Chromium Code Reviews| Index: net/socket/ssl_client_socket.h |
| diff --git a/net/socket/ssl_client_socket.h b/net/socket/ssl_client_socket.h |
| index 410062dc5a9b9798214233b7a5ecf2b79dd54359..9bd31857e502188da53912513fc9471970af7bb5 100644 |
| --- a/net/socket/ssl_client_socket.h |
| +++ b/net/socket/ssl_client_socket.h |
| @@ -23,6 +23,7 @@ class SSLCertRequestInfo; |
| struct SSLConfig; |
| class SSLInfo; |
| class TransportSecurityState; |
| +class X509Certificate; |
| // This struct groups together several fields which are used by various |
| // classes related to SSLClientSocket. |
| @@ -162,6 +163,13 @@ class NET_EXPORT SSLClientSocket : public SSLSocket { |
| ConnectSignedCertTimestampsEnabledOCSP); |
| FRIEND_TEST_ALL_PREFIXES(SSLClientSocketTest, |
| ConnectSignedCertTimestampsDisabled); |
| + FRIEND_TEST_ALL_PREFIXES(SSLClientSocketTest, |
| + VerifyServerChainProperlyOrdered); |
| + |
| + // Returns the certificate chain as presented by server. |
| + // For unit testing only. |
| + virtual const scoped_refptr<X509Certificate> GetUnverifiedServerCertificate() |
|
wtc
2014/03/10 21:45:34
1. Nit: change "ServerCertificate" to "ServerCertC
Ryan Sleevi
2014/03/11 00:15:15
Yeah, seems like this should be protected.
haavardm
2014/03/11 18:43:21
It doesn't have to be protected to allow subclasse
haavardm
2014/03/11 18:43:21
Done.
|
| + const = 0; |
| // True if NPN was responded to, independent of selecting SPDY or HTTP. |
| bool was_npn_negotiated_; |