diff options
Diffstat (limited to 'chromium/net/cert/cert_verify_result.h')
-rw-r--r-- | chromium/net/cert/cert_verify_result.h | 69 |
1 files changed, 69 insertions, 0 deletions
diff --git a/chromium/net/cert/cert_verify_result.h b/chromium/net/cert/cert_verify_result.h new file mode 100644 index 00000000000..a00c03e4a24 --- /dev/null +++ b/chromium/net/cert/cert_verify_result.h @@ -0,0 +1,69 @@ +// Copyright (c) 2011 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef NET_CERT_CERT_VERIFY_RESULT_H_ +#define NET_CERT_CERT_VERIFY_RESULT_H_ + +#include <vector> + +#include "base/memory/ref_counted.h" +#include "net/base/net_export.h" +#include "net/cert/cert_status_flags.h" +#include "net/cert/x509_cert_types.h" + +namespace net { + +class X509Certificate; + +// The result of certificate verification. +class NET_EXPORT CertVerifyResult { + public: + CertVerifyResult(); + ~CertVerifyResult(); + + void Reset(); + + // Copies from |other| to |this|. + void CopyFrom(const CertVerifyResult& other) { + *this = other; + } + + // The certificate and chain that was constructed during verification. + // Note that the though the verified certificate will match the originally + // supplied certificate, the intermediate certificates stored within may + // be substantially different. In the event of a verification failure, this + // will contain the chain as supplied by the server. This may be NULL if + // running within the sandbox. + scoped_refptr<X509Certificate> verified_cert; + + // Bitmask of CERT_STATUS_* from net/base/cert_status_flags.h. Note that + // these status flags apply to the certificate chain returned in + // |verified_cert|, rather than the originally supplied certificate + // chain. + CertStatus cert_status; + + // Properties of the certificate chain. + bool has_md5; + bool has_md2; + bool has_md4; + + // If the certificate was successfully verified then this contains the + // hashes, in several hash algorithms, of the SubjectPublicKeyInfos of the + // chain. + HashValueVector public_key_hashes; + + // is_issued_by_known_root is true if we recognise the root CA as a standard + // root. If it isn't then it's probably the case that this certificate was + // generated by a MITM proxy whose root has been installed locally. This is + // meaningless if the certificate was not trusted. + bool is_issued_by_known_root; + + // is_issued_by_additional_trust_anchor is true if the root CA used for this + // verification came from the list of additional trust anchors. + bool is_issued_by_additional_trust_anchor; +}; + +} // namespace net + +#endif // NET_CERT_CERT_VERIFY_RESULT_H_ |