSet* crl_set, | 487 CRLSet* crl_set, |
481 const CertificateList& additional_trust_anchors, | 488 const CertificateList& additional_trust_anchors, |
482 CertVerifyResult* verify_result) { | 489 CertVerifyResult* verify_result) { |
483 ScopedCFTypeRef<CFArrayRef> trust_policies; | 490 ScopedCFTypeRef<CFArrayRef> trust_policies; |
484 OSStatus status = CreateTrustPolicies(hostname, flags, &trust_policies); | 491 OSStatus status = CreateTrustPolicies(hostname, flags, &trust_policies); |
485 if (status) | 492 if (status) |
486 return NetErrorFromOSStatus(status); | 493 return NetErrorFromOSStatus(status); |
487 | 494 |
488 // Create and configure a SecTrustRef, which takes our certificate(s) | 495 // Create and configure a SecTrustRef, which takes our certificate(s) |
(...skipping 276 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
765 } | 772 } |
766 } | 773 } |
767 } | 774 } |
768 } | 775 } |
769 } | 776 } |
770 | 777 |
771 return OK; | 778 return OK; |
772 } | 779 } |
773 | 780 |
774 } // namespace net | 781 } // namespace net |
OLD | NEW |