OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
7 | 7 |
8 #include <openssl/base.h> | 8 #include <openssl/base.h> |
9 #include <openssl/ssl.h> | 9 #include <openssl/ssl.h> |
10 #include <stddef.h> | 10 #include <stddef.h> |
(...skipping 199 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
210 // Returns a unique key string for the SSL session cache for | 210 // Returns a unique key string for the SSL session cache for |
211 // this socket. | 211 // this socket. |
212 std::string GetSessionCacheKey() const; | 212 std::string GetSessionCacheKey() const; |
213 | 213 |
214 // Returns true if renegotiations are allowed. | 214 // Returns true if renegotiations are allowed. |
215 bool IsRenegotiationAllowed() const; | 215 bool IsRenegotiationAllowed() const; |
216 | 216 |
217 // Callbacks for operations with the private key. | 217 // Callbacks for operations with the private key. |
218 int PrivateKeyTypeCallback(); | 218 int PrivateKeyTypeCallback(); |
219 size_t PrivateKeyMaxSignatureLenCallback(); | 219 size_t PrivateKeyMaxSignatureLenCallback(); |
220 ssl_private_key_result_t PrivateKeySignCallback(uint8_t* out, | 220 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, |
221 size_t* out_len, | 221 size_t* out_len, |
222 size_t max_out, | 222 size_t max_out, |
223 const EVP_MD* md, | 223 const EVP_MD* md, |
224 const uint8_t* in, | 224 const uint8_t* in, |
225 size_t in_len); | 225 size_t in_len); |
226 ssl_private_key_result_t PrivateKeySignCompleteCallback(uint8_t* out, | 226 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
227 size_t* out_len, | 227 size_t* out_len, |
228 size_t max_out); | 228 size_t max_out); |
229 | 229 |
230 void OnPrivateKeySignComplete(Error error, | 230 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); |
231 const std::vector<uint8_t>& signature); | |
232 | 231 |
233 int TokenBindingAdd(const uint8_t** out, | 232 int TokenBindingAdd(const uint8_t** out, |
234 size_t* out_len, | 233 size_t* out_len, |
235 int* out_alert_value); | 234 int* out_alert_value); |
236 int TokenBindingParse(const uint8_t* contents, | 235 int TokenBindingParse(const uint8_t* contents, |
237 size_t contents_len, | 236 size_t contents_len, |
238 int* out_alert_value); | 237 int* out_alert_value); |
239 | 238 |
240 void LogConnectEndEvent(int rv); | 239 void LogConnectEndEvent(int rv); |
241 | 240 |
(...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
370 // True if PKP is bypassed due to a local trust anchor. | 369 // True if PKP is bypassed due to a local trust anchor. |
371 bool pkp_bypassed_; | 370 bool pkp_bypassed_; |
372 | 371 |
373 BoundNetLog net_log_; | 372 BoundNetLog net_log_; |
374 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 373 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
375 }; | 374 }; |
376 | 375 |
377 } // namespace net | 376 } // namespace net |
378 | 377 |
379 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 378 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
OLD | NEW |