OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h" | 5 #include "chrome/browser/chromeos/net/cert_verify_proc_chromeos.h" |
6 | 6 |
7 #include <utility> | 7 #include <utility> |
8 | 8 |
9 #include "net/cert/test_root_certs.h" | 9 #include "net/cert/test_root_certs.h" |
10 #include "net/cert/x509_certificate.h" | 10 #include "net/cert/x509_certificate.h" |
(...skipping 22 matching lines...) Expand all Loading... |
33 crypto::ScopedPK11Slot public_slot) { | 33 crypto::ScopedPK11Slot public_slot) { |
34 // Only the software slot is passed, since that is the only one where user | 34 // Only the software slot is passed, since that is the only one where user |
35 // trust settings are stored. | 35 // trust settings are stored. |
36 profile_filter_.Init(std::move(public_slot), crypto::ScopedPK11Slot(), | 36 profile_filter_.Init(std::move(public_slot), crypto::ScopedPK11Slot(), |
37 crypto::ScopedPK11Slot()); | 37 crypto::ScopedPK11Slot()); |
38 } | 38 } |
39 | 39 |
40 CertVerifyProcChromeOS::~CertVerifyProcChromeOS() {} | 40 CertVerifyProcChromeOS::~CertVerifyProcChromeOS() {} |
41 | 41 |
42 int CertVerifyProcChromeOS::VerifyInternal( | 42 int CertVerifyProcChromeOS::VerifyInternal( |
| 43 as |
43 net::X509Certificate* cert, | 44 net::X509Certificate* cert, |
44 const std::string& hostname, | 45 const std::string& hostname, |
45 const std::string& ocsp_response, | 46 const std::string& ocsp_response, |
46 int flags, | 47 int flags, |
47 net::CRLSet* crl_set, | 48 net::CRLSet* crl_set, |
48 const net::CertificateList& additional_trust_anchors, | 49 const net::CertificateList& additional_trust_anchors, |
49 net::CertVerifyResult* verify_result) { | 50 net::CertVerifyResult* verify_result) { |
50 ChainVerifyArgs chain_verify_args = {this, additional_trust_anchors}; | 51 ChainVerifyArgs chain_verify_args = {this, additional_trust_anchors}; |
51 | 52 |
52 CERTChainVerifyCallback chain_verify_callback; | 53 CERTChainVerifyCallback chain_verify_callback; |
(...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
96 // properly when the same cert is in multiple slots, this would also need | 97 // properly when the same cert is in multiple slots, this would also need |
97 // updating to check the per-slot trust values. | 98 // updating to check the per-slot trust values. |
98 *chain_ok = args->cert_verify_proc->profile_filter_.IsCertAllowed(cert) | 99 *chain_ok = args->cert_verify_proc->profile_filter_.IsCertAllowed(cert) |
99 ? PR_TRUE | 100 ? PR_TRUE |
100 : PR_FALSE; | 101 : PR_FALSE; |
101 DVLOG(3) << cert->subjectName << " is " << (*chain_ok ? "ok" : "not ok"); | 102 DVLOG(3) << cert->subjectName << " is " << (*chain_ok ? "ok" : "not ok"); |
102 return SECSuccess; | 103 return SECSuccess; |
103 } | 104 } |
104 | 105 |
105 } // namespace chromeos | 106 } // namespace chromeos |
OLD | NEW |