Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(76)

Unified Diff: net/base/cert_verify_proc_mac.cc

Issue 10855168: Rename X509Certificate::VerifyFlags to CertVerifier::VerifyFlags (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Compile fix Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/cert_verify_proc_mac.cc
diff --git a/net/base/cert_verify_proc_mac.cc b/net/base/cert_verify_proc_mac.cc
index 49798b5afd00d28dedddb298d21e0bef15ab5bfc..6a38f8ed27ba53e8eaf4d3d86416c37169a2a286 100644
--- a/net/base/cert_verify_proc_mac.cc
+++ b/net/base/cert_verify_proc_mac.cc
@@ -17,6 +17,7 @@
#include "crypto/sha2.h"
#include "net/base/asn1_util.h"
#include "net/base/cert_status_flags.h"
+#include "net/base/cert_verifier.h"
#include "net/base/cert_verify_result.h"
#include "net/base/crl_set.h"
#include "net/base/net_errors.h"
@@ -156,8 +157,7 @@ OSStatus CreateTrustPolicies(const std::string& hostname,
// revocation checking policies and instead respect the application-level
// revocation preference.
status = x509_util::CreateRevocationPolicies(
- (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED),
- local_policies);
+ (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED), local_policies);
if (status)
return status;
@@ -380,7 +380,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert,
tp_action_data.ActionFlags = CSSM_TP_ACTION_FETCH_CERT_FROM_NET |
CSSM_TP_ACTION_TRUST_SETTINGS;
- if (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED) {
+ if (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED) {
// Require a positive result from an OCSP responder or a CRL (or both)
// for every certificate in the chain. The Apple TP automatically
// excludes the self-signed root from this requirement. If a certificate
@@ -533,7 +533,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert,
if (IsCertStatusError(verify_result->cert_status))
return MapCertStatusToNetError(verify_result->cert_status);
- if (flags & X509Certificate::VERIFY_EV_CERT) {
+ if (flags & CertVerifier::VERIFY_EV_CERT) {
// Determine the certificate's EV status using SecTrustCopyExtendedResult(),
// which we need to look up because the function wasn't added until
// Mac OS X 10.5.7.

Powered by Google App Engine
This is Rietveld 408576698