OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
7 | 7 |
8 #include <openssl/base.h> | 8 #include <openssl/base.h> |
9 #include <openssl/ssl.h> | 9 #include <openssl/ssl.h> |
10 | 10 |
(...skipping 302 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
313 // True if the current session was newly-established, but the certificate had | 313 // True if the current session was newly-established, but the certificate had |
314 // not yet been verified externally, so it cannot be inserted into the cache | 314 // not yet been verified externally, so it cannot be inserted into the cache |
315 // until later. | 315 // until later. |
316 bool session_pending_; | 316 bool session_pending_; |
317 // True if the initial handshake's certificate has been verified. | 317 // True if the initial handshake's certificate has been verified. |
318 bool certificate_verified_; | 318 bool certificate_verified_; |
319 // The request handle for |channel_id_service_|. | 319 // The request handle for |channel_id_service_|. |
320 ChannelIDService::Request channel_id_request_; | 320 ChannelIDService::Request channel_id_request_; |
321 SSLFailureState ssl_failure_state_; | 321 SSLFailureState ssl_failure_state_; |
322 | 322 |
323 scoped_ptr<SSLPrivateKey> private_key_; | 323 scoped_refptr<SSLPrivateKey> private_key_; |
324 int signature_result_; | 324 int signature_result_; |
325 std::vector<uint8_t> signature_; | 325 std::vector<uint8_t> signature_; |
326 | 326 |
327 TransportSecurityState* transport_security_state_; | 327 TransportSecurityState* transport_security_state_; |
328 | 328 |
329 CertPolicyEnforcer* const policy_enforcer_; | 329 CertPolicyEnforcer* const policy_enforcer_; |
330 | 330 |
331 // pinning_failure_log contains a message produced by | 331 // pinning_failure_log contains a message produced by |
332 // TransportSecurityState::CheckPublicKeyPins in the event of a | 332 // TransportSecurityState::CheckPublicKeyPins in the event of a |
333 // pinning failure. It is a (somewhat) human-readable string. | 333 // pinning failure. It is a (somewhat) human-readable string. |
334 std::string pinning_failure_log_; | 334 std::string pinning_failure_log_; |
335 | 335 |
336 BoundNetLog net_log_; | 336 BoundNetLog net_log_; |
337 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; | 337 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
338 }; | 338 }; |
339 | 339 |
340 } // namespace net | 340 } // namespace net |
341 | 341 |
342 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 342 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
OLD | NEW |