| Index: net/ssl/ssl_info.cc
|
| diff --git a/net/ssl/ssl_info.cc b/net/ssl/ssl_info.cc
|
| index 545bf7ec6dfa449d342904d2c5a9301f48ed38c4..31c25a7a0cb91b99747661b248b0d808e61812fd 100644
|
| --- a/net/ssl/ssl_info.cc
|
| +++ b/net/ssl/ssl_info.cc
|
| @@ -36,8 +36,10 @@ SSLInfo& SSLInfo::operator=(const SSLInfo& info) {
|
| token_binding_key_param = info.token_binding_key_param;
|
| handshake_type = info.handshake_type;
|
| public_key_hashes = info.public_key_hashes;
|
| - signed_certificate_timestamps = info.signed_certificate_timestamps;
|
| pinning_failure_log = info.pinning_failure_log;
|
| + signed_certificate_timestamps = info.signed_certificate_timestamps;
|
| + ct_compliance_details_available = info.ct_compliance_details_available;
|
| + ct_ev_policy_compliance = info.ct_ev_policy_compliance;
|
|
|
| return *this;
|
| }
|
| @@ -56,15 +58,17 @@ void SSLInfo::Reset() {
|
| token_binding_key_param = TB_PARAM_ECDSAP256;
|
| handshake_type = HANDSHAKE_UNKNOWN;
|
| public_key_hashes.clear();
|
| - signed_certificate_timestamps.clear();
|
| pinning_failure_log.clear();
|
| + signed_certificate_timestamps.clear();
|
| + ct_compliance_details_available = false;
|
| + ct_ev_policy_compliance = ct::EV_POLICY_DOES_NOT_APPLY;
|
| }
|
|
|
| void SSLInfo::SetCertError(int error) {
|
| cert_status |= MapNetErrorToCertStatus(error);
|
| }
|
|
|
| -void SSLInfo::UpdateSignedCertificateTimestamps(
|
| +void SSLInfo::UpdateCertificateTransparencyInfo(
|
| const ct::CTVerifyResult& ct_verify_result) {
|
| for (const auto& sct : ct_verify_result.verified_scts) {
|
| signed_certificate_timestamps.push_back(
|
| @@ -78,6 +82,9 @@ void SSLInfo::UpdateSignedCertificateTimestamps(
|
| signed_certificate_timestamps.push_back(
|
| SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN));
|
| }
|
| +
|
| + ct_compliance_details_available = ct_verify_result.ct_policies_applied;
|
| + ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance;
|
| }
|
|
|
| } // namespace net
|
|
|