| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 7 | 7 |
| 8 #include <openssl/base.h> | 8 #include <openssl/base.h> |
| 9 #include <openssl/ssl.h> | 9 #include <openssl/ssl.h> |
| 10 #include <stddef.h> | 10 #include <stddef.h> |
| (...skipping 199 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 210 // Returns a unique key string for the SSL session cache for | 210 // Returns a unique key string for the SSL session cache for |
| 211 // this socket. | 211 // this socket. |
| 212 std::string GetSessionCacheKey() const; | 212 std::string GetSessionCacheKey() const; |
| 213 | 213 |
| 214 // Returns true if renegotiations are allowed. | 214 // Returns true if renegotiations are allowed. |
| 215 bool IsRenegotiationAllowed() const; | 215 bool IsRenegotiationAllowed() const; |
| 216 | 216 |
| 217 // Callbacks for operations with the private key. | 217 // Callbacks for operations with the private key. |
| 218 int PrivateKeyTypeCallback(); | 218 int PrivateKeyTypeCallback(); |
| 219 size_t PrivateKeyMaxSignatureLenCallback(); | 219 size_t PrivateKeyMaxSignatureLenCallback(); |
| 220 ssl_private_key_result_t PrivateKeySignCallback(uint8_t* out, | 220 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, |
| 221 size_t* out_len, | 221 size_t* out_len, |
| 222 size_t max_out, | 222 size_t max_out, |
| 223 const EVP_MD* md, | 223 const EVP_MD* md, |
| 224 const uint8_t* in, | 224 const uint8_t* in, |
| 225 size_t in_len); | 225 size_t in_len); |
| 226 ssl_private_key_result_t PrivateKeySignCompleteCallback(uint8_t* out, | 226 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
| 227 size_t* out_len, | 227 size_t* out_len, |
| 228 size_t max_out); | 228 size_t max_out); |
| 229 | 229 |
| 230 void OnPrivateKeySignComplete(Error error, | 230 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); |
| 231 const std::vector<uint8_t>& signature); | |
| 232 | 231 |
| 233 int TokenBindingAdd(const uint8_t** out, | 232 int TokenBindingAdd(const uint8_t** out, |
| 234 size_t* out_len, | 233 size_t* out_len, |
| 235 int* out_alert_value); | 234 int* out_alert_value); |
| 236 int TokenBindingParse(const uint8_t* contents, | 235 int TokenBindingParse(const uint8_t* contents, |
| 237 size_t contents_len, | 236 size_t contents_len, |
| 238 int* out_alert_value); | 237 int* out_alert_value); |
| 239 | 238 |
| 240 void LogConnectEndEvent(int rv); | 239 void LogConnectEndEvent(int rv); |
| 241 | 240 |
| (...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 370 // True if PKP is bypassed due to a local trust anchor. | 369 // True if PKP is bypassed due to a local trust anchor. |
| 371 bool pkp_bypassed_; | 370 bool pkp_bypassed_; |
| 372 | 371 |
| 373 BoundNetLog net_log_; | 372 BoundNetLog net_log_; |
| 374 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 373 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
| 375 }; | 374 }; |
| 376 | 375 |
| 377 } // namespace net | 376 } // namespace net |
| 378 | 377 |
| 379 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 378 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| OLD | NEW |