| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/cert/multi_threaded_cert_verifier.h" | 5 #include "net/cert/multi_threaded_cert_verifier.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 75 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 86 results->SetBoolean("has_md5", verify_result.has_md5); | 86 results->SetBoolean("has_md5", verify_result.has_md5); |
| 87 results->SetBoolean("has_md2", verify_result.has_md2); | 87 results->SetBoolean("has_md2", verify_result.has_md2); |
| 88 results->SetBoolean("has_md4", verify_result.has_md4); | 88 results->SetBoolean("has_md4", verify_result.has_md4); |
| 89 results->SetBoolean("is_issued_by_known_root", | 89 results->SetBoolean("is_issued_by_known_root", |
| 90 verify_result.is_issued_by_known_root); | 90 verify_result.is_issued_by_known_root); |
| 91 results->SetBoolean("is_issued_by_additional_trust_anchor", | 91 results->SetBoolean("is_issued_by_additional_trust_anchor", |
| 92 verify_result.is_issued_by_additional_trust_anchor); | 92 verify_result.is_issued_by_additional_trust_anchor); |
| 93 results->SetBoolean("common_name_fallback_used", | 93 results->SetBoolean("common_name_fallback_used", |
| 94 verify_result.common_name_fallback_used); | 94 verify_result.common_name_fallback_used); |
| 95 results->SetInteger("cert_status", verify_result.cert_status); | 95 results->SetInteger("cert_status", verify_result.cert_status); |
| 96 results->Set( | 96 results->Set("verified_cert", |
| 97 "verified_cert", | 97 NetLogX509CertificateCallback(verify_result.verified_cert.get(), |
| 98 NetLogX509CertificateCallback(verify_result.verified_cert, log_level)); | 98 log_level)); |
| 99 | 99 |
| 100 base::ListValue* hashes = new base::ListValue(); | 100 base::ListValue* hashes = new base::ListValue(); |
| 101 for (std::vector<HashValue>::const_iterator it = | 101 for (std::vector<HashValue>::const_iterator it = |
| 102 verify_result.public_key_hashes.begin(); | 102 verify_result.public_key_hashes.begin(); |
| 103 it != verify_result.public_key_hashes.end(); | 103 it != verify_result.public_key_hashes.end(); |
| 104 ++it) { | 104 ++it) { |
| 105 hashes->AppendString(it->ToString()); | 105 hashes->AppendString(it->ToString()); |
| 106 } | 106 } |
| 107 results->Set("public_key_hashes", hashes); | 107 results->Set("public_key_hashes", hashes); |
| 108 | 108 |
| (...skipping 501 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 610 | 610 |
| 611 void MultiThreadedCertVerifier::OnCACertChanged( | 611 void MultiThreadedCertVerifier::OnCACertChanged( |
| 612 const X509Certificate* cert) { | 612 const X509Certificate* cert) { |
| 613 DCHECK(CalledOnValidThread()); | 613 DCHECK(CalledOnValidThread()); |
| 614 | 614 |
| 615 ClearCache(); | 615 ClearCache(); |
| 616 } | 616 } |
| 617 | 617 |
| 618 } // namespace net | 618 } // namespace net |
| 619 | 619 |
| OLD | NEW |