| OLD | NEW | 
|   1 // Copyright 2013 The Chromium Authors. All rights reserved. |   1 // Copyright 2013 The Chromium Authors. All rights reserved. | 
|   2 // Use of this source code is governed by a BSD-style license that can be |   2 // Use of this source code is governed by a BSD-style license that can be | 
|   3 // found in the LICENSE file. |   3 // found in the LICENSE file. | 
|   4  |   4  | 
|   5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ |   5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ | 
|   6 #define NET_CERT_CT_VERIFY_RESULT_H_ |   6 #define NET_CERT_CT_VERIFY_RESULT_H_ | 
|   7  |   7  | 
|   8 #include <vector> |   8 #include <vector> | 
|   9  |   9  | 
 |  10 #include "net/cert/ct_policy_enforcer.h" | 
|  10 #include "net/cert/signed_certificate_timestamp.h" |  11 #include "net/cert/signed_certificate_timestamp.h" | 
|  11  |  12  | 
|  12 namespace net { |  13 namespace net { | 
|  13  |  14  | 
|  14 namespace ct { |  15 namespace ct { | 
|  15  |  16  | 
 |  17 enum class EVPolicyCompliance; | 
 |  18  | 
|  16 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; |  19 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; | 
|  17  |  20  | 
|  18 // Holds Signed Certificate Timestamps, depending on their verification results. |  21 // Holds Signed Certificate Timestamps, depending on their verification | 
|  19 // More information could be tracked here about SCTs, but for the current UI |  22 // results, and information about CT policies that were applied on the | 
|  20 // this categorization is enough. |  23 // connection. | 
|  21 struct NET_EXPORT CTVerifyResult { |  24 struct NET_EXPORT CTVerifyResult { | 
|  22   CTVerifyResult(); |  25   CTVerifyResult(); | 
|  23   ~CTVerifyResult(); |  26   ~CTVerifyResult(); | 
|  24  |  27  | 
|  25   // SCTs from known logs where the signature verified correctly. |  28   // SCTs from known logs where the signature verified correctly. | 
|  26   SCTList verified_scts; |  29   SCTList verified_scts; | 
|  27   // SCTs from known logs where the signature failed to verify. |  30   // SCTs from known logs where the signature failed to verify. | 
|  28   SCTList invalid_scts; |  31   SCTList invalid_scts; | 
|  29   // SCTs from unknown logs and as such are unverifiable. |  32   // SCTs from unknown logs and as such are unverifiable. | 
|  30   SCTList unknown_logs_scts; |  33   SCTList unknown_logs_scts; | 
 |  34  | 
 |  35   // True if any CT policies were applied on this connection. | 
 |  36   bool ct_policies_applied; | 
 |  37   // The result of evaluating whether the connection complies with the | 
 |  38   // EV CT policy. | 
 |  39   EVPolicyCompliance ev_policy_compliance; | 
|  31 }; |  40 }; | 
|  32  |  41  | 
|  33 }  // namespace ct |  42 }  // namespace ct | 
|  34  |  43  | 
|  35 }  // namespace net |  44 }  // namespace net | 
|  36  |  45  | 
|  37 #endif  // NET_CERT_CT_VERIFY_RESULT_H_ |  46 #endif  // NET_CERT_CT_VERIFY_RESULT_H_ | 
| OLD | NEW |