| Index: net/cert/cert_verify_proc_whitelist.h | 
| diff --git a/net/cert/cert_verify_proc_whitelist.h b/net/cert/cert_verify_proc_whitelist.h | 
| index 6456320150fed48bdcb6e5b8825be4883aef75d0..2c7dfd5bda19d1d1e50e3663d7643c903824326b 100644 | 
| --- a/net/cert/cert_verify_proc_whitelist.h | 
| +++ b/net/cert/cert_verify_proc_whitelist.h | 
| @@ -8,6 +8,7 @@ | 
| #include <stddef.h> | 
| #include <stdint.h> | 
|  | 
| +#include "base/strings/string_piece.h" | 
| #include "crypto/sha2.h" | 
| #include "net/base/hash_value.h" | 
| #include "net/base/net_export.h" | 
| @@ -22,10 +23,19 @@ class X509Certificate; | 
| // unconstrained CA or if it was in the whitelist for that | 
| // CA. | 
| // |cert| should be the verified certificate chain, with |public_key_hashes| | 
| -// being the set of hashes of the SPKIs within the verified chain. | 
| +// being the set of hashes of the SPKIs within the verified chain, and | 
| +// |hostname| as the GURL-normalized hostname. | 
| bool NET_EXPORT_PRIVATE | 
| IsNonWhitelistedCertificate(const X509Certificate& cert, | 
| -                            const HashValueVector& public_key_hashes); | 
| +                            const HashValueVector& public_key_hashes, | 
| +                            base::StringPiece hostname); | 
| + | 
| +// Returns true if |host| is in (or a subdomain of) a whitelisted host | 
| +// in |graph|, which is a DAFSA constructed by | 
| +// //net/tools/dafsa/make_dafsa.py that is |graph_length| bytes long. | 
| +bool NET_EXPORT_PRIVATE IsWhitelistedHost(const unsigned char* graph, | 
| +                                          size_t graph_length, | 
| +                                          base::StringPiece host); | 
|  | 
| }  // namespace net | 
|  | 
|  |