| Index: net/cert/cert_policy_enforcer.h
|
| diff --git a/net/cert/cert_policy_enforcer.h b/net/cert/cert_policy_enforcer.h
|
| index 68039b3cd8c73976b558d0c8f76cee3e342901f7..5d6b64b06d6a2d732a947c110c0b01e32d34f696 100644
|
| --- a/net/cert/cert_policy_enforcer.h
|
| +++ b/net/cert/cert_policy_enforcer.h
|
| @@ -7,6 +7,7 @@
|
| #include <stddef.h>
|
|
|
| #include "net/base/net_export.h"
|
| +#include "net/base/net_log.h"
|
|
|
| namespace net {
|
|
|
| @@ -24,30 +25,23 @@ class X509Certificate;
|
| class NET_EXPORT CertPolicyEnforcer {
|
| public:
|
| // Set the parameters for this policy enforcer:
|
| - // |num_ct_logs| is the number of Certificate Transparency log currently
|
| - // known to Chrome.
|
| // |require_ct_for_ev| indicates whether Certificate Transparency presence
|
| // is required for EV certificates.
|
| - CertPolicyEnforcer(size_t num_ct_logs, bool require_ct_for_ev);
|
| + explicit CertPolicyEnforcer(bool require_ct_for_ev);
|
| virtual ~CertPolicyEnforcer();
|
|
|
| // Returns true if the collection of SCTs for the given certificate
|
| - // conforms with the CT/EV policy.
|
| + // conforms with the CT/EV policy. Conformance details are logged to
|
| + // |net_log|.
|
| // |cert| is the certificate for which the SCTs apply.
|
| // |ct_result| must contain the result of verifying any SCTs associated with
|
| // |cert| prior to invoking this method.
|
| bool DoesConformToCTEVPolicy(X509Certificate* cert,
|
| const ct::EVCertsWhitelist* ev_whitelist,
|
| - const ct::CTVerifyResult& ct_result);
|
| + const ct::CTVerifyResult& ct_result,
|
| + const BoundNetLog& net_log);
|
|
|
| private:
|
| - bool IsCertificateInWhitelist(X509Certificate* cert,
|
| - const ct::EVCertsWhitelist* ev_whitelist);
|
| -
|
| - bool HasRequiredNumberOfSCTs(X509Certificate* cert,
|
| - const ct::CTVerifyResult& ct_result);
|
| -
|
| - size_t num_ct_logs_;
|
| bool require_ct_for_ev_;
|
| };
|
|
|
|
|