Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(350)

Side by Side Diff: net/socket/ssl_client_socket_impl.h

Issue 2076363002: Introduce the ability to require CT for specific hosts (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@require_ct_enforcer
Patch Set: Android is weird Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/quic/crypto/proof_verifier_chromium_test.cc ('k') | net/socket/ssl_client_socket_impl.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
7 7
8 #include <openssl/base.h> 8 #include <openssl/base.h>
9 #include <openssl/ssl.h> 9 #include <openssl/ssl.h>
10 #include <stddef.h> 10 #include <stddef.h>
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after
126 126
127 bool DoTransportIO(); 127 bool DoTransportIO();
128 int DoHandshake(); 128 int DoHandshake();
129 int DoHandshakeComplete(int result); 129 int DoHandshakeComplete(int result);
130 int DoChannelIDLookup(); 130 int DoChannelIDLookup();
131 int DoChannelIDLookupComplete(int result); 131 int DoChannelIDLookupComplete(int result);
132 int DoVerifyCert(int result); 132 int DoVerifyCert(int result);
133 int DoVerifyCertComplete(int result); 133 int DoVerifyCertComplete(int result);
134 void DoConnectCallback(int result); 134 void DoConnectCallback(int result);
135 void UpdateServerCert(); 135 void UpdateServerCert();
136 void VerifyCT();
137 136
138 void OnHandshakeIOComplete(int result); 137 void OnHandshakeIOComplete(int result);
139 void OnSendComplete(int result); 138 void OnSendComplete(int result);
140 void OnRecvComplete(int result); 139 void OnRecvComplete(int result);
141 140
142 int DoHandshakeLoop(int last_io_result); 141 int DoHandshakeLoop(int last_io_result);
143 int DoReadLoop(); 142 int DoReadLoop();
144 int DoWriteLoop(); 143 int DoWriteLoop();
145 int DoPayloadRead(); 144 int DoPayloadRead();
146 int DoPayloadWrite(); 145 int DoPayloadWrite();
147 146
148 // Called when an asynchronous event completes which may have blocked the 147 // Called when an asynchronous event completes which may have blocked the
149 // pending Read or Write calls, if any. Retries both state machines and, if 148 // pending Read or Write calls, if any. Retries both state machines and, if
150 // complete, runs the respective callbacks. 149 // complete, runs the respective callbacks.
151 void PumpReadWriteEvents(); 150 void PumpReadWriteEvents();
152 151
153 int BufferSend(); 152 int BufferSend();
154 int BufferRecv(); 153 int BufferRecv();
155 void BufferSendComplete(int result); 154 void BufferSendComplete(int result);
156 void BufferRecvComplete(int result); 155 void BufferRecvComplete(int result);
157 void TransportWriteComplete(int result); 156 void TransportWriteComplete(int result);
158 int TransportReadComplete(int result); 157 int TransportReadComplete(int result);
158 int VerifyCT();
159 159
160 // Callback from the SSL layer that indicates the remote server is requesting 160 // Callback from the SSL layer that indicates the remote server is requesting
161 // a certificate for this client. 161 // a certificate for this client.
162 int ClientCertRequestCallback(SSL* ssl); 162 int ClientCertRequestCallback(SSL* ssl);
163 163
164 // CertVerifyCallback is called to verify the server's certificates. We do 164 // CertVerifyCallback is called to verify the server's certificates. We do
165 // verification after the handshake so this function only enforces that the 165 // verification after the handshake so this function only enforces that the
166 // certificates don't change during renegotiation. 166 // certificates don't change during renegotiation.
167 int CertVerifyCallback(X509_STORE_CTX* store_ctx); 167 int CertVerifyCallback(X509_STORE_CTX* store_ctx);
168 168
(...skipping 204 matching lines...) Expand 10 before | Expand all | Expand 10 after
373 // True if PKP is bypassed due to a local trust anchor. 373 // True if PKP is bypassed due to a local trust anchor.
374 bool pkp_bypassed_; 374 bool pkp_bypassed_;
375 375
376 BoundNetLog net_log_; 376 BoundNetLog net_log_;
377 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; 377 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_;
378 }; 378 };
379 379
380 } // namespace net 380 } // namespace net
381 381
382 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 382 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
OLDNEW
« no previous file with comments | « net/quic/crypto/proof_verifier_chromium_test.cc ('k') | net/socket/ssl_client_socket_impl.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698