| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_CERT_CERT_VERIFY_RESULT_H_ | 5 #ifndef NET_CERT_CERT_VERIFY_RESULT_H_ |
| 6 #define NET_CERT_CERT_VERIFY_RESULT_H_ | 6 #define NET_CERT_CERT_VERIFY_RESULT_H_ |
| 7 | 7 |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
| (...skipping 43 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 54 | 54 |
| 55 // Hash algorithms used by the certificate chain, excluding the trust | 55 // Hash algorithms used by the certificate chain, excluding the trust |
| 56 // anchor. | 56 // anchor. |
| 57 bool has_md2; | 57 bool has_md2; |
| 58 bool has_md4; | 58 bool has_md4; |
| 59 bool has_md5; | 59 bool has_md5; |
| 60 bool has_sha1; | 60 bool has_sha1; |
| 61 bool has_sha1_leaf; | 61 bool has_sha1_leaf; |
| 62 | 62 |
| 63 // If the certificate was successfully verified then this contains the | 63 // If the certificate was successfully verified then this contains the |
| 64 // hashes, in several hash algorithms, of the SubjectPublicKeyInfos of the | 64 // hashes for all of the SubjectPublicKeyInfos of the chain (target, |
| 65 // chain. | 65 // intermediates, and trust anchor) |
| 66 // |
| 67 // The ordering of the hashes in this vector is unspecified. Both the SHA1 |
| 68 // and SHA256 hash will be present for each certificate. |
| 66 HashValueVector public_key_hashes; | 69 HashValueVector public_key_hashes; |
| 67 | 70 |
| 68 // is_issued_by_known_root is true if we recognise the root CA as a standard | 71 // is_issued_by_known_root is true if we recognise the root CA as a standard |
| 69 // root. If it isn't then it's probably the case that this certificate was | 72 // root. If it isn't then it's probably the case that this certificate was |
| 70 // generated by a MITM proxy whose root has been installed locally. This is | 73 // generated by a MITM proxy whose root has been installed locally. This is |
| 71 // meaningless if the certificate was not trusted. | 74 // meaningless if the certificate was not trusted. |
| 72 bool is_issued_by_known_root; | 75 bool is_issued_by_known_root; |
| 73 | 76 |
| 74 // is_issued_by_additional_trust_anchor is true if the root CA used for this | 77 // is_issued_by_additional_trust_anchor is true if the root CA used for this |
| 75 // verification came from the list of additional trust anchors. | 78 // verification came from the list of additional trust anchors. |
| 76 bool is_issued_by_additional_trust_anchor; | 79 bool is_issued_by_additional_trust_anchor; |
| 77 | 80 |
| 78 // True if a fallback to the common name was used when matching the host | 81 // True if a fallback to the common name was used when matching the host |
| 79 // name, rather than using the subjectAltName. | 82 // name, rather than using the subjectAltName. |
| 80 bool common_name_fallback_used; | 83 bool common_name_fallback_used; |
| 81 | 84 |
| 82 // Verification of stapled OCSP response, if present. | 85 // Verification of stapled OCSP response, if present. |
| 83 OCSPVerifyResult ocsp_result; | 86 OCSPVerifyResult ocsp_result; |
| 84 }; | 87 }; |
| 85 | 88 |
| 86 } // namespace net | 89 } // namespace net |
| 87 | 90 |
| 88 #endif // NET_CERT_CERT_VERIFY_RESULT_H_ | 91 #endif // NET_CERT_CERT_VERIFY_RESULT_H_ |
| OLD | NEW |