| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/ssl/ssl_info.h" | 5 #include "net/ssl/ssl_info.h" |
| 6 | 6 |
| 7 #include "base/pickle.h" | 7 #include "base/pickle.h" |
| 8 #include "net/cert/cert_status_flags.h" | 8 #include "net/cert/cert_status_flags.h" |
| 9 #include "net/cert/ct_policy_status.h" | 9 #include "net/cert/ct_policy_status.h" |
| 10 #include "net/cert/signed_certificate_timestamp.h" | 10 #include "net/cert/signed_certificate_timestamp.h" |
| (...skipping 59 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 70 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; | 70 ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
| 71 ocsp_result = OCSPVerifyResult(); | 71 ocsp_result = OCSPVerifyResult(); |
| 72 } | 72 } |
| 73 | 73 |
| 74 void SSLInfo::SetCertError(int error) { | 74 void SSLInfo::SetCertError(int error) { |
| 75 cert_status |= MapNetErrorToCertStatus(error); | 75 cert_status |= MapNetErrorToCertStatus(error); |
| 76 } | 76 } |
| 77 | 77 |
| 78 void SSLInfo::UpdateCertificateTransparencyInfo( | 78 void SSLInfo::UpdateCertificateTransparencyInfo( |
| 79 const ct::CTVerifyResult& ct_verify_result) { | 79 const ct::CTVerifyResult& ct_verify_result) { |
| 80 for (const auto& sct : ct_verify_result.verified_scts) { | 80 signed_certificate_timestamps.insert(signed_certificate_timestamps.end(), |
| 81 signed_certificate_timestamps.push_back( | 81 ct_verify_result.scts.begin(), |
| 82 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_OK)); | 82 ct_verify_result.scts.end()); |
| 83 } | |
| 84 for (const auto& sct : ct_verify_result.invalid_scts) { | |
| 85 signed_certificate_timestamps.push_back( | |
| 86 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_INVALID)); | |
| 87 } | |
| 88 for (const auto& sct : ct_verify_result.unknown_logs_scts) { | |
| 89 signed_certificate_timestamps.push_back( | |
| 90 SignedCertificateTimestampAndStatus(sct, ct::SCT_STATUS_LOG_UNKNOWN)); | |
| 91 } | |
| 92 | 83 |
| 93 ct_compliance_details_available = ct_verify_result.ct_policies_applied; | 84 ct_compliance_details_available = ct_verify_result.ct_policies_applied; |
| 94 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance; | 85 ct_cert_policy_compliance = ct_verify_result.cert_policy_compliance; |
| 95 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance; | 86 ct_ev_policy_compliance = ct_verify_result.ev_policy_compliance; |
| 96 } | 87 } |
| 97 | 88 |
| 98 } // namespace net | 89 } // namespace net |
| OLD | NEW |