| Index: net/ssl/ssl_info.cc
|
| diff --git a/net/ssl/ssl_info.cc b/net/ssl/ssl_info.cc
|
| index 545bf7ec6dfa449d342904d2c5a9301f48ed38c4..aca1f438a5cd2e8b17e9e3136c88d6775bb4af5f 100644
|
| --- a/net/ssl/ssl_info.cc
|
| +++ b/net/ssl/ssl_info.cc
|
| @@ -6,6 +6,7 @@
|
|
|
| #include "base/pickle.h"
|
| #include "net/cert/cert_status_flags.h"
|
| +#include "net/cert/ct_policy_status.h"
|
| #include "net/cert/signed_certificate_timestamp.h"
|
| #include "net/cert/x509_certificate.h"
|
|
|
| @@ -36,8 +37,10 @@ SSLInfo& SSLInfo::operator=(const SSLInfo& info) {
|
| token_binding_key_param = info.token_binding_key_param;
|
| handshake_type = info.handshake_type;
|
| public_key_hashes = info.public_key_hashes;
|
| - signed_certificate_timestamps = info.signed_certificate_timestamps;
|
| pinning_failure_log = info.pinning_failure_log;
|
| + signed_certificate_timestamps = info.signed_certificate_timestamps;
|
| + ct_compliance_details_available = info.ct_compliance_details_available;
|
| + ct_ev_policy_compliance = info.ct_ev_policy_compliance;
|
|
|
| return *this;
|
| }
|
| @@ -56,15 +59,17 @@ void SSLInfo::Reset() {
|
| token_binding_key_param = TB_PARAM_ECDSAP256;
|
| handshake_type = HANDSHAKE_UNKNOWN;
|
| public_key_hashes.clear();
|
| - signed_certificate_timestamps.clear();
|
| pinning_failure_log.clear();
|
| + signed_certificate_timestamps.clear();
|
| + ct_compliance_details_available = false;
|
| + ct_ev_policy_compliance = ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY;
|
| }
|
|
|
| void SSLInfo::SetCertError(int error) {
|
| cert_status |= MapNetErrorToCertStatus(error);
|
| }
|
|
|
| -void SSLInfo::UpdateSignedCertificateTimestamps(
|
| +void SSLInfo::UpdateCertificateTransparencyInfo(
|
| const ct::CTVerifyResult& ct_verify_result) {
|
| for (const auto& sct : ct_verify_result.verified_scts) {
|
| signed_certificate_timestamps.push_back(
|
| @@ -78,6 +83,9 @@ void SSLInfo::UpdateSignedCertificateTimestamps(
|
| signed_certificate_timestamps.push_back(
|
| SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN));
|
| }
|
| +
|
| + ct_compliance_details_available = ct_verify_result.ct_policies_applied;
|
| + ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance;
|
| }
|
|
|
| } // namespace net
|
|
|