Index: net/cert/cert_policy_enforcer.h |
diff --git a/net/cert/cert_policy_enforcer.h b/net/cert/cert_policy_enforcer.h |
index 68039b3cd8c73976b558d0c8f76cee3e342901f7..5d6b64b06d6a2d732a947c110c0b01e32d34f696 100644 |
--- a/net/cert/cert_policy_enforcer.h |
+++ b/net/cert/cert_policy_enforcer.h |
@@ -7,6 +7,7 @@ |
#include <stddef.h> |
#include "net/base/net_export.h" |
+#include "net/base/net_log.h" |
namespace net { |
@@ -24,30 +25,23 @@ class X509Certificate; |
class NET_EXPORT CertPolicyEnforcer { |
public: |
// Set the parameters for this policy enforcer: |
- // |num_ct_logs| is the number of Certificate Transparency log currently |
- // known to Chrome. |
// |require_ct_for_ev| indicates whether Certificate Transparency presence |
// is required for EV certificates. |
- CertPolicyEnforcer(size_t num_ct_logs, bool require_ct_for_ev); |
+ explicit CertPolicyEnforcer(bool require_ct_for_ev); |
virtual ~CertPolicyEnforcer(); |
// Returns true if the collection of SCTs for the given certificate |
- // conforms with the CT/EV policy. |
+ // conforms with the CT/EV policy. Conformance details are logged to |
+ // |net_log|. |
// |cert| is the certificate for which the SCTs apply. |
// |ct_result| must contain the result of verifying any SCTs associated with |
// |cert| prior to invoking this method. |
bool DoesConformToCTEVPolicy(X509Certificate* cert, |
const ct::EVCertsWhitelist* ev_whitelist, |
- const ct::CTVerifyResult& ct_result); |
+ const ct::CTVerifyResult& ct_result, |
+ const BoundNetLog& net_log); |
private: |
- bool IsCertificateInWhitelist(X509Certificate* cert, |
- const ct::EVCertsWhitelist* ev_whitelist); |
- |
- bool HasRequiredNumberOfSCTs(X509Certificate* cert, |
- const ct::CTVerifyResult& ct_result); |
- |
- size_t num_ct_logs_; |
bool require_ct_for_ev_; |
}; |