| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle | 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle |
| 6 // of operation is derived from SSLClientSocketNSS. | 6 // of operation is derived from SSLClientSocketNSS. |
| 7 | 7 |
| 8 #include "net/socket/ssl_client_socket_openssl.h" | 8 #include "net/socket/ssl_client_socket_openssl.h" |
| 9 | 9 |
| 10 #include <openssl/ssl.h> | 10 #include <openssl/ssl.h> |
| (...skipping 818 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 829 } | 829 } |
| 830 | 830 |
| 831 int flags = 0; | 831 int flags = 0; |
| 832 if (ssl_config_.rev_checking_enabled) | 832 if (ssl_config_.rev_checking_enabled) |
| 833 flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED; | 833 flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED; |
| 834 if (ssl_config_.verify_ev_cert) | 834 if (ssl_config_.verify_ev_cert) |
| 835 flags |= X509Certificate::VERIFY_EV_CERT; | 835 flags |= X509Certificate::VERIFY_EV_CERT; |
| 836 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); | 836 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); |
| 837 return verifier_->Verify( | 837 return verifier_->Verify( |
| 838 server_cert_, host_and_port_.host(), flags, | 838 server_cert_, host_and_port_.host(), flags, |
| 839 NULL /* no CRL set */, |
| 839 &server_cert_verify_result_, | 840 &server_cert_verify_result_, |
| 840 base::Bind(&SSLClientSocketOpenSSL::OnHandshakeIOComplete, | 841 base::Bind(&SSLClientSocketOpenSSL::OnHandshakeIOComplete, |
| 841 base::Unretained(this)), | 842 base::Unretained(this)), |
| 842 net_log_); | 843 net_log_); |
| 843 } | 844 } |
| 844 | 845 |
| 845 int SSLClientSocketOpenSSL::DoVerifyCertComplete(int result) { | 846 int SSLClientSocketOpenSSL::DoVerifyCertComplete(int result) { |
| 846 verifier_.reset(); | 847 verifier_.reset(); |
| 847 | 848 |
| 848 if (result == OK) { | 849 if (result == OK) { |
| (...skipping 368 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1217 net_log_.AddByteTransferEvent(NetLog::TYPE_SSL_SOCKET_BYTES_SENT, rv, | 1218 net_log_.AddByteTransferEvent(NetLog::TYPE_SSL_SOCKET_BYTES_SENT, rv, |
| 1218 user_write_buf_->data()); | 1219 user_write_buf_->data()); |
| 1219 return rv; | 1220 return rv; |
| 1220 } | 1221 } |
| 1221 | 1222 |
| 1222 int err = SSL_get_error(ssl_, rv); | 1223 int err = SSL_get_error(ssl_, rv); |
| 1223 return MapOpenSSLError(err, err_tracer); | 1224 return MapOpenSSLError(err, err_tracer); |
| 1224 } | 1225 } |
| 1225 | 1226 |
| 1226 } // namespace net | 1227 } // namespace net |
| OLD | NEW |