OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 5 #ifndef NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
6 #define NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 6 #define NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
7 | 7 |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
(...skipping 29 matching lines...) Expand all Loading... |
40 // | 40 // |
41 // cert_chain: | 41 // cert_chain: |
42 // A non-empty chain of N DER-encoded certificates, listed in the | 42 // A non-empty chain of N DER-encoded certificates, listed in the |
43 // "forward" direction. | 43 // "forward" direction. |
44 // | 44 // |
45 // * cert_chain[0] is the target certificate to verify. | 45 // * cert_chain[0] is the target certificate to verify. |
46 // * cert_chain[i+1] holds the certificate that issued cert_chain[i]. | 46 // * cert_chain[i+1] holds the certificate that issued cert_chain[i]. |
47 // * cert_chain[N-1] must be issued by the trust anchor. | 47 // * cert_chain[N-1] must be issued by the trust anchor. |
48 // | 48 // |
49 // trust_anchor: | 49 // trust_anchor: |
50 // Contains the trust anchor (root) used to verify the chain. Must be | 50 // Contains the trust anchor (root) used to verify the chain. Should be |
51 // non-null. | 51 // non-null (null is allowed however will result in a failure). |
52 // | 52 // |
53 // signature_policy: | 53 // signature_policy: |
54 // The policy to use when verifying signatures (what hash algorithms are | 54 // The policy to use when verifying signatures (what hash algorithms are |
55 // allowed, what length keys, what named curves, etc). | 55 // allowed, what length keys, what named curves, etc). |
56 // | 56 // |
57 // time: | 57 // time: |
58 // The UTC time to use for expiration checks. | 58 // The UTC time to use for expiration checks. |
59 // | 59 // |
60 // --------- | 60 // --------- |
61 // Outputs | 61 // Outputs |
(...skipping 28 matching lines...) Expand all Loading... |
90 extern CertErrorType kKeyCertSignBitNotSet; | 90 extern CertErrorType kKeyCertSignBitNotSet; |
91 extern CertErrorType kMaxPathLengthViolated; | 91 extern CertErrorType kMaxPathLengthViolated; |
92 extern CertErrorType kBasicConstraintsIndicatesNotCa; | 92 extern CertErrorType kBasicConstraintsIndicatesNotCa; |
93 extern CertErrorType kMissingBasicConstraints; | 93 extern CertErrorType kMissingBasicConstraints; |
94 extern CertErrorType kNotPermittedByNameConstraints; | 94 extern CertErrorType kNotPermittedByNameConstraints; |
95 extern CertErrorType kSubjectDoesNotMatchIssuer; | 95 extern CertErrorType kSubjectDoesNotMatchIssuer; |
96 extern CertErrorType kSignatureVerificationFailed; | 96 extern CertErrorType kSignatureVerificationFailed; |
97 extern CertErrorType kValidityFailedNotAfter; | 97 extern CertErrorType kValidityFailedNotAfter; |
98 extern CertErrorType kValidityFailedNotBefore; | 98 extern CertErrorType kValidityFailedNotBefore; |
99 extern CertErrorType kSignatureAlgorithmsDifferentEncoding; | 99 extern CertErrorType kSignatureAlgorithmsDifferentEncoding; |
| 100 extern CertErrorType kNullTrustAnchor; |
100 | 101 |
101 } // namespace verify_certificate_chain_errors | 102 } // namespace verify_certificate_chain_errors |
102 | 103 |
103 } // namespace net | 104 } // namespace net |
104 | 105 |
105 #endif // NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ | 106 #endif // NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_ |
OLD | NEW |