OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/socket/ssl_client_socket_impl.h" | 5 #include "net/socket/ssl_client_socket_impl.h" |
6 | 6 |
7 #include <errno.h> | 7 #include <errno.h> |
8 #include <openssl/bio.h> | 8 #include <openssl/bio.h> |
9 #include <openssl/bytestring.h> | 9 #include <openssl/bytestring.h> |
10 #include <openssl/err.h> | 10 #include <openssl/err.h> |
(...skipping 62 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
73 const char kDefaultSupportedNPNProtocol[] = "http/1.1"; | 73 const char kDefaultSupportedNPNProtocol[] = "http/1.1"; |
74 | 74 |
75 // Default size of the internal BoringSSL buffers. | 75 // Default size of the internal BoringSSL buffers. |
76 const int KDefaultOpenSSLBufferSize = 17 * 1024; | 76 const int KDefaultOpenSSLBufferSize = 17 * 1024; |
77 | 77 |
78 // TLS extension number use for Token Binding. | 78 // TLS extension number use for Token Binding. |
79 const unsigned int kTbExtNum = 24; | 79 const unsigned int kTbExtNum = 24; |
80 | 80 |
81 // Token Binding ProtocolVersions supported. | 81 // Token Binding ProtocolVersions supported. |
82 const uint8_t kTbProtocolVersionMajor = 0; | 82 const uint8_t kTbProtocolVersionMajor = 0; |
83 const uint8_t kTbProtocolVersionMinor = 5; | 83 const uint8_t kTbProtocolVersionMinor = 6; |
84 const uint8_t kTbMinProtocolVersionMajor = 0; | 84 const uint8_t kTbMinProtocolVersionMajor = 0; |
85 const uint8_t kTbMinProtocolVersionMinor = 3; | 85 const uint8_t kTbMinProtocolVersionMinor = 6; |
davidben
2016/06/27 23:39:14
[I am assuming the signature format is the only ch
nharper
2016/06/27 23:58:30
None of the technical details changed, but the sig
| |
86 | 86 |
87 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { | 87 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { |
88 switch (EVP_MD_type(md)) { | 88 switch (EVP_MD_type(md)) { |
89 case NID_md5_sha1: | 89 case NID_md5_sha1: |
90 *hash = SSLPrivateKey::Hash::MD5_SHA1; | 90 *hash = SSLPrivateKey::Hash::MD5_SHA1; |
91 return true; | 91 return true; |
92 case NID_sha1: | 92 case NID_sha1: |
93 *hash = SSLPrivateKey::Hash::SHA1; | 93 *hash = SSLPrivateKey::Hash::SHA1; |
94 return true; | 94 return true; |
95 case NID_sha256: | 95 case NID_sha256: |
(...skipping 2194 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
2290 if (rv != OK) { | 2290 if (rv != OK) { |
2291 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_SSL_CONNECT, rv); | 2291 net_log_.EndEventWithNetErrorCode(NetLog::TYPE_SSL_CONNECT, rv); |
2292 return; | 2292 return; |
2293 } | 2293 } |
2294 | 2294 |
2295 net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, | 2295 net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, |
2296 base::Bind(&NetLogSSLInfoCallback, base::Unretained(this))); | 2296 base::Bind(&NetLogSSLInfoCallback, base::Unretained(this))); |
2297 } | 2297 } |
2298 | 2298 |
2299 } // namespace net | 2299 } // namespace net |
OLD | NEW |