Chromium Code Reviews| Index: net/cert/internal/parse_certificate.h |
| diff --git a/net/cert/internal/parse_certificate.h b/net/cert/internal/parse_certificate.h |
| index 72fa22038efec3061a6a0e692bdac87ce525ee4a..45cff8b9715a7f223e00eeee2bd279853c324426 100644 |
| --- a/net/cert/internal/parse_certificate.h |
| +++ b/net/cert/internal/parse_certificate.h |
| @@ -357,6 +357,13 @@ NET_EXPORT der::Input AdCaIssuersOid(); |
| // In dotted notation: 1.3.6.1.5.5.7.48.1 |
| NET_EXPORT der::Input AdOcspOid(); |
| +// From RFC 5280: |
| +// |
| +// id-ce-inhibitAnyPolicy OBJECT IDENTIFIER ::= { id-ce 54 } |
| +// |
| +// In dotted notation: 2.5.29.54 |
| +NET_EXPORT der::Input InhibitAnyPolicyOid(); |
| + |
| // Parses the Extensions sequence as defined by RFC 5280. Extensions are added |
| // to the map |extensions| keyed by the OID. Parsing guarantees that each OID |
| // is unique. Note that certificate verification must consume each extension |
| @@ -471,6 +478,11 @@ NET_EXPORT bool ParsePolicyConstraints(const der::Input& policy_constraints_tlv, |
| ParsedPolicyConstraints* out) |
| WARN_UNUSED_RESULT; |
| +// Parses an InhibitAnyPolicy as defined by RFC 5280. Returns true on success, |
| +// and sets |out|. |
| +NET_EXPORT bool ParseInhibitAnyPolicy(const der::Input& inhibit_any_policy_tlv, |
|
mattm
2017/05/10 20:11:31
same question as other CL: should these go in cert
eroman
2017/05/15 22:44:05
Done.
|
| + uint8_t* out) WARN_UNUSED_RESULT; |
| + |
| } // namespace net |
| #endif // NET_CERT_INTERNAL_PARSE_CERTIFICATE_H_ |