Index: net/base/net_log_event_type_list.h |
diff --git a/net/base/net_log_event_type_list.h b/net/base/net_log_event_type_list.h |
index 10d9c593b2f6b1376e5f7e13eb0c44fa044ba52f..ec44e73d78ff58237f05789d76dfa9373a40a6b7 100644 |
--- a/net/base/net_log_event_type_list.h |
+++ b/net/base/net_log_event_type_list.h |
@@ -1881,12 +1881,51 @@ EVENT_TYPE(CHROME_POLICY_ABORTED_REQUEST) |
EVENT_TYPE(CERT_VERIFIER_REQUEST) |
// This event is created when we start a CertVerifier job. |
+// The BEGIN phase event parameters are: |
+// { |
+// "certificates": <A list of PEM encoded certificates, the first one |
+// being the certificate to verify and the remaining |
+// being intermediate certificates to assist path |
+// building. Only present when byte logging is enabled.> |
+// } |
+// |
// The END phase event parameters are: |
// { |
-// "certificates": <A list of PEM encoded certificates, the first one |
-// being the certificate to verify and the remaining |
-// being intermediate certificates to assist path |
-// building. Only present when byte logging is enabled.> |
+// "cert_status": <Bitmask of CERT_STATUS_* |
+// from net/base/cert_status_flags.h> |
+// "common_name_fallback_used": <True if a fallback to the common name |
+// was used when matching the host |
+// name, rather than using the |
+// subjectAltName.> |
+// "has_md2": <True if a certificate in the certificate chain is signed with |
+// a MD2 signature.> |
+// "has_md4": <True if a certificate in the certificate chain is signed with |
+// a MD4 signature.> |
+// "has_md5": <True if a certificate in the certificate chain is signed with |
+// a MD5 signature.> |
+// "is_issued_by_additional_trust_anchor": <True if the root CA used for |
+// this verification came from the |
+// list of additional trust |
+// anchors.> |
+// "is_issued_by_known_root": <True if we recognise the root CA as a |
+// standard root. If it isn't then it's |
+// probably the case that this certificate |
+// was generated by a MITM proxy whose root |
+// has been installed locally. This is |
+// meaningless if the certificate was not |
+// trusted.> |
+// "public_key_hashes": <If the certificate was successfully verified then |
+// this contains the hashes, in several hash |
+// algorithms, of the SubjectPublicKeyInfos of the |
+// chain.> |
+// "verified_cert": <The certificate chain that was constructed |
+// during verification. Note that though the verified |
+// certificate will match the originally supplied |
+// certificate, the intermediate certificates stored |
+// within may be substantially different. In the event |
+// of a verification failure, this will contain the |
+// chain as supplied by the server. This may be NULL |
+// if running within the sandbox.> |
// } |
EVENT_TYPE(CERT_VERIFIER_JOB) |