Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(211)

Side by Side Diff: net/cert/cert_verify_result.h

Issue 2016143002: Expose when PKP is bypassed in SSLInfo. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: optional nits Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | net/cert/cert_verify_result.cc » ('j') | net/http/transport_security_state.cc » ('J')
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_CERT_CERT_VERIFY_RESULT_H_ 5 #ifndef NET_CERT_CERT_VERIFY_RESULT_H_
6 #define NET_CERT_CERT_VERIFY_RESULT_H_ 6 #define NET_CERT_CERT_VERIFY_RESULT_H_
7 7
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/memory/ref_counted.h" 10 #include "base/memory/ref_counted.h"
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after
62 // meaningless if the certificate was not trusted. 62 // meaningless if the certificate was not trusted.
63 bool is_issued_by_known_root; 63 bool is_issued_by_known_root;
64 64
65 // is_issued_by_additional_trust_anchor is true if the root CA used for this 65 // is_issued_by_additional_trust_anchor is true if the root CA used for this
66 // verification came from the list of additional trust anchors. 66 // verification came from the list of additional trust anchors.
67 bool is_issued_by_additional_trust_anchor; 67 bool is_issued_by_additional_trust_anchor;
68 68
69 // True if a fallback to the common name was used when matching the host 69 // True if a fallback to the common name was used when matching the host
70 // name, rather than using the subjectAltName. 70 // name, rather than using the subjectAltName.
71 bool common_name_fallback_used; 71 bool common_name_fallback_used;
72
73 // True if PKP was bypassed for this certificate.
74 bool pkp_bypassed;
Ryan Sleevi 2016/06/09 19:17:32 I believe this is a layering violation - the CertV
estark 2016/06/09 19:26:41 That's only sort of true. The CertVerifier carries
72 }; 75 };
73 76
74 } // namespace net 77 } // namespace net
75 78
76 #endif // NET_CERT_CERT_VERIFY_RESULT_H_ 79 #endif // NET_CERT_CERT_VERIFY_RESULT_H_
OLDNEW
« no previous file with comments | « no previous file | net/cert/cert_verify_result.cc » ('j') | net/http/transport_security_state.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698