Index: net/cert/crl_set.h |
diff --git a/net/cert/crl_set.h b/net/cert/crl_set.h |
deleted file mode 100644 |
index 688e47cc737613e31dad3a482359a32b362b5f97..0000000000000000000000000000000000000000 |
--- a/net/cert/crl_set.h |
+++ /dev/null |
@@ -1,102 +0,0 @@ |
-// Copyright (c) 2012 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#ifndef NET_CERT_CRL_SET_H_ |
-#define NET_CERT_CRL_SET_H_ |
- |
-#include <string> |
-#include <utility> |
-#include <vector> |
- |
-#include "base/containers/hash_tables.h" |
-#include "base/memory/ref_counted.h" |
-#include "base/strings/string_piece.h" |
-#include "net/base/net_export.h" |
-#include "net/cert/x509_cert_types.h" |
- |
-namespace net { |
- |
-// A CRLSet is a structure that lists the serial numbers of revoked |
-// certificates from a number of issuers where issuers are identified by the |
-// SHA256 of their SubjectPublicKeyInfo. |
-// CRLSetStorage is responsible for creating CRLSet instances. |
-class NET_EXPORT CRLSet : public base::RefCountedThreadSafe<CRLSet> { |
- public: |
- enum Result { |
- REVOKED, // the certificate should be rejected. |
- UNKNOWN, // the CRL for the certificate is not included in the set. |
- GOOD, // the certificate is not listed. |
- }; |
- |
- // CheckSPKI checks whether the given SPKI has been listed as blocked. |
- // spki_hash: the SHA256 of the SubjectPublicKeyInfo of the certificate. |
- Result CheckSPKI(const base::StringPiece& spki_hash) const; |
- |
- // CheckSerial returns the information contained in the set for a given |
- // certificate: |
- // serial_number: the serial number of the certificate |
- // issuer_spki_hash: the SHA256 of the SubjectPublicKeyInfo of the CRL |
- // signer |
- Result CheckSerial( |
- const base::StringPiece& serial_number, |
- const base::StringPiece& issuer_spki_hash) const; |
- |
- // IsExpired returns true iff the current time is past the NotAfter time |
- // specified in the CRLSet. |
- bool IsExpired() const; |
- |
- // sequence returns the sequence number of this CRL set. CRL sets generated |
- // by the same source are given strictly monotonically increasing sequence |
- // numbers. |
- uint32 sequence() const; |
- |
- // CRLList contains a list of (issuer SPKI hash, revoked serial numbers) |
- // pairs. |
- typedef std::vector< std::pair<std::string, std::vector<std::string> > > |
- CRLList; |
- |
- // crls returns the internal state of this CRLSet. It should only be used in |
- // testing. |
- const CRLList& crls() const; |
- |
- // EmptyCRLSetForTesting returns a valid, but empty, CRLSet for unit tests. |
- static CRLSet* EmptyCRLSetForTesting(); |
- |
- // ExpiredCRLSetForTesting returns a expired, empty CRLSet for unit tests. |
- static CRLSet* ExpiredCRLSetForTesting(); |
- |
- // ForTesting returns a CRLSet for testing. If |is_expired| is true, calling |
- // IsExpired on the result will return true. If |issuer_spki| is not NULL, |
- // the CRLSet will cover certificates issued by that SPKI. If |serial_number| |
- // is not emtpy, then that big-endian serial number will be considered to |
- // have been revoked by |issuer_spki|. |
- static CRLSet* ForTesting(bool is_expired, |
- const SHA256HashValue* issuer_spki, |
- const std::string& serial_number); |
- |
- private: |
- CRLSet(); |
- ~CRLSet(); |
- |
- friend class base::RefCountedThreadSafe<CRLSet>; |
- friend class CRLSetStorage; |
- |
- uint32 sequence_; |
- CRLList crls_; |
- // not_after_ contains the time, in UNIX epoch seconds, after which the |
- // CRLSet should be considered stale, or 0 if no such time was given. |
- uint64 not_after_; |
- // crls_index_by_issuer_ maps from issuer SPKI hashes to the index in |crls_| |
- // where the information for that issuer can be found. We have both |crls_| |
- // and |crls_index_by_issuer_| because, when applying a delta update, we need |
- // to identify a CRL by index. |
- base::hash_map<std::string, size_t> crls_index_by_issuer_; |
- // blocked_spkis_ contains the SHA256 hashes of SPKIs which are to be blocked |
- // no matter where in a certificate chain they might appear. |
- std::vector<std::string> blocked_spkis_; |
-}; |
- |
-} // namespace net |
- |
-#endif // NET_CERT_CRL_SET_H_ |