Chromium Code Reviews| Index: net/cert/internal/trust_store.h |
| diff --git a/net/cert/internal/trust_store.h b/net/cert/internal/trust_store.h |
| index 383e83a54d681b7cd300af3d63b7d4f6b58fce9f..c06ed9d33ee380f015a887ca81381c5f3c6e7a72 100644 |
| --- a/net/cert/internal/trust_store.h |
| +++ b/net/cert/internal/trust_store.h |
| @@ -117,11 +117,19 @@ class NET_EXPORT TrustStore { |
| TrustStore(); |
| virtual ~TrustStore(); |
| - // Appends the trust anchors that match |cert|'s issuer name to |*matches|. |
| - // |cert| and |matches| must not be null. |
| - virtual void FindTrustAnchorsForCert( |
| - const scoped_refptr<ParsedCertificate>& cert, |
| - TrustAnchors* matches) const = 0; |
| + // Looks up candidate [1] issuers for |cert| in the trust store and appends |
| + // them to the provided out-parameters. |
| + // |
| + // [1] The identified trust anchors and itermediates are merely "candidates" |
|
mattm
2017/04/20 03:19:07
intermediates
|
| + // in that they may not pass certificate validation. However by some heuristic |
| + // (issuer key ID, issuer name) they look like matches. |
| + virtual void FindIssuers(const scoped_refptr<ParsedCertificate>& cert, |
| + TrustAnchors* trust_anchors, |
| + ParsedCertificateList* intermediates) const = 0; |
| + |
| + // Returns true if |cert| is actively distrusted by this trust store. |
| + virtual bool IsBlacklisted(const scoped_refptr<ParsedCertificate>& cert) const |
|
mattm
2017/04/20 03:19:07
If we still need to do a separate trust store chec
eroman
2017/04/20 18:20:11
I generally like that, however if we go that route
|
| + WARN_UNUSED_RESULT = 0; |
| private: |
| DISALLOW_COPY_AND_ASSIGN(TrustStore); |