OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/compiler_specific.h" | 10 #include "base/compiler_specific.h" |
(...skipping 285 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
296 std::string npn_proto_; | 296 std::string npn_proto_; |
297 // Written by the |channel_id_service_|. | 297 // Written by the |channel_id_service_|. |
298 scoped_ptr<crypto::ECPrivateKey> channel_id_key_; | 298 scoped_ptr<crypto::ECPrivateKey> channel_id_key_; |
299 // True if a channel ID was sent. | 299 // True if a channel ID was sent. |
300 bool channel_id_sent_; | 300 bool channel_id_sent_; |
301 // True if the initial handshake has completed. | 301 // True if the initial handshake has completed. |
302 bool handshake_completed_; | 302 bool handshake_completed_; |
303 // True if the initial handshake's certificate has been verified. | 303 // True if the initial handshake's certificate has been verified. |
304 bool certificate_verified_; | 304 bool certificate_verified_; |
305 // The request handle for |channel_id_service_|. | 305 // The request handle for |channel_id_service_|. |
306 ChannelIDService::RequestHandle channel_id_request_handle_; | 306 ChannelIDService::Request channel_id_request_; |
307 SSLFailureState ssl_failure_state_; | 307 SSLFailureState ssl_failure_state_; |
308 | 308 |
309 TransportSecurityState* transport_security_state_; | 309 TransportSecurityState* transport_security_state_; |
310 | 310 |
311 CertPolicyEnforcer* const policy_enforcer_; | 311 CertPolicyEnforcer* const policy_enforcer_; |
312 | 312 |
313 // pinning_failure_log contains a message produced by | 313 // pinning_failure_log contains a message produced by |
314 // TransportSecurityState::CheckPublicKeyPins in the event of a | 314 // TransportSecurityState::CheckPublicKeyPins in the event of a |
315 // pinning failure. It is a (somewhat) human-readable string. | 315 // pinning failure. It is a (somewhat) human-readable string. |
316 std::string pinning_failure_log_; | 316 std::string pinning_failure_log_; |
317 | 317 |
318 BoundNetLog net_log_; | 318 BoundNetLog net_log_; |
319 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; | 319 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
320 }; | 320 }; |
321 | 321 |
322 } // namespace net | 322 } // namespace net |
323 | 323 |
324 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 324 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
OLD | NEW |