OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // OpenSSL binding for SSLClientSocket. The class layout and general principle | 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle |
6 // of operation is derived from SSLClientSocketNSS. | 6 // of operation is derived from SSLClientSocketNSS. |
7 | 7 |
8 #include "net/socket/ssl_client_socket_openssl.h" | 8 #include "net/socket/ssl_client_socket_openssl.h" |
9 | 9 |
10 #include <openssl/ssl.h> | 10 #include <openssl/ssl.h> |
(...skipping 900 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
911 if (ssl_config_.IsAllowedBadCert(server_cert_, &cert_status)) { | 911 if (ssl_config_.IsAllowedBadCert(server_cert_, &cert_status)) { |
912 VLOG(1) << "Received an expected bad cert with status: " << cert_status; | 912 VLOG(1) << "Received an expected bad cert with status: " << cert_status; |
913 server_cert_verify_result_.Reset(); | 913 server_cert_verify_result_.Reset(); |
914 server_cert_verify_result_.cert_status = cert_status; | 914 server_cert_verify_result_.cert_status = cert_status; |
915 server_cert_verify_result_.verified_cert = server_cert_; | 915 server_cert_verify_result_.verified_cert = server_cert_; |
916 return OK; | 916 return OK; |
917 } | 917 } |
918 | 918 |
919 int flags = 0; | 919 int flags = 0; |
920 if (ssl_config_.rev_checking_enabled) | 920 if (ssl_config_.rev_checking_enabled) |
921 flags |= X509Certificate::VERIFY_REV_CHECKING_ENABLED; | 921 flags |= CertVerifier::VERIFY_REV_CHECKING_ENABLED; |
922 if (ssl_config_.verify_ev_cert) | 922 if (ssl_config_.verify_ev_cert) |
923 flags |= X509Certificate::VERIFY_EV_CERT; | 923 flags |= CertVerifier::VERIFY_EV_CERT; |
924 if (ssl_config_.cert_io_enabled) | 924 if (ssl_config_.cert_io_enabled) |
925 flags |= X509Certificate::VERIFY_CERT_IO_ENABLED; | 925 flags |= CertVerifier::VERIFY_CERT_IO_ENABLED; |
926 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); | 926 verifier_.reset(new SingleRequestCertVerifier(cert_verifier_)); |
927 return verifier_->Verify( | 927 return verifier_->Verify( |
928 server_cert_, host_and_port_.host(), flags, | 928 server_cert_, host_and_port_.host(), flags, |
929 NULL /* no CRL set */, | 929 NULL /* no CRL set */, |
930 &server_cert_verify_result_, | 930 &server_cert_verify_result_, |
931 base::Bind(&SSLClientSocketOpenSSL::OnHandshakeIOComplete, | 931 base::Bind(&SSLClientSocketOpenSSL::OnHandshakeIOComplete, |
932 base::Unretained(this)), | 932 base::Unretained(this)), |
933 net_log_); | 933 net_log_); |
934 } | 934 } |
935 | 935 |
(...skipping 382 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1318 net_log_.AddByteTransferEvent(NetLog::TYPE_SSL_SOCKET_BYTES_SENT, rv, | 1318 net_log_.AddByteTransferEvent(NetLog::TYPE_SSL_SOCKET_BYTES_SENT, rv, |
1319 user_write_buf_->data()); | 1319 user_write_buf_->data()); |
1320 return rv; | 1320 return rv; |
1321 } | 1321 } |
1322 | 1322 |
1323 int err = SSL_get_error(ssl_, rv); | 1323 int err = SSL_get_error(ssl_, rv); |
1324 return MapOpenSSLError(err, err_tracer); | 1324 return MapOpenSSLError(err, err_tracer); |
1325 } | 1325 } |
1326 | 1326 |
1327 } // namespace net | 1327 } // namespace net |
OLD | NEW |