| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| 7 | 7 |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <string> | 10 #include <string> |
| (...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 132 // Signs the EKM value for Token Binding with |*key| and puts it in |*out|. | 132 // Signs the EKM value for Token Binding with |*key| and puts it in |*out|. |
| 133 // Returns a net error code. | 133 // Returns a net error code. |
| 134 virtual Error GetSignedEKMForTokenBinding(crypto::ECPrivateKey* key, | 134 virtual Error GetSignedEKMForTokenBinding(crypto::ECPrivateKey* key, |
| 135 std::vector<uint8_t>* out) = 0; | 135 std::vector<uint8_t>* out) = 0; |
| 136 | 136 |
| 137 // This method is only for debugging crbug.com/548423 and will be removed when | 137 // This method is only for debugging crbug.com/548423 and will be removed when |
| 138 // that bug is closed. This returns the channel ID key that was used when | 138 // that bug is closed. This returns the channel ID key that was used when |
| 139 // establishing the connection (or NULL if no channel ID was used). | 139 // establishing the connection (or NULL if no channel ID was used). |
| 140 virtual crypto::ECPrivateKey* GetChannelIDKey() const = 0; | 140 virtual crypto::ECPrivateKey* GetChannelIDKey() const = 0; |
| 141 | 141 |
| 142 // Returns true if the CECPQ1 (experimental post-quantum) experiment is |
| 143 // enabled. This should be removed after the experiment is ended, around |
| 144 // 2017-18. |
| 145 static bool IsPostQuantumExperimentEnabled(); |
| 146 |
| 142 protected: | 147 protected: |
| 143 void set_signed_cert_timestamps_received( | 148 void set_signed_cert_timestamps_received( |
| 144 bool signed_cert_timestamps_received) { | 149 bool signed_cert_timestamps_received) { |
| 145 signed_cert_timestamps_received_ = signed_cert_timestamps_received; | 150 signed_cert_timestamps_received_ = signed_cert_timestamps_received; |
| 146 } | 151 } |
| 147 | 152 |
| 148 void set_stapled_ocsp_response_received(bool stapled_ocsp_response_received) { | 153 void set_stapled_ocsp_response_received(bool stapled_ocsp_response_received) { |
| 149 stapled_ocsp_response_received_ = stapled_ocsp_response_received; | 154 stapled_ocsp_response_received_ = stapled_ocsp_response_received; |
| 150 } | 155 } |
| 151 | 156 |
| (...skipping 16 matching lines...) Expand all Loading... |
| 168 | 173 |
| 169 // True if SCTs were received via a TLS extension. | 174 // True if SCTs were received via a TLS extension. |
| 170 bool signed_cert_timestamps_received_; | 175 bool signed_cert_timestamps_received_; |
| 171 // True if a stapled OCSP response was received. | 176 // True if a stapled OCSP response was received. |
| 172 bool stapled_ocsp_response_received_; | 177 bool stapled_ocsp_response_received_; |
| 173 }; | 178 }; |
| 174 | 179 |
| 175 } // namespace net | 180 } // namespace net |
| 176 | 181 |
| 177 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 182 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| OLD | NEW |