Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(454)

Side by Side Diff: net/socket/ssl_client_socket_openssl.h

Issue 1652603002: Add information to SSLInfo about CT EV policy compliance (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rsleevi nits Created 4 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/socket/ssl_client_socket_openssl.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_
7 7
8 #include <openssl/base.h> 8 #include <openssl/base.h>
9 #include <openssl/ssl.h> 9 #include <openssl/ssl.h>
10 #include <stddef.h> 10 #include <stddef.h>
(...skipping 179 matching lines...) Expand 10 before | Expand all | Expand 10 after
190 // Called after the initial handshake completes and after the server 190 // Called after the initial handshake completes and after the server
191 // certificate has been verified. The order of handshake completion and 191 // certificate has been verified. The order of handshake completion and
192 // certificate verification depends on whether the connection was false 192 // certificate verification depends on whether the connection was false
193 // started. After both have happened (thus calling this twice), the session is 193 // started. After both have happened (thus calling this twice), the session is
194 // safe to cache and will be cached. 194 // safe to cache and will be cached.
195 void MaybeCacheSession(); 195 void MaybeCacheSession();
196 196
197 // Called from the SSL layer whenever a new session is established. 197 // Called from the SSL layer whenever a new session is established.
198 int NewSessionCallback(SSL_SESSION* session); 198 int NewSessionCallback(SSL_SESSION* session);
199 199
200 // Adds the SignedCertificateTimestamps from ct_verify_result_ to |ssl_info|. 200 // Adds the Certificate Transparency info from ct_verify_result_ to
201 // |ssl_info|.
201 // SCTs are held in three separate vectors in ct_verify_result, each 202 // SCTs are held in three separate vectors in ct_verify_result, each
202 // vetor representing a particular verification state, this method associates 203 // vetor representing a particular verification state, this method associates
203 // each of the SCTs with the corresponding SCTVerifyStatus as it adds it to 204 // each of the SCTs with the corresponding SCTVerifyStatus as it adds it to
204 // the |ssl_info|.signed_certificate_timestamps list. 205 // the |ssl_info|.signed_certificate_timestamps list.
205 void AddSCTInfoToSSLInfo(SSLInfo* ssl_info) const; 206 void AddCTInfoToSSLInfo(SSLInfo* ssl_info) const;
206 207
207 // Returns a unique key string for the SSL session cache for 208 // Returns a unique key string for the SSL session cache for
208 // this socket. 209 // this socket.
209 std::string GetSessionCacheKey() const; 210 std::string GetSessionCacheKey() const;
210 211
211 // Returns true if renegotiations are allowed. 212 // Returns true if renegotiations are allowed.
212 bool IsRenegotiationAllowed() const; 213 bool IsRenegotiationAllowed() const;
213 214
214 // Callbacks for operations with the private key. 215 // Callbacks for operations with the private key.
215 int PrivateKeyTypeCallback(); 216 int PrivateKeyTypeCallback();
(...skipping 147 matching lines...) Expand 10 before | Expand all | Expand 10 after
363 // pinning failure. It is a (somewhat) human-readable string. 364 // pinning failure. It is a (somewhat) human-readable string.
364 std::string pinning_failure_log_; 365 std::string pinning_failure_log_;
365 366
366 BoundNetLog net_log_; 367 BoundNetLog net_log_;
367 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_; 368 base::WeakPtrFactory<SSLClientSocketOpenSSL> weak_factory_;
368 }; 369 };
369 370
370 } // namespace net 371 } // namespace net
371 372
372 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_ 373 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_OPENSSL_H_
OLDNEW
« no previous file with comments | « net/socket/ssl_client_socket_nss.cc ('k') | net/socket/ssl_client_socket_openssl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698