Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 | 9 |
| 10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
| (...skipping 272 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 283 STATE_CHANNEL_ID_LOOKUP_COMPLETE, | 283 STATE_CHANNEL_ID_LOOKUP_COMPLETE, |
| 284 STATE_VERIFY_CERT, | 284 STATE_VERIFY_CERT, |
| 285 STATE_VERIFY_CERT_COMPLETE, | 285 STATE_VERIFY_CERT_COMPLETE, |
| 286 }; | 286 }; |
| 287 State next_handshake_state_; | 287 State next_handshake_state_; |
| 288 NextProtoStatus npn_status_; | 288 NextProtoStatus npn_status_; |
| 289 std::string npn_proto_; | 289 std::string npn_proto_; |
| 290 // Written by the |channel_id_service_|. | 290 // Written by the |channel_id_service_|. |
| 291 std::string channel_id_private_key_; | 291 std::string channel_id_private_key_; |
| 292 std::string channel_id_cert_; | 292 std::string channel_id_cert_; |
| 293 // True if channel ID extension was negotiated. | 293 // True if a channel ID was sent. |
| 294 bool channel_id_xtn_negotiated_; | 294 bool channel_id_sent_; |
|
davidben
2015/04/27 18:29:39
Note: It's not possible to negotiate the Channel I
| |
| 295 // True if the initial handshake has completed. | 295 // True if the initial handshake has completed. |
| 296 bool handshake_completed_; | 296 bool handshake_completed_; |
| 297 // True if the initial handshake's certificate has been verified. | 297 // True if the initial handshake's certificate has been verified. |
| 298 bool certificate_verified_; | 298 bool certificate_verified_; |
| 299 // The request handle for |channel_id_service_|. | 299 // The request handle for |channel_id_service_|. |
| 300 ChannelIDService::RequestHandle channel_id_request_handle_; | 300 ChannelIDService::RequestHandle channel_id_request_handle_; |
| 301 | 301 |
| 302 TransportSecurityState* transport_security_state_; | 302 TransportSecurityState* transport_security_state_; |
| 303 | 303 |
| 304 CertPolicyEnforcer* const policy_enforcer_; | 304 CertPolicyEnforcer* const policy_enforcer_; |
| 305 | 305 |
| 306 // pinning_failure_log contains a message produced by | 306 // pinning_failure_log contains a message produced by |
| 307 // TransportSecurityState::CheckPublicKeyPins in the event of a | 307 // TransportSecurityState::CheckPublicKeyPins in the event of a |
| 308 // pinning failure. It is a (somewhat) human-readable string. | 308 // pinning failure. It is a (somewhat) human-readable string. |
| 309 std::string pinning_failure_log_; | 309 std::string pinning_failure_log_; |
| 310 | 310 |
| 311 BoundNetLog net_log_; | 311 BoundNetLog net_log_; |
| 312 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; | 312 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
| 313 }; | 313 }; |
| 314 | 314 |
| 315 } // namespace net | 315 } // namespace net |
| 316 | 316 |
| 317 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 317 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| OLD | NEW |