| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| 7 | 7 |
| 8 #include <openssl/base.h> | 8 #include <openssl/base.h> |
| 9 #include <openssl/ssl.h> | 9 #include <openssl/ssl.h> |
| 10 #include <stdint.h> | 10 #include <stdint.h> |
| (...skipping 306 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 317 // True if the current session was newly-established, but the certificate had | 317 // True if the current session was newly-established, but the certificate had |
| 318 // not yet been verified externally, so it cannot be inserted into the cache | 318 // not yet been verified externally, so it cannot be inserted into the cache |
| 319 // until later. | 319 // until later. |
| 320 bool session_pending_; | 320 bool session_pending_; |
| 321 // True if the initial handshake's certificate has been verified. | 321 // True if the initial handshake's certificate has been verified. |
| 322 bool certificate_verified_; | 322 bool certificate_verified_; |
| 323 // The request handle for |channel_id_service_|. | 323 // The request handle for |channel_id_service_|. |
| 324 ChannelIDService::Request channel_id_request_; | 324 ChannelIDService::Request channel_id_request_; |
| 325 SSLFailureState ssl_failure_state_; | 325 SSLFailureState ssl_failure_state_; |
| 326 | 326 |
| 327 scoped_ptr<SSLPrivateKey> private_key_; | 327 scoped_refptr<SSLPrivateKey> private_key_; |
| 328 int signature_result_; | 328 int signature_result_; |
| 329 std::vector<uint8_t> signature_; | 329 std::vector<uint8_t> signature_; |
| 330 | 330 |
| 331 TransportSecurityState* transport_security_state_; | 331 TransportSecurityState* transport_security_state_; |
| 332 | 332 |
| 333 CertPolicyEnforcer* const policy_enforcer_; | 333 CertPolicyEnforcer* const policy_enforcer_; |
| 334 | 334 |
| 335 // pinning_failure_log contains a message produced by | 335 // pinning_failure_log contains a message produced by |
| 336 // TransportSecurityState::CheckPublicKeyPins in the event of a | 336 // TransportSecurityState::CheckPublicKeyPins in the event of a |
| 337 // pinning failure. It is a (somewhat) human-readable string. | 337 // pinning failure. It is a (somewhat) human-readable string. |
| 338 std::string pinning_failure_log_; | 338 std::string pinning_failure_log_; |
| 339 | 339 |
| 340 BoundNetLog net_log_; | 340 BoundNetLog net_log_; |
| 341 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; | 341 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; |
| 342 }; | 342 }; |
| 343 | 343 |
| 344 } // namespace net | 344 } // namespace net |
| 345 | 345 |
| 346 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ | 346 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ |
| OLD | NEW |