| Index: net/cert/ct_verify_result.h
|
| diff --git a/net/cert/ct_verify_result.h b/net/cert/ct_verify_result.h
|
| index aa90164193b0cdf9c532d5e13ba2994491348766..e434fb8f0231fbd6637b12497d048319c7de2c1c 100644
|
| --- a/net/cert/ct_verify_result.h
|
| +++ b/net/cert/ct_verify_result.h
|
| @@ -7,17 +7,20 @@
|
|
|
| #include <vector>
|
|
|
| +#include "net/cert/ct_policy_enforcer.h"
|
| #include "net/cert/signed_certificate_timestamp.h"
|
|
|
| namespace net {
|
|
|
| namespace ct {
|
|
|
| +enum class EVPolicyCompliance;
|
| +
|
| typedef std::vector<scoped_refptr<SignedCertificateTimestamp> > SCTList;
|
|
|
| -// Holds Signed Certificate Timestamps, depending on their verification results.
|
| -// More information could be tracked here about SCTs, but for the current UI
|
| -// this categorization is enough.
|
| +// Holds Signed Certificate Timestamps, depending on their verification
|
| +// results, and information about CT policies that were applied on the
|
| +// connection.
|
| struct NET_EXPORT CTVerifyResult {
|
| CTVerifyResult();
|
| ~CTVerifyResult();
|
| @@ -28,6 +31,12 @@ struct NET_EXPORT CTVerifyResult {
|
| SCTList invalid_scts;
|
| // SCTs from unknown logs and as such are unverifiable.
|
| SCTList unknown_logs_scts;
|
| +
|
| + // True if any CT policies were applied on this connection.
|
| + bool ct_policies_applied;
|
| + // The result of evaluating whether the connection complies with the
|
| + // EV CT policy.
|
| + EVPolicyCompliance ev_policy_compliance;
|
| };
|
|
|
| } // namespace ct
|
|
|