Index: net/cert/internal/trust_store.h |
diff --git a/net/cert/internal/trust_store.h b/net/cert/internal/trust_store.h |
index 383e83a54d681b7cd300af3d63b7d4f6b58fce9f..c06ed9d33ee380f015a887ca81381c5f3c6e7a72 100644 |
--- a/net/cert/internal/trust_store.h |
+++ b/net/cert/internal/trust_store.h |
@@ -117,11 +117,19 @@ class NET_EXPORT TrustStore { |
TrustStore(); |
virtual ~TrustStore(); |
- // Appends the trust anchors that match |cert|'s issuer name to |*matches|. |
- // |cert| and |matches| must not be null. |
- virtual void FindTrustAnchorsForCert( |
- const scoped_refptr<ParsedCertificate>& cert, |
- TrustAnchors* matches) const = 0; |
+ // Looks up candidate [1] issuers for |cert| in the trust store and appends |
+ // them to the provided out-parameters. |
+ // |
+ // [1] The identified trust anchors and itermediates are merely "candidates" |
mattm
2017/04/20 03:19:07
intermediates
|
+ // in that they may not pass certificate validation. However by some heuristic |
+ // (issuer key ID, issuer name) they look like matches. |
+ virtual void FindIssuers(const scoped_refptr<ParsedCertificate>& cert, |
+ TrustAnchors* trust_anchors, |
+ ParsedCertificateList* intermediates) const = 0; |
+ |
+ // Returns true if |cert| is actively distrusted by this trust store. |
+ virtual bool IsBlacklisted(const scoped_refptr<ParsedCertificate>& cert) const |
mattm
2017/04/20 03:19:07
If we still need to do a separate trust store chec
eroman
2017/04/20 18:20:11
I generally like that, however if we go that route
|
+ WARN_UNUSED_RESULT = 0; |
private: |
DISALLOW_COPY_AND_ASSIGN(TrustStore); |