Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(158)

Unified Diff: net/cert/cert_policy_enforcer.h

Issue 782333002: Certificate Transparency: Adding finch and NetLog logging for EV certs (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Addressing review comments Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/cert_policy_enforcer.h
diff --git a/net/cert/cert_policy_enforcer.h b/net/cert/cert_policy_enforcer.h
index 68039b3cd8c73976b558d0c8f76cee3e342901f7..200960fcdd8586a9b05f03d33bf60f3fad6b0936 100644
--- a/net/cert/cert_policy_enforcer.h
+++ b/net/cert/cert_policy_enforcer.h
@@ -7,6 +7,7 @@
#include <stddef.h>
#include "net/base/net_export.h"
+#include "net/base/net_log.h"
namespace net {
@@ -32,13 +33,15 @@ class NET_EXPORT CertPolicyEnforcer {
virtual ~CertPolicyEnforcer();
// Returns true if the collection of SCTs for the given certificate
- // conforms with the CT/EV policy.
+ // conforms with the CT/EV policy. If it is non-conforming, the certificate
+ // is logged to |net_log|.
// |cert| is the certificate for which the SCTs apply.
// |ct_result| must contain the result of verifying any SCTs associated with
// |cert| prior to invoking this method.
bool DoesConformToCTEVPolicy(X509Certificate* cert,
const ct::EVCertsWhitelist* ev_whitelist,
- const ct::CTVerifyResult& ct_result);
+ const ct::CTVerifyResult& ct_result,
+ const BoundNetLog& net_log);
private:
bool IsCertificateInWhitelist(X509Certificate* cert,

Powered by Google App Engine
This is Rietveld 408576698