Index: net/cert/multi_log_ct_verifier.cc |
diff --git a/net/cert/multi_log_ct_verifier.cc b/net/cert/multi_log_ct_verifier.cc |
index e88c21946bbe4404864f4f31fbfeb9e80c3a28ae..1727f7a72dc1cabed03196e973d436a8d44160d1 100644 |
--- a/net/cert/multi_log_ct_verifier.cc |
+++ b/net/cert/multi_log_ct_verifier.cc |
@@ -4,10 +4,14 @@ |
#include "net/cert/multi_log_ct_verifier.h" |
+#include "base/bind.h" |
+#include "base/callback_helpers.h" |
#include "net/base/net_errors.h" |
+#include "net/base/net_log.h" |
#include "net/cert/ct_log_verifier.h" |
#include "net/cert/ct_objects_extractor.h" |
#include "net/cert/ct_serialization.h" |
+#include "net/cert/ct_signed_certificate_timestamp_log_param.h" |
#include "net/cert/ct_verify_result.h" |
#include "net/cert/x509_certificate.h" |
@@ -30,7 +34,8 @@ int MultiLogCTVerifier::Verify( |
X509Certificate* cert, |
const std::string& sct_list_from_ocsp, |
const std::string& sct_list_from_tls_extension, |
- ct::CTVerifyResult* result) { |
+ ct::CTVerifyResult* result, |
+ const BoundNetLog& net_log) { |
DCHECK(cert); |
DCHECK(result); |
@@ -59,6 +64,16 @@ int MultiLogCTVerifier::Verify( |
result); |
} |
+ // Log to Net Log here, after extracting embedded SCTs but before |
+ // possibly failing on X.509 entry creation. |
+ NetLog::ParametersCallback net_log_callback = |
+ base::Bind(&NetLogRawSignedCertificateTimestampCallback, |
eroman
2013/11/27 20:39:55
[optional] I suggest inlining this into the AddEve
Eran M. (Google)
2013/11/27 22:08:50
With bound callbacks I find it slightly clearer to
|
+ &embedded_scts, &sct_list_from_ocsp, &sct_list_from_tls_extension); |
+ |
+ net_log.AddEvent( |
+ NetLog::TYPE_SSL_SIGNED_CERTIFICATE_TIMESTAMPS_RECEIVED, |
+ net_log_callback); |
+ |
ct::LogEntry x509_entry; |
if (!ct::GetX509LogEntry(cert->os_cert_handle(), &x509_entry)) |
return has_verified_scts ? OK : ERR_CT_LOG_ENTRY_CREATION_FAILED; |