Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/ssl_client_socket_win.h" | 5 #include "net/socket/ssl_client_socket_win.h" |
| 6 | 6 |
| 7 #include <schnlsp.h> | 7 #include <schnlsp.h> |
| 8 #include <map> | 8 #include <map> |
| 9 | 9 |
| 10 #include "base/bind.h" | 10 #include "base/bind.h" |
| (...skipping 542 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 553 unsigned int outlen) { | 553 unsigned int outlen) { |
| 554 return ERR_NOT_IMPLEMENTED; | 554 return ERR_NOT_IMPLEMENTED; |
| 555 } | 555 } |
| 556 | 556 |
| 557 SSLClientSocket::NextProtoStatus | 557 SSLClientSocket::NextProtoStatus |
| 558 SSLClientSocketWin::GetNextProto(std::string* proto) { | 558 SSLClientSocketWin::GetNextProto(std::string* proto) { |
| 559 proto->clear(); | 559 proto->clear(); |
| 560 return kNextProtoUnsupported; | 560 return kNextProtoUnsupported; |
| 561 } | 561 } |
| 562 | 562 |
| 563 bool SSLClientSocketWin::WasOriginBoundCertNegotiated() { | |
| 564 // TODO(rch): support Origin Bound Certificates. | |
|
wtc
2011/12/06 19:22:11
Remove this TODO. SSLClientSocketWin uses the Win
Ryan Hamilton
2011/12/06 20:03:47
Done.
| |
| 565 return false; | |
| 566 } | |
| 567 | |
| 563 int SSLClientSocketWin::Connect(OldCompletionCallback* callback) { | 568 int SSLClientSocketWin::Connect(OldCompletionCallback* callback) { |
| 564 DCHECK(transport_.get()); | 569 DCHECK(transport_.get()); |
| 565 DCHECK(next_state_ == STATE_NONE); | 570 DCHECK(next_state_ == STATE_NONE); |
| 566 DCHECK(!user_connect_callback_); | 571 DCHECK(!user_connect_callback_); |
| 567 | 572 |
| 568 net_log_.BeginEvent(NetLog::TYPE_SSL_CONNECT, NULL); | 573 net_log_.BeginEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
| 569 | 574 |
| 570 int rv = InitializeSSLContext(); | 575 int rv = InitializeSSLContext(); |
| 571 if (rv != OK) { | 576 if (rv != OK) { |
| 572 net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, NULL); | 577 net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
| (...skipping 994 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 1567 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA); | 1572 UpdateConnectionTypeHistograms(CONNECTION_SSL_MD2_CA); |
| 1568 } | 1573 } |
| 1569 | 1574 |
| 1570 void SSLClientSocketWin::FreeSendBuffer() { | 1575 void SSLClientSocketWin::FreeSendBuffer() { |
| 1571 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer); | 1576 SECURITY_STATUS status = FreeContextBuffer(send_buffer_.pvBuffer); |
| 1572 DCHECK(status == SEC_E_OK); | 1577 DCHECK(status == SEC_E_OK); |
| 1573 memset(&send_buffer_, 0, sizeof(send_buffer_)); | 1578 memset(&send_buffer_, 0, sizeof(send_buffer_)); |
| 1574 } | 1579 } |
| 1575 | 1580 |
| 1576 } // namespace net | 1581 } // namespace net |
| OLD | NEW |