OLD | NEW |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "remoting/protocol/jingle_session.h" | 5 #include "remoting/protocol/jingle_session.h" |
6 | 6 |
7 #include "base/message_loop.h" | 7 #include "base/message_loop.h" |
8 #include "base/rand_util.h" | 8 #include "base/rand_util.h" |
9 #include "crypto/hmac.h" | 9 #include "crypto/hmac.h" |
10 #include "crypto/rsa_private_key.h" | 10 #include "crypto/rsa_private_key.h" |
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
44 const char kVideoRtcpChannelName[] = "videortcp"; | 44 const char kVideoRtcpChannelName[] = "videortcp"; |
45 | 45 |
46 const int kMasterKeyLength = 16; | 46 const int kMasterKeyLength = 16; |
47 const int kChannelKeyLength = 16; | 47 const int kChannelKeyLength = 16; |
48 | 48 |
49 // Helper method to create a SSL client socket. | 49 // Helper method to create a SSL client socket. |
50 net::SSLClientSocket* CreateSSLClientSocket( | 50 net::SSLClientSocket* CreateSSLClientSocket( |
51 net::StreamSocket* socket, scoped_refptr<net::X509Certificate> cert, | 51 net::StreamSocket* socket, scoped_refptr<net::X509Certificate> cert, |
52 net::CertVerifier* cert_verifier) { | 52 net::CertVerifier* cert_verifier) { |
53 net::SSLConfig ssl_config; | 53 net::SSLConfig ssl_config; |
| 54 ssl_config.cached_info_enabled = false; |
54 ssl_config.false_start_enabled = false; | 55 ssl_config.false_start_enabled = false; |
55 ssl_config.ssl3_enabled = true; | 56 ssl_config.ssl3_enabled = true; |
56 ssl_config.tls1_enabled = true; | 57 ssl_config.tls1_enabled = true; |
57 | 58 |
58 // Certificate provided by the host doesn't need authority. | 59 // Certificate provided by the host doesn't need authority. |
59 net::SSLConfig::CertAndStatus cert_and_status; | 60 net::SSLConfig::CertAndStatus cert_and_status; |
60 cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID; | 61 cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID; |
61 cert_and_status.cert = cert; | 62 cert_and_status.cert = cert; |
62 ssl_config.allowed_bad_certs.push_back(cert_and_status); | 63 ssl_config.allowed_bad_certs.push_back(cert_and_status); |
63 | 64 |
(...skipping 547 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
611 | 612 |
612 state_ = new_state; | 613 state_ = new_state; |
613 if (!closed_ && state_change_callback_.get()) | 614 if (!closed_ && state_change_callback_.get()) |
614 state_change_callback_->Run(new_state); | 615 state_change_callback_->Run(new_state); |
615 } | 616 } |
616 } | 617 } |
617 | 618 |
618 } // namespace protocol | 619 } // namespace protocol |
619 | 620 |
620 } // namespace remoting | 621 } // namespace remoting |
OLD | NEW |