OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
(...skipping 270 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
281 STATE_HANDSHAKE, | 281 STATE_HANDSHAKE, |
282 STATE_CHANNEL_ID_LOOKUP, | 282 STATE_CHANNEL_ID_LOOKUP, |
283 STATE_CHANNEL_ID_LOOKUP_COMPLETE, | 283 STATE_CHANNEL_ID_LOOKUP_COMPLETE, |
284 STATE_VERIFY_CERT, | 284 STATE_VERIFY_CERT, |
285 STATE_VERIFY_CERT_COMPLETE, | 285 STATE_VERIFY_CERT_COMPLETE, |
286 }; | 286 }; |
287 State next_handshake_state_; | 287 State next_handshake_state_; |
288 NextProtoStatus npn_status_; | 288 NextProtoStatus npn_status_; |
289 std::string npn_proto_; | 289 std::string npn_proto_; |
290 // Written by the |channel_id_service_|. | 290 // Written by the |channel_id_service_|. |
291 std::string channel_id_private_key_; | 291 scoped_ptr<crypto::ECPrivateKey> channel_id_key_; |
292 std::string channel_id_cert_; | |
293 // True if channel ID extension was negotiated. | 292 // True if channel ID extension was negotiated. |
294 bool channel_id_xtn_negotiated_; | 293 bool channel_id_xtn_negotiated_; |
295 // True if the initial handshake has completed. | 294 // True if the initial handshake has completed. |
296 bool handshake_completed_; | 295 bool handshake_completed_; |
297 // True if the initial handshake's certificate has been verified. | 296 // True if the initial handshake's certificate has been verified. |
298 bool certificate_verified_; | 297 bool certificate_verified_; |
299 // The request handle for |channel_id_service_|. | 298 // The request handle for |channel_id_service_|. |
300 ChannelIDService::RequestHandle channel_id_request_handle_; | 299 ChannelIDService::RequestHandle channel_id_request_handle_; |
301 | 300 |
302 TransportSecurityState* transport_security_state_; | 301 TransportSecurityState* transport_security_state_; |
303 | 302 |
304 CertPolicyEnforcer* const policy_enforcer_; | 303 CertPolicyEnforcer* const policy_enforcer_; |
305 | 304 |
306 // pinning_failure_log contains a message produced by | 305 // pinning_failure_log contains a message produced by |
307 // TransportSecurityState::CheckPublicKeyPins in the event of a | 306 // TransportSecurityState::CheckPublicKeyPins in the event of a |
308 // pinning failure. It is a (somewhat) human-readable string. | 307 // pinning failure. It is a (somewhat) human-readable string. |
309 std::string pinning_failure_log_; | 308 std::string pinning_failure_log_; |
310 | 309 |
311 BoundNetLog net_log_; | 310 BoundNetLog net_log_; |
312 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; | 311 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
313 }; | 312 }; |
314 | 313 |
315 } // namespace net | 314 } // namespace net |
316 | 315 |
317 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 316 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
OLD | NEW |