Index: net/cert/cert_verify_proc_nss.h |
diff --git a/net/cert/cert_verify_proc_nss.h b/net/cert/cert_verify_proc_nss.h |
index 395facf5aca11f37a34e3c8f42da9bc25cba8e90..519c1aa031710db191d001017689bd472942bf6e 100644 |
--- a/net/cert/cert_verify_proc_nss.h |
+++ b/net/cert/cert_verify_proc_nss.h |
@@ -18,6 +18,7 @@ class NET_EXPORT_PRIVATE CertVerifyProcNSS : public CertVerifyProc { |
CertVerifyProcNSS(); |
bool SupportsAdditionalTrustAnchors() const override; |
+ bool SupportsOCSPStapling() const override; |
protected: |
~CertVerifyProcNSS() override; |
@@ -27,6 +28,7 @@ class NET_EXPORT_PRIVATE CertVerifyProcNSS : public CertVerifyProc { |
// CERTChainVerifyCallbackFunc in NSS's lib/certdb/certt.h. |
int VerifyInternalImpl(X509Certificate* cert, |
const std::string& hostname, |
+ const std::string& ocsp_response, |
int flags, |
CRLSet* crl_set, |
const CertificateList& additional_trust_anchors, |
@@ -36,10 +38,22 @@ class NET_EXPORT_PRIVATE CertVerifyProcNSS : public CertVerifyProc { |
private: |
int VerifyInternal(X509Certificate* cert, |
const std::string& hostname, |
+ const std::string& ocsp_response, |
int flags, |
CRLSet* crl_set, |
const CertificateList& additional_trust_anchors, |
CertVerifyResult* verify_result) override; |
+ |
+#if defined(USE_NSS_CERTS) |
+ using CacheOCSPResponseFromSideChannelFunction = |
+ SECStatus (*)(CERTCertDBHandle* handle, |
+ CERTCertificate* cert, |
+ PRTime time, |
+ SECItem* encodedResponse, |
+ void* pwArg); |
+ CacheOCSPResponseFromSideChannelFunction |
Ryan Sleevi
2015/04/23 01:41:23
Const-this, since it will definitely be hit on mul
davidben
2015/04/23 20:41:47
Done.
|
+ cache_ocsp_response_from_side_channel_; |
+#endif |
}; |
} // namespace net |