Index: net/base/cert_verify_result.h |
diff --git a/net/base/cert_verify_result.h b/net/base/cert_verify_result.h |
deleted file mode 100644 |
index 8758d017f8bbb40e1bf209b716ffea5cdfed7d00..0000000000000000000000000000000000000000 |
--- a/net/base/cert_verify_result.h |
+++ /dev/null |
@@ -1,66 +0,0 @@ |
-// Copyright (c) 2011 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef NET_BASE_CERT_VERIFY_RESULT_H_ |
-#define NET_BASE_CERT_VERIFY_RESULT_H_ |
- |
-#include <vector> |
- |
-#include "net/base/cert_status_flags.h" |
-#include "net/base/net_export.h" |
-#include "base/memory/ref_counted.h" |
-#include "net/base/x509_cert_types.h" |
- |
-namespace net { |
- |
-class X509Certificate; |
- |
-// The result of certificate verification. |
-class NET_EXPORT CertVerifyResult { |
- public: |
- CertVerifyResult(); |
- ~CertVerifyResult(); |
- |
- void Reset(); |
- |
- // The certificate and chain that was constructed during verification. |
- // Note that the though the verified certificate will match the originally |
- // supplied certificate, the intermediate certificates stored within may |
- // be substantially different. In the event of a verification failure, this |
- // will contain the chain as supplied by the server. This may be NULL if |
- // running within the sandbox. |
- scoped_refptr<X509Certificate> verified_cert; |
- |
- // Bitmask of CERT_STATUS_* from net/base/cert_status_flags.h. Note that |
- // these status flags apply to the certificate chain returned in |
- // |verified_cert|, rather than the originally supplied certificate |
- // chain. |
- CertStatus cert_status; |
- |
- // Properties of the certificate chain. |
- bool has_md5; |
- bool has_md2; |
- bool has_md4; |
- bool has_md5_ca; |
- bool has_md2_ca; |
- |
- // If the certificate was successfully verified then this contains the |
- // hashes, in several hash algorithms, of the SubjectPublicKeyInfos of the |
- // chain. |
- HashValueVector public_key_hashes; |
- |
- // is_issued_by_known_root is true if we recognise the root CA as a standard |
- // root. If it isn't then it's probably the case that this certificate was |
- // generated by a MITM proxy whose root has been installed locally. This is |
- // meaningless if the certificate was not trusted. |
- bool is_issued_by_known_root; |
- |
- // is_issued_by_additional_trust_anchor is true if the root CA used for this |
- // verification came from the list of additional trust anchors. |
- bool is_issued_by_additional_trust_anchor; |
-}; |
- |
-} // namespace net |
- |
-#endif // NET_BASE_CERT_VERIFY_RESULT_H_ |