Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(213)

Side by Side Diff: net/socket/ssl_client_socket_win.cc

Issue 8401024: Disable SPDY IP pooling for SSL connections with client authentication. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 9 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/socket/ssl_client_socket_win.h" 5 #include "net/socket/ssl_client_socket_win.h"
6 6
7 #include <schnlsp.h> 7 #include <schnlsp.h>
8 #include <map> 8 #include <map>
9 9
10 #include "base/bind.h" 10 #include "base/bind.h"
(...skipping 418 matching lines...) Expand 10 before | Expand all | Expand 10 after
429 void SSLClientSocketWin::GetSSLInfo(SSLInfo* ssl_info) { 429 void SSLClientSocketWin::GetSSLInfo(SSLInfo* ssl_info) {
430 ssl_info->Reset(); 430 ssl_info->Reset();
431 if (!server_cert_) 431 if (!server_cert_)
432 return; 432 return;
433 433
434 ssl_info->cert = server_cert_; 434 ssl_info->cert = server_cert_;
435 ssl_info->cert_status = server_cert_verify_result_.cert_status; 435 ssl_info->cert_status = server_cert_verify_result_.cert_status;
436 ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes; 436 ssl_info->public_key_hashes = server_cert_verify_result_.public_key_hashes;
437 ssl_info->is_issued_by_known_root = 437 ssl_info->is_issued_by_known_root =
438 server_cert_verify_result_.is_issued_by_known_root; 438 server_cert_verify_result_.is_issued_by_known_root;
439 ssl_info->client_cert_sent =
440 ssl_config_.send_client_cert && ssl_config_.client_cert;
439 SecPkgContext_ConnectionInfo connection_info; 441 SecPkgContext_ConnectionInfo connection_info;
440 SECURITY_STATUS status = QueryContextAttributes( 442 SECURITY_STATUS status = QueryContextAttributes(
441 &ctxt_, SECPKG_ATTR_CONNECTION_INFO, &connection_info); 443 &ctxt_, SECPKG_ATTR_CONNECTION_INFO, &connection_info);
442 if (status == SEC_E_OK) { 444 if (status == SEC_E_OK) {
443 // TODO(wtc): compute the overall security strength, taking into account 445 // TODO(wtc): compute the overall security strength, taking into account
444 // dwExchStrength and dwHashStrength. dwExchStrength needs to be 446 // dwExchStrength and dwHashStrength. dwExchStrength needs to be
445 // normalized. 447 // normalized.
446 ssl_info->security_bits = connection_info.dwCipherStrength; 448 ssl_info->security_bits = connection_info.dwCipherStrength;
447 } 449 }
448 // SecPkgContext_CipherInfo comes from CNG and is available on Vista or 450 // SecPkgContext_CipherInfo comes from CNG and is available on Vista or
(...skipping 1107 matching lines...) Expand 10 before | Expand all | Expand 10 after
1556 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA); 1558 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA);
1557 } 1559 }
1558 1560
1559 void SSLClientSocketWin::FreeSendBuffer() { 1561 void SSLClientSocketWin::FreeSendBuffer() {
1560 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer); 1562 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer);
1561 DCHECK(status == SEC_E_OK); 1563 DCHECK(status == SEC_E_OK);
1562 memset(&send_buffer_, 0, sizeof(send_buffer_)); 1564 memset(&send_buffer_, 0, sizeof(send_buffer_));
1563 } 1565 }
1564 1566
1565 } // namespace net 1567 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698