Index: net/cert/ct_verifier.h |
diff --git a/net/cert/ct_verifier.h b/net/cert/ct_verifier.h |
index 5a6868680c01b09dcab19fe368cb882f27f449a4..290a0474a649138733c902fdc5a8e47b6210f12d 100644 |
--- a/net/cert/ct_verifier.h |
+++ b/net/cert/ct_verifier.h |
@@ -21,12 +21,18 @@ class NET_EXPORT CTVerifier { |
public: |
virtual ~CTVerifier() {} |
- // Verifies either embedded SCTs or SCTs obtained via the |
- // signed_certificate_timestamp TLS extension or OCSP on the given |cert| |
- // |result| will be filled with these SCTs, divided into categories based on |
- // the verification result. |
+ // Verifies SCTs embedded in the certificate itself, SCTs embedded in a |
+ // stapled OCSP response, and SCTs obtained via the |
+ // signed_certificate_timestamp TLS extension on the given |cert|. |
+ // A certificate is permitted but not required to use multiple sources for |
+ // SCTs. It is expected that most certificates will use only one source |
+ // (embedding, TLS extension or OCSP stapling). If no stapled OCSP response |
+ // is available, |stapled_ocsp_response| should be an empty string. If no SCT |
+ // TLS extension was negotiated, |sct_list_from_tls_extension| should be an |
+ // empty string. |result| will be filled with the SCTs present, divided into |
+ // categories based on the verification result. |
virtual int Verify(X509Certificate* cert, |
- const std::string& sct_list_from_ocsp, |
+ const std::string& stapled_ocsp_response, |
const std::string& sct_list_from_tls_extension, |
ct::CTVerifyResult* result, |
const BoundNetLog& net_log) = 0; |