OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ | 5 #ifndef NET_CERT_CT_VERIFY_RESULT_H_ |
6 #define NET_CERT_CT_VERIFY_RESULT_H_ | 6 #define NET_CERT_CT_VERIFY_RESULT_H_ |
7 | 7 |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
| 10 #include "net/cert/ct_policy_enforcer.h" |
10 #include "net/cert/signed_certificate_timestamp.h" | 11 #include "net/cert/signed_certificate_timestamp.h" |
11 | 12 |
12 namespace net { | 13 namespace net { |
13 | 14 |
14 namespace ct { | 15 namespace ct { |
15 | 16 |
| 17 enum class EVPolicyCompliance; |
| 18 |
16 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; | 19 typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList; |
17 | 20 |
18 // Holds Signed Certificate Timestamps, depending on their verification results. | 21 // Holds Signed Certificate Timestamps, depending on their verification |
19 // More information could be tracked here about SCTs, but for the current UI | 22 // results, and information about CT policies that were applied on the |
20 // this categorization is enough. | 23 // connection. |
21 struct NET_EXPORT CTVerifyResult { | 24 struct NET_EXPORT CTVerifyResult { |
22 CTVerifyResult(); | 25 CTVerifyResult(); |
23 ~CTVerifyResult(); | 26 ~CTVerifyResult(); |
24 | 27 |
25 // SCTs from known logs where the signature verified correctly. | 28 // SCTs from known logs where the signature verified correctly. |
26 SCTList verified_scts; | 29 SCTList verified_scts; |
27 // SCTs from known logs where the signature failed to verify. | 30 // SCTs from known logs where the signature failed to verify. |
28 SCTList invalid_scts; | 31 SCTList invalid_scts; |
29 // SCTs from unknown logs and as such are unverifiable. | 32 // SCTs from unknown logs and as such are unverifiable. |
30 SCTList unknown_logs_scts; | 33 SCTList unknown_logs_scts; |
| 34 |
| 35 // True if any CT policies were applied on this connection. |
| 36 bool ct_policies_applied; |
| 37 // The result of evaluating whether the connection complies with the |
| 38 // EV CT policy. |
| 39 EVPolicyCompliance ev_policy_compliance; |
31 }; | 40 }; |
32 | 41 |
33 } // namespace ct | 42 } // namespace ct |
34 | 43 |
35 } // namespace net | 44 } // namespace net |
36 | 45 |
37 #endif // NET_CERT_CT_VERIFY_RESULT_H_ | 46 #endif // NET_CERT_CT_VERIFY_RESULT_H_ |
OLD | NEW |