| Index: extensions/browser/verified_contents.h
|
| diff --git a/extensions/browser/verified_contents.h b/extensions/browser/verified_contents.h
|
| index 38265e51ddb7ccd9aaded4729bfeddc3b1f1191a..9d0924a67ec1ddf2c972a545cf3a2124104895b8 100644
|
| --- a/extensions/browser/verified_contents.h
|
| +++ b/extensions/browser/verified_contents.h
|
| @@ -29,10 +29,7 @@ class VerifiedContents {
|
|
|
| // Returns true if we successfully parsed the verified_contents.json file at
|
| // |path| and validated the enclosed signature. The
|
| - // |ignore_invalid_signature| argument can be set to make this still succeed
|
| - // if the contents of the file were parsed successfully but the signature did
|
| - // not validate. (Use with caution!)
|
| - bool InitFrom(const base::FilePath& path, bool ignore_invalid_signature);
|
| + bool InitFrom(const base::FilePath& path);
|
|
|
| int block_size() const { return block_size_; }
|
| const std::string& extension_id() const { return extension_id_; }
|
| @@ -49,10 +46,8 @@ class VerifiedContents {
|
|
|
| private:
|
| // Returns the base64url-decoded "payload" field from the json at |path|, if
|
| - // the signature was valid (or ignore_invalid_signature was set to true).
|
| - bool GetPayload(const base::FilePath& path,
|
| - std::string* payload,
|
| - bool ignore_invalid_signature);
|
| + // the signature was valid.
|
| + bool GetPayload(const base::FilePath& path, std::string* payload);
|
|
|
| // The |protected_value| and |payload| arguments should be base64url encoded
|
| // strings, and |signature_bytes| should be a byte array. See comments in the
|
|
|