| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle | 5 // OpenSSL binding for SSLClientSocket. The class layout and general principle |
| 6 // of operation is derived from SSLClientSocketNSS. | 6 // of operation is derived from SSLClientSocketNSS. |
| 7 | 7 |
| 8 #include "net/socket/ssl_client_socket_openssl.h" | 8 #include "net/socket/ssl_client_socket_openssl.h" |
| 9 | 9 |
| 10 #include <errno.h> | 10 #include <errno.h> |
| (...skipping 577 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 588 NOTREACHED(); | 588 NOTREACHED(); |
| 589 return false; | 589 return false; |
| 590 } | 590 } |
| 591 | 591 |
| 592 bool SSLClientSocketOpenSSL::GetSSLInfo(SSLInfo* ssl_info) { | 592 bool SSLClientSocketOpenSSL::GetSSLInfo(SSLInfo* ssl_info) { |
| 593 ssl_info->Reset(); | 593 ssl_info->Reset(); |
| 594 if (server_cert_chain_->empty()) | 594 if (server_cert_chain_->empty()) |
| 595 return false; | 595 return false; |
| 596 | 596 |
| 597 ssl_info->cert = server_cert_verify_result_.verified_cert; | 597 ssl_info->cert = server_cert_verify_result_.verified_cert; |
| 598 ssl_info->unverified_cert = server_cert_; |
| 598 ssl_info->cert_status = server_cert_verify_result_.cert_status; | 599 ssl_info->cert_status = server_cert_verify_result_.cert_status; |
| 599 ssl_info->is_issued_by_known_root = | 600 ssl_info->is_issued_by_known_root = |
| 600 server_cert_verify_result_.is_issued_by_known_root; | 601 server_cert_verify_result_.is_issued_by_known_root; |
| 601 ssl_info->public_key_hashes = | 602 ssl_info->public_key_hashes = |
| 602 server_cert_verify_result_.public_key_hashes; | 603 server_cert_verify_result_.public_key_hashes; |
| 603 ssl_info->client_cert_sent = | 604 ssl_info->client_cert_sent = |
| 604 ssl_config_.send_client_cert && ssl_config_.client_cert.get(); | 605 ssl_config_.send_client_cert && ssl_config_.client_cert.get(); |
| 605 ssl_info->channel_id_sent = channel_id_sent_; | 606 ssl_info->channel_id_sent = channel_id_sent_; |
| 606 ssl_info->pinning_failure_log = pinning_failure_log_; | 607 ssl_info->pinning_failure_log = pinning_failure_log_; |
| 607 | 608 |
| (...skipping 1307 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1915 return ssl_config_.renego_allowed_default; | 1916 return ssl_config_.renego_allowed_default; |
| 1916 | 1917 |
| 1917 NextProto next_proto = NextProtoFromString(npn_proto_); | 1918 NextProto next_proto = NextProtoFromString(npn_proto_); |
| 1918 for (NextProto allowed : ssl_config_.renego_allowed_for_protos) { | 1919 for (NextProto allowed : ssl_config_.renego_allowed_for_protos) { |
| 1919 if (next_proto == allowed) | 1920 if (next_proto == allowed) |
| 1920 return true; | 1921 return true; |
| 1921 } | 1922 } |
| 1922 return false; | 1923 return false; |
| 1923 } | 1924 } |
| 1924 | 1925 |
| 1925 scoped_refptr<X509Certificate> | |
| 1926 SSLClientSocketOpenSSL::GetUnverifiedServerCertificateChain() const { | |
| 1927 return server_cert_; | |
| 1928 } | |
| 1929 | |
| 1930 } // namespace net | 1926 } // namespace net |
| OLD | NEW |