| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_CERT_CERT_VERIFY_PROC_H_ | 5 #ifndef NET_CERT_CERT_VERIFY_PROC_H_ |
| 6 #define NET_CERT_CERT_VERIFY_PROC_H_ | 6 #define NET_CERT_CERT_VERIFY_PROC_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| (...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 69 protected: | 69 protected: |
| 70 CertVerifyProc(); | 70 CertVerifyProc(); |
| 71 virtual ~CertVerifyProc(); | 71 virtual ~CertVerifyProc(); |
| 72 | 72 |
| 73 private: | 73 private: |
| 74 friend class base::RefCountedThreadSafe<CertVerifyProc>; | 74 friend class base::RefCountedThreadSafe<CertVerifyProc>; |
| 75 FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, DigiNotarCerts); | 75 FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, DigiNotarCerts); |
| 76 FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, TestHasTooLongValidity); | 76 FRIEND_TEST_ALL_PREFIXES(CertVerifyProcTest, TestHasTooLongValidity); |
| 77 | 77 |
| 78 // Performs the actual verification using the desired underlying | 78 // Performs the actual verification using the desired underlying |
| 79 // cryptographic library. | 79 // cryptographic library. On entry, |verify_result->verified_cert| |
| 80 // is set to |cert|, the unverified chain. If no chain is built, the |
| 81 // value must be left untouched. |
| 80 virtual int VerifyInternal(X509Certificate* cert, | 82 virtual int VerifyInternal(X509Certificate* cert, |
| 81 const std::string& hostname, | 83 const std::string& hostname, |
| 82 int flags, | 84 int flags, |
| 83 CRLSet* crl_set, | 85 CRLSet* crl_set, |
| 84 const CertificateList& additional_trust_anchors, | 86 const CertificateList& additional_trust_anchors, |
| 85 CertVerifyResult* verify_result) = 0; | 87 CertVerifyResult* verify_result) = 0; |
| 86 | 88 |
| 87 // Returns true if |cert| is explicitly blacklisted. | 89 // Returns true if |cert| is explicitly blacklisted. |
| 88 static bool IsBlacklisted(X509Certificate* cert); | 90 static bool IsBlacklisted(X509Certificate* cert); |
| 89 | 91 |
| (...skipping 21 matching lines...) Expand all Loading... |
| 111 // requirement they expire within 7 years after the effective date of the BRs | 113 // requirement they expire within 7 years after the effective date of the BRs |
| 112 // (i.e. by 1 July 2019). | 114 // (i.e. by 1 July 2019). |
| 113 static bool HasTooLongValidity(const X509Certificate& cert); | 115 static bool HasTooLongValidity(const X509Certificate& cert); |
| 114 | 116 |
| 115 DISALLOW_COPY_AND_ASSIGN(CertVerifyProc); | 117 DISALLOW_COPY_AND_ASSIGN(CertVerifyProc); |
| 116 }; | 118 }; |
| 117 | 119 |
| 118 } // namespace net | 120 } // namespace net |
| 119 | 121 |
| 120 #endif // NET_CERT_CERT_VERIFY_PROC_H_ | 122 #endif // NET_CERT_CERT_VERIFY_PROC_H_ |
| OLD | NEW |