OLD | NEW |
| (Empty) |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #ifndef NET_CERT_INTERNAL_CERT_ISSUER_SOURCE_NSS_H_ | |
6 #define NET_CERT_INTERNAL_CERT_ISSUER_SOURCE_NSS_H_ | |
7 | |
8 #include "net/base/net_export.h" | |
9 #include "net/cert/internal/cert_issuer_source.h" | |
10 | |
11 namespace net { | |
12 | |
13 // Returns issuers from NSS. Always returns results synchronously. | |
14 // This will return any matches from NSS, possibly including trust anchors, | |
15 // blacklisted/distrusted certs, and temporary/cached certs. In the current | |
16 // implementation, trust is checked in a separate stage of path building, so | |
17 // including trusted certs here doesn't cause any issues. In particular, a trust | |
18 // anchor being returned here indicates the path ending in that trust anchor | |
19 // must already have been tested and failed to verify, and now the pathbuilder | |
20 // is trying to find a different path through that certificate. Including | |
21 // distrusted certs is desirable so that those paths can be built (and then fail | |
22 // to verify), leading to a better error message. | |
23 class NET_EXPORT CertIssuerSourceNSS : public CertIssuerSource { | |
24 public: | |
25 CertIssuerSourceNSS(); | |
26 ~CertIssuerSourceNSS() override; | |
27 | |
28 // CertIssuerSource implementation: | |
29 void SyncGetIssuersOf(const ParsedCertificate* cert, | |
30 ParsedCertificateList* issuers) override; | |
31 void AsyncGetIssuersOf(const ParsedCertificate* cert, | |
32 std::unique_ptr<Request>* out_req) override; | |
33 | |
34 private: | |
35 DISALLOW_COPY_AND_ASSIGN(CertIssuerSourceNSS); | |
36 }; | |
37 | |
38 } // namespace net | |
39 | |
40 #endif // NET_CERT_INTERNAL_CERT_ISSUER_SOURCE_NSS_H_ | |
OLD | NEW |