Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(235)

Side by Side Diff: net/socket/ssl_client_socket_win.cc

Issue 8342054: net: enable CRL sets behind a command line flag. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: ... Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/socket/ssl_host_info.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/socket/ssl_client_socket_win.h" 5 #include "net/socket/ssl_client_socket_win.h"
6 6
7 #include <schnlsp.h> 7 #include <schnlsp.h>
8 #include <map> 8 #include <map>
9 9
10 #include "base/bind.h" 10 #include "base/bind.h"
(...skipping 1157 matching lines...) Expand 10 before | Expand all | Expand 10 after
1168 } 1168 }
1169 1169
1170 int flags = 0; 1170 int flags = 0;
1171 if (ssl_config_.rev_checking_enabled) 1171 if (ssl_config_.rev_checking_enabled)
1172 flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED; 1172 flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED;
1173 if (ssl_config_.verify_ev_cert) 1173 if (ssl_config_.verify_ev_cert)
1174 flags |= X509Certificate::VERIFY_EV_CERT; 1174 flags |= X509Certificate::VERIFY_EV_CERT;
1175 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); 1175 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_));
1176 return verifier_->Verify( 1176 return verifier_->Verify(
1177 server_cert_, host_and_port_.host(), flags, 1177 server_cert_, host_and_port_.host(), flags,
1178 NULL /* no CRL set */,
1178 &server_cert_verify_result_, 1179 &server_cert_verify_result_,
1179 base::Bind(&SSLClientSocketWin::OnHandshakeIOComplete, 1180 base::Bind(&SSLClientSocketWin::OnHandshakeIOComplete,
1180 base::Unretained(this)), 1181 base::Unretained(this)),
1181 net_log_); 1182 net_log_);
1182 } 1183 }
1183 1184
1184 int SSLClientSocketWin::DoVerifyCertComplete(int result) { 1185 int SSLClientSocketWin::DoVerifyCertComplete(int result) {
1185 DCHECK(verifier_.get()); 1186 DCHECK(verifier_.get());
1186 verifier_.reset(); 1187 verifier_.reset();
1187 1188
(...skipping 367 matching lines...) Expand 10 before | Expand all | Expand 10 after
1555 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA); 1556 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA);
1556 } 1557 }
1557 1558
1558 void SSLClientSocketWin::FreeSendBuffer() { 1559 void SSLClientSocketWin::FreeSendBuffer() {
1559 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer); 1560 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer);
1560 DCHECK(status == SEC_E_OK); 1561 DCHECK(status == SEC_E_OK);
1561 memset(&send_buffer_, 0, sizeof(send_buffer_)); 1562 memset(&send_buffer_, 0, sizeof(send_buffer_));
1562 } 1563 }
1563 1564
1564 } // namespace net 1565 } // namespace net
OLDNEW
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/socket/ssl_host_info.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698