| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 5 #ifndef NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
| 6 #define NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 6 #define NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
| 7 | 7 |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
| (...skipping 29 matching lines...) Expand all Loading... |
| 40 // | 40 // |
| 41 // cert_chain: | 41 // cert_chain: |
| 42 // A non-empty chain of N DER-encoded certificates, listed in the | 42 // A non-empty chain of N DER-encoded certificates, listed in the |
| 43 // "forward" direction. | 43 // "forward" direction. |
| 44 // | 44 // |
| 45 // * cert_chain[0] is the target certificate to verify. | 45 // * cert_chain[0] is the target certificate to verify. |
| 46 // * cert_chain[i+1] holds the certificate that issued cert_chain[i]. | 46 // * cert_chain[i+1] holds the certificate that issued cert_chain[i]. |
| 47 // * cert_chain[N-1] must be issued by the trust anchor. | 47 // * cert_chain[N-1] must be issued by the trust anchor. |
| 48 // | 48 // |
| 49 // trust_anchor: | 49 // trust_anchor: |
| 50 // Contains the trust anchor (root) used to verify the chain. Must be | 50 // Contains the trust anchor (root) used to verify the chain. Should be |
| 51 // non-null. | 51 // non-null (null is allowed however will result in a failure). |
| 52 // | 52 // |
| 53 // signature_policy: | 53 // signature_policy: |
| 54 // The policy to use when verifying signatures (what hash algorithms are | 54 // The policy to use when verifying signatures (what hash algorithms are |
| 55 // allowed, what length keys, what named curves, etc). | 55 // allowed, what length keys, what named curves, etc). |
| 56 // | 56 // |
| 57 // time: | 57 // time: |
| 58 // The UTC time to use for expiration checks. | 58 // The UTC time to use for expiration checks. |
| 59 // | 59 // |
| 60 // --------- | 60 // --------- |
| 61 // Outputs | 61 // Outputs |
| (...skipping 28 matching lines...) Expand all Loading... |
| 90 extern CertErrorType kKeyCertSignBitNotSet; | 90 extern CertErrorType kKeyCertSignBitNotSet; |
| 91 extern CertErrorType kMaxPathLengthViolated; | 91 extern CertErrorType kMaxPathLengthViolated; |
| 92 extern CertErrorType kBasicConstraintsIndicatesNotCa; | 92 extern CertErrorType kBasicConstraintsIndicatesNotCa; |
| 93 extern CertErrorType kMissingBasicConstraints; | 93 extern CertErrorType kMissingBasicConstraints; |
| 94 extern CertErrorType kNotPermittedByNameConstraints; | 94 extern CertErrorType kNotPermittedByNameConstraints; |
| 95 extern CertErrorType kSubjectDoesNotMatchIssuer; | 95 extern CertErrorType kSubjectDoesNotMatchIssuer; |
| 96 extern CertErrorType kSignatureVerificationFailed; | 96 extern CertErrorType kSignatureVerificationFailed; |
| 97 extern CertErrorType kValidityFailedNotAfter; | 97 extern CertErrorType kValidityFailedNotAfter; |
| 98 extern CertErrorType kValidityFailedNotBefore; | 98 extern CertErrorType kValidityFailedNotBefore; |
| 99 extern CertErrorType kSignatureAlgorithmsDifferentEncoding; | 99 extern CertErrorType kSignatureAlgorithmsDifferentEncoding; |
| 100 extern CertErrorType kNullTrustAnchor; |
| 100 | 101 |
| 101 } // namespace verify_certificate_chain_errors | 102 } // namespace verify_certificate_chain_errors |
| 102 | 103 |
| 103 } // namespace net | 104 } // namespace net |
| 104 | 105 |
| 105 #endif // NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 106 #endif // NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
| OLD | NEW |