Chromium Code Reviews| Index: net/cert/ocsp_verify_result.h |
| diff --git a/net/cert/ocsp_verify_result.h b/net/cert/ocsp_verify_result.h |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..1896602bbf46ee15653622abfabdd11cee680146 |
| --- /dev/null |
| +++ b/net/cert/ocsp_verify_result.h |
| @@ -0,0 +1,69 @@ |
| +// Copyright 2016 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#ifndef NET_CERT_OCSP_VERIFY_RESULT_H |
| +#define NET_CERT_OCSP_VERIFY_RESULT_H |
| + |
| +#include <string> |
| + |
| +#include "base/optional.h" |
| +#include "net/base/net_export.h" |
| +#include "net/cert/ocsp_revocation_status.h" |
| + |
| +namespace net { |
| + |
| +// The result of OCSP verification. This always contains a ResponseStatus, which |
| +// describes whether or not an OCSP response was provided, and response level |
| +// errors. It optionally contains an OCSPRevocationStatus when |response_status |
| +// = PROVIDED|. For example, a stapled OCSP response matching the certificate, |
| +// and indicating a non-revoked status, will have |response_status = PROVIDED| |
| +// and |revocation_status = GOOD|. This is populated as part of the certificate |
| +// verification process, and should not be modified at other layers. |
| +struct NET_EXPORT OCSPVerifyResult { |
| + OCSPVerifyResult(); |
| + OCSPVerifyResult(const OCSPVerifyResult&); |
| + ~OCSPVerifyResult(); |
| + |
| + void Reset(); |
|
Ryan Sleevi
2016/07/18 20:08:08
See remarks about Reset()
dadrian
2016/07/18 22:23:32
Removed.
|
| + |
| + enum ResponseStatus { |
| + // No OCSPResponse was stapled. |
| + MISSING, |
| + |
| + // An up-to-date OCSP response was stapled and matched the certificate. |
| + PROVIDED, |
| + |
| + // The stapled OCSP response did not have a SUCCESSFUL status. |
| + BAD_RESPONSE, |
| + |
| + // The OCSPResponseData field producedAt was outside the certificate |
| + // validity period. |
| + BAD_PRODUCED_AT, |
| + |
| + // At least one OCSPSingleResponse was stapled, but none matched the |
| + // certificate. |
| + NO_MATCHING_RESPONSE, |
| + |
| + // A matching OCSPSingleResponse was stapled, but was either expired or not |
| + // yet valid. |
| + INVALID_DATE, |
| + |
| + // The OCSPResponse structure could not be parsed. |
| + PARSE_RESPONSE, |
| + |
| + // The OCSPResponseData structure could not be parsed. |
| + PARSE_RESPONSE_DATA, |
| + |
| + }; |
| + |
| + ResponseStatus response_status; |
|
Ryan Sleevi
2016/07/18 20:08:08
From an API perspective, I'd argue that the C++11
dadrian
2016/07/18 22:23:32
Done.
|
| + |
| + // The strictest CertStatus matching the certificate (REVOKED > UNKNOWN > |
| + // GOOD). Only present if |response_status| = PROVIDED. |
| + base::Optional<OCSPRevocationStatus> revocation_status; |
|
svaldez
2016/07/16 08:51:53
I think there's some disagreement over whether we
Ryan Sleevi
2016/07/18 20:08:08
Aye, I'm a hater of it, because I've generally see
dadrian
2016/07/18 22:23:32
Works pretty well with no optional and just a valu
|
| +}; |
| + |
| +} // namespace net |
| + |
| +#endif // NET_CERT_OCSP_VERIFY_RESULT_H |