Chromium Code Reviews| Index: net/cert/ct_verify_result.h |
| diff --git a/net/cert/ct_verify_result.h b/net/cert/ct_verify_result.h |
| index ca163580d739be120956dad667d286db801e51d5..dd7c6cf30b11fcd2a7f6dffbfce583fecb821ba5 100644 |
| --- a/net/cert/ct_verify_result.h |
| +++ b/net/cert/ct_verify_result.h |
| @@ -7,8 +7,9 @@ |
| #include <vector> |
| +#include "net/base/net_export.h" |
| #include "net/cert/ct_policy_enforcer.h" |
| -#include "net/cert/signed_certificate_timestamp.h" |
| +#include "net/cert/signed_certificate_timestamp_and_status.h" |
| namespace net { |
| @@ -27,12 +28,8 @@ struct NET_EXPORT CTVerifyResult { |
| CTVerifyResult(const CTVerifyResult& other); |
| ~CTVerifyResult(); |
| - // SCTs from known logs where the signature verified correctly. |
| - SCTList verified_scts; |
| - // SCTs from known logs where the signature failed to verify. |
| - SCTList invalid_scts; |
| - // SCTs from unknown logs and as such are unverifiable. |
| - SCTList unknown_logs_scts; |
| + // All SCTs and their statuses |
| + SignedCertificateTimestampAndStatusList scts; |
| // True if any CT policies were applied on this connection. |
| bool ct_policies_applied; |
| @@ -44,6 +41,12 @@ struct NET_EXPORT CTVerifyResult { |
| EVPolicyCompliance ev_policy_compliance; |
| }; |
| +// Return a list of SCTs from |sct_and_status_list| whose status matches |
|
eroman
2016/08/10 19:00:40
Return --> Returns
Eran Messeri
2016/08/10 22:05:07
Done.
|
| +// |match_status|. |
| +SCTList NET_EXPORT SCTsMatchingStatus( |
| + const SignedCertificateTimestampAndStatusList& sct_and_status_list, |
| + SCTVerifyStatus match_status); |
| + |
| } // namespace ct |
| } // namespace net |