Index: net/http/transport_security_state.h |
diff --git a/net/http/transport_security_state.h b/net/http/transport_security_state.h |
index e469d70aabe51a71fc24244ae3e7bb2c30cc51fa..3dcd829bf0a1e5dadd1c8b3ad3845aa12149f783 100644 |
--- a/net/http/transport_security_state.h |
+++ b/net/http/transport_security_state.h |
@@ -508,14 +508,16 @@ class NET_EXPORT TransportSecurityState |
const HostPortPair& host_port_pair, |
const SSLInfo& ssl_info); |
- // Parses |value| as a Expect CT header value and sends an Expect CT |
- // report for |host_port_pair| if the following conditions are true: |
- // 1. The header value is "preload", indicating that the site wants to |
- // be opted in to Expect CT. |
- // 2. The given host is present on the Expect CT preload list with a |
- // valid report-uri, and the build is timely (i.e. preload list is fresh). |
- // 3. |ssl_info| indicates that the connection violated the Expect CT policy. |
- // 4. An Expect CT reporter has been provided with SetExpectCTReporter(). |
+ // Parses |value| as a Expect CT header value. If valid and served on a |
+ // CT-compliant connection, adds an entry to the dynamic state. If valid but |
+ // not served on a CT-compliant connection, a report is sent to alert the site |
+ // owner of the misconfiguration (provided that a reporter has been set via |
+ // SetExpectCTReporter). |
+ // |
+ // The header can also have the value "preload", indicating that the site |
+ // wants to opt-in to the static report-only version of Expect-CT. If the |
+ // given host is present on the preload list and the build is timely and the |
+ // connection is not CT-compliant, then a report will be sent. |
void ProcessExpectCTHeader(const std::string& value, |
const HostPortPair& host_port_pair, |
const SSLInfo& ssl_info); |