OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/api/gcd_private/privet_v3_context_getter.h" | 5 #include "chrome/browser/extensions/api/gcd_private/privet_v3_context_getter.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 #include "base/macros.h" | 8 #include "base/macros.h" |
9 #include "base/memory/ptr_util.h" | 9 #include "base/memory/ptr_util.h" |
10 #include "chrome/common/chrome_content_client.h" | 10 #include "chrome/common/chrome_content_client.h" |
(...skipping 11 matching lines...) Expand all Loading... |
22 // certificate. | 22 // certificate. |
23 class PrivetV3ContextGetter::CertVerifier : public net::CertVerifier { | 23 class PrivetV3ContextGetter::CertVerifier : public net::CertVerifier { |
24 public: | 24 public: |
25 CertVerifier() {} | 25 CertVerifier() {} |
26 | 26 |
27 int Verify(const RequestParams& params, | 27 int Verify(const RequestParams& params, |
28 net::CRLSet* crl_set, | 28 net::CRLSet* crl_set, |
29 net::CertVerifyResult* verify_result, | 29 net::CertVerifyResult* verify_result, |
30 const net::CompletionCallback& callback, | 30 const net::CompletionCallback& callback, |
31 std::unique_ptr<Request>* out_req, | 31 std::unique_ptr<Request>* out_req, |
32 const net::BoundNetLog& net_log) override { | 32 const net::NetLogWithSource& net_log) override { |
33 verify_result->Reset(); | 33 verify_result->Reset(); |
34 verify_result->verified_cert = params.certificate(); | 34 verify_result->verified_cert = params.certificate(); |
35 | 35 |
36 // Because no trust anchor checking is being performed, don't indicate that | 36 // Because no trust anchor checking is being performed, don't indicate that |
37 // it came from an OS-trusted root. | 37 // it came from an OS-trusted root. |
38 verify_result->is_issued_by_known_root = false; | 38 verify_result->is_issued_by_known_root = false; |
39 // Because no trust anchor checking is being performed, don't indicate that | 39 // Because no trust anchor checking is being performed, don't indicate that |
40 // it came from a supplemental trust anchor. | 40 // it came from a supplemental trust anchor. |
41 verify_result->is_issued_by_additional_trust_anchor = false; | 41 verify_result->is_issued_by_additional_trust_anchor = false; |
42 // Because no name checking is being performed, don't indicate that it the | 42 // Because no name checking is being performed, don't indicate that it the |
(...skipping 86 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
129 const net::SHA256HashValue& certificate_fingerprint) { | 129 const net::SHA256HashValue& certificate_fingerprint) { |
130 InitOnNetThread(); | 130 InitOnNetThread(); |
131 cert_verifier_->AddPairedHost(host, certificate_fingerprint); | 131 cert_verifier_->AddPairedHost(host, certificate_fingerprint); |
132 } | 132 } |
133 | 133 |
134 PrivetV3ContextGetter::~PrivetV3ContextGetter() { | 134 PrivetV3ContextGetter::~PrivetV3ContextGetter() { |
135 DCHECK(net_task_runner_->BelongsToCurrentThread()); | 135 DCHECK(net_task_runner_->BelongsToCurrentThread()); |
136 } | 136 } |
137 | 137 |
138 } // namespace extensions | 138 } // namespace extensions |
OLD | NEW |