summaryrefslogtreecommitdiffstats
path: root/net/cert/test_root_certs.h
Commit message (Collapse)AuthorAgeFilesLines
* Adding macro to enable changing SSL library (Part 1)svaldez2016-03-181-3/+3
| | | | | | | | | | | This changes the macro used to be USE_NSS_VERIFIER and modifies build files to no longer assume iOS is using NSS. BUG=591545 Review URL: https://codereview.chromium.org/1808963004 Cr-Commit-Position: refs/heads/master@{#382077}
* Switch to standard integer types in net/.Avi Drissman2015-12-201-0/+1
| | | | | | | | | BUG=488550 TBR=mmenke@chromium.org Review URL: https://codereview.chromium.org/1535363003 . Cr-Commit-Position: refs/heads/master@{#366297}
* Rename USE_NSS to USE_NSS_CERTS.davidben2015-04-171-4/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | USE_NSS is confusing because it's not actually the analog of USE_OPENSSL; it's the analog to USE_OPENSSL_CERTS. This is in preparation for the chimera build which will set USE_OPENSSL and USE_NSS(_CERTS). This CL was partially done automatically by the following command: git grep -l USE_NSS | xargs sed -i -e 's/defined(USE_NSS)/defined(USE_NSS_CERTS)/' The remaining were caught by the following command and fixed manually: git grep 'USE_NSS\([^_]\|$\)' Finally, the following command verified nothing in a separate repository was sensitive to this change: find . -name '*.cc' -o -name '*.h' | xargs grep 'USE_NSS\([^_]\|$\)' For now, the old name is still defined, but not used within Chromium. A follow-up CL will remove deprecated use_nss and USE_NSS #defines together which will then cause downstream churn. Though from a grep of known downstreams, the churn seems to be fairly minimal. The removal is split from this CL so that, if we need to revert, the CL to revert is small. TBR=pneubeck@chromium.org BUG=462040 Review URL: https://codereview.chromium.org/1082123003 Cr-Commit-Position: refs/heads/master@{#325710}
* Add crypto/wincrypt_shim.h wrapper header to resolve BoringSSL conflicts.davidben2014-10-301-1/+1
| | | | | | | | | | | | | wincrypt.h defines macros that conflict with BoringSSL. Introduce a crypto/wincrypt_shim.h wrapper header which #undefs those macros and instead #defines replacement ones. All Chromium headers should use this wrapper header. BUG=338884 Review URL: https://codereview.chromium.org/686883002 Cr-Commit-Position: refs/heads/master@{#301994}
* Introduce USE_OPENSSL_CERTS for certificate handling.haavardm@opera.com2014-03-281-4/+4
| | | | | | | | | | | | | | | | | | | | | | | See discussion at chromium issue 338885. When USE_OPENSSL_CERTS is defined, X509::OSCertHandle is now typedef'ed to struct X509*. When USE_OPENSSL is defined, USE_OPENSSL_CERTS will now be defined for linux and Android, while being off for Mac and Windows. This allows OpenSSL to be used while leaving certificate handling to the OS. OpenSSL cert verifying code will only be used on Linux. This patch does not change any default behavior. Bug=none Test=none Review URL: https://codereview.chromium.org/206453002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@260152 0039d316-1c4b-4281-b951-d872f2087c98
* NSS Cros multiprofile: trust roots added by a profile shouldn't apply to ↵mattm@chromium.org2014-02-081-2/+11
| | | | | | | | | | other profiles. BUG=218627 Review URL: https://codereview.chromium.org/137553004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@249928 0039d316-1c4b-4281-b951-d872f2087c98
* Set verify_result->is_issued_by_known_root correctly inwtc@chromium.org2013-12-181-2/+8
| | | | | | | | | | | | | | | | CertVerifyProcOpenSSL. Right now CertVerifyProcOpenSSL uses only the default root certs and the test root certs. So if a cert is not issued by a test root, consider it as being issued by a known root. R=rsleevi@chromium.org BUG=312754 TEST=net_unittests Review URL: https://codereview.chromium.org/115393005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@241444 0039d316-1c4b-4281-b951-d872f2087c98
* mac: Replace base::mac::ScopedCFTypeRef with base::ScopedCFTypeRef.thakis@chromium.org2013-06-241-1/+1
| | | | | | | | | | | | | | | | | This CL was created fully mechanically by running git grep -l base::mac::ScopedCFTypeRef | xargs sed -i -e 's/base::mac::ScopedCFTypeRef/base::ScopedCFTypeRef/g' git commit -a -m. git clang-format HEAD^ --style=Chromium git commit -a -m. git cl upload -t $TITLE BUG=251957 TBR=mark@chromium.org Review URL: https://codereview.chromium.org/16917011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@208245 0039d316-1c4b-4281-b951-d872f2087c98
* Work around GTE CyberTrust/Baltimore CyberTrust cross-signing issuesrsleevi@chromium.org2013-06-141-0/+7
| | | | | | | | | | | | | | | OS X's lack of robust support for cross-signed certificates, combined with the impending removal of the legacy GTE CyberTrust 1024-bit root in favour of the 2048-bit Baltimore CyberTrust Root, will soon cause issues for sites that need to use the cross-signed intermediate. Fix up the chain on the fly when dealing with such sites. BUG=236112 TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/14492003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@206274 0039d316-1c4b-4281-b951-d872f2087c98
* net: extract net/cert out of net/basephajdan.jr@chromium.org2013-03-291-0/+127
This introduces the following dependency of net/base on things outside: net/base/openssl_client_key_store.cc:#include "net/cert/x509_certificate.h" BUG=70818 Review URL: https://codereview.chromium.org/13006020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@191450 0039d316-1c4b-4281-b951-d872f2087c98