| Index: net/cert/ct_verify_result.h
|
| diff --git a/net/cert/ct_verify_result.h b/net/cert/ct_verify_result.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..3547bff48c8c452ece81ec7cd7b98c5e0986cbc5
|
| --- /dev/null
|
| +++ b/net/cert/ct_verify_result.h
|
| @@ -0,0 +1,36 @@
|
| +// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef NET_CERT_CT_VERIFY_RESULT_H_
|
| +#define NET_CERT_CT_VERIFY_RESULT_H_
|
| +
|
| +#include <vector>
|
| +
|
| +#include "net/cert/signed_certificate_timestamp.h"
|
| +
|
| +namespace net {
|
| +
|
| +namespace ct {
|
| +
|
| +// XXX(rsleevi): Track more information for verified SCTs, such as each of
|
| +// the computed entry types (since both x509_cert and pre_cert are valid entry
|
| +// types during verification), as well as their respective Merkle leaf hashes
|
| +// for gossip protocol.
|
| +//
|
| +// For now, it's sufficient to leave this as something minimal, since it is
|
| +// not presently surfaced to users.
|
| +struct NET_EXPORT CTVerifyResult {
|
| + CTVerifyResult();
|
| + ~CTVerifyResult();
|
| +
|
| + std::vector<SignedCertificateTimestamp> verified_scts;
|
| + std::vector<SignedCertificateTimestamp> unverified_scts;
|
| + std::vector<SignedCertificateTimestamp> unknown_logs_scts;
|
| +};
|
| +
|
| +} // namespace ct
|
| +
|
| +} // namespace net
|
| +
|
| +#endif // NET_CERT_CT_VERIFY_RESULT_H_
|
|
|