OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ | 5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ |
6 #define NET_CERT_CT_VERIFY_RESULT_H_ | 6 #define NET_CERT_CT_VERIFY_RESULT_H_ |
7 | 7 |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
| 10 #include "net/cert/ct_policy_enforcer.h" |
| 11 #include "net/cert/ct_policy_status.h" |
10 #include "net/cert/signed_certificate_timestamp.h" | 12 #include "net/cert/signed_certificate_timestamp.h" |
11 | 13 |
12 namespace net { | 14 namespace net { |
13 | 15 |
14 namespace ct { | 16 namespace ct { |
15 | 17 |
16 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; | 18 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; |
17 | 19 |
18 // Holds Signed Certificate Timestamps, depending on their verification results. | 20 // Holds Signed Certificate Timestamps, depending on their verification |
19 // More information could be tracked here about SCTs, but for the current UI | 21 // results, and information about CT policies that were applied on the |
20 // this categorization is enough. | 22 // connection. |
21 struct NET_EXPORT CTVerifyResult { | 23 struct NET_EXPORT CTVerifyResult { |
22 CTVerifyResult(); | 24 CTVerifyResult(); |
23 ~CTVerifyResult(); | 25 ~CTVerifyResult(); |
24 | 26 |
25 // SCTs from known logs where the signature verified correctly. | 27 // SCTs from known logs where the signature verified correctly. |
26 SCTList verified_scts; | 28 SCTList verified_scts; |
27 // SCTs from known logs where the signature failed to verify. | 29 // SCTs from known logs where the signature failed to verify. |
28 SCTList invalid_scts; | 30 SCTList invalid_scts; |
29 // SCTs from unknown logs and as such are unverifiable. | 31 // SCTs from unknown logs and as such are unverifiable. |
30 SCTList unknown_logs_scts; | 32 SCTList unknown_logs_scts; |
| 33 |
| 34 // True if any CT policies were applied on this connection. |
| 35 bool ct_policies_applied; |
| 36 // The result of evaluating whether the connection complies with the |
| 37 // EV CT policy. |
| 38 EVPolicyCompliance ev_policy_compliance; |
31 }; | 39 }; |
32 | 40 |
33 } // namespace ct | 41 } // namespace ct |
34 | 42 |
35 } // namespace net | 43 } // namespace net |
36 | 44 |
37 #endif // NET_CERT_CT_VERIFY_RESULT_H_ | 45 #endif // NET_CERT_CT_VERIFY_RESULT_H_ |
OLD | NEW |