Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(61)

Unified Diff: net/base/cert_verify_proc_mac.cc

Issue 10855168: Rename X509Certificate::VerifyFlags to CertVerifier::VerifyFlags (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: One missed mac define Created 8 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/base/cert_verify_proc.cc ('k') | net/base/cert_verify_proc_nss.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/base/cert_verify_proc_mac.cc
diff --git a/net/base/cert_verify_proc_mac.cc b/net/base/cert_verify_proc_mac.cc
index 2cbffef8a23fa554e3710fa23acb144bdde3703b..76ac82fb58e82baa1c7cc8b1e5206e46dd6c98dd 100644
--- a/net/base/cert_verify_proc_mac.cc
+++ b/net/base/cert_verify_proc_mac.cc
@@ -17,6 +17,7 @@
#include "crypto/sha2.h"
#include "net/base/asn1_util.h"
#include "net/base/cert_status_flags.h"
+#include "net/base/cert_verifier.h"
#include "net/base/cert_verify_result.h"
#include "net/base/crl_set.h"
#include "net/base/net_errors.h"
@@ -156,8 +157,8 @@ OSStatus CreateTrustPolicies(const std::string& hostname,
// revocation checking policies and instead respect the application-level
// revocation preference.
status = x509_util::CreateRevocationPolicies(
- (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED),
- (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED_EV_ONLY),
+ (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED),
+ (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED_EV_ONLY),
local_policies);
if (status)
return status;
@@ -383,7 +384,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert,
// Note: For EV certificates, the Apple TP will handle setting these flags
// as part of EV evaluation.
- if (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED) {
+ if (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED) {
// Require a positive result from an OCSP responder or a CRL (or both)
// for every certificate in the chain. The Apple TP automatically
// excludes the self-signed root from this requirement. If a certificate
@@ -536,7 +537,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert,
if (IsCertStatusError(verify_result->cert_status))
return MapCertStatusToNetError(verify_result->cert_status);
- if (flags & X509Certificate::VERIFY_EV_CERT) {
+ if (flags & CertVerifier::VERIFY_EV_CERT) {
// Determine the certificate's EV status using SecTrustCopyExtendedResult(),
// which we need to look up because the function wasn't added until
// Mac OS X 10.5.7.
@@ -567,7 +568,7 @@ int CertVerifyProcMac::VerifyInternal(X509Certificate* cert,
if (CFDictionaryContainsKey(ev_dict,
kSecEVOrganizationName)) {
verify_result->cert_status |= CERT_STATUS_IS_EV;
- if (flags & X509Certificate::VERIFY_REV_CHECKING_ENABLED_EV_ONLY)
+ if (flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED_EV_ONLY)
verify_result->cert_status |= CERT_STATUS_REV_CHECKING_ENABLED;
}
}
« no previous file with comments | « net/base/cert_verify_proc.cc ('k') | net/base/cert_verify_proc_nss.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698