| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| 7 | 7 |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <string> | 10 #include <string> |
| (...skipping 133 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 144 // Signs the EKM value for Token Binding with |*key| and puts it in |*out|. | 144 // Signs the EKM value for Token Binding with |*key| and puts it in |*out|. |
| 145 // Returns a net error code. | 145 // Returns a net error code. |
| 146 virtual Error GetSignedEKMForTokenBinding(crypto::ECPrivateKey* key, | 146 virtual Error GetSignedEKMForTokenBinding(crypto::ECPrivateKey* key, |
| 147 std::vector<uint8_t>* out) = 0; | 147 std::vector<uint8_t>* out) = 0; |
| 148 | 148 |
| 149 // This method is only for debugging crbug.com/548423 and will be removed when | 149 // This method is only for debugging crbug.com/548423 and will be removed when |
| 150 // that bug is closed. This returns the channel ID key that was used when | 150 // that bug is closed. This returns the channel ID key that was used when |
| 151 // establishing the connection (or NULL if no channel ID was used). | 151 // establishing the connection (or NULL if no channel ID was used). |
| 152 virtual crypto::ECPrivateKey* GetChannelIDKey() const = 0; | 152 virtual crypto::ECPrivateKey* GetChannelIDKey() const = 0; |
| 153 | 153 |
| 154 // Returns true if the CECPQ1 (experimental post-quantum) experiment is |
| 155 // enabled. |
| 156 static bool IsPostQuantumExperimentEnabled(); |
| 157 |
| 154 protected: | 158 protected: |
| 155 void set_negotiation_extension( | 159 void set_negotiation_extension( |
| 156 SSLNegotiationExtension negotiation_extension) { | 160 SSLNegotiationExtension negotiation_extension) { |
| 157 negotiation_extension_ = negotiation_extension; | 161 negotiation_extension_ = negotiation_extension; |
| 158 } | 162 } |
| 159 | 163 |
| 160 void set_signed_cert_timestamps_received( | 164 void set_signed_cert_timestamps_received( |
| 161 bool signed_cert_timestamps_received) { | 165 bool signed_cert_timestamps_received) { |
| 162 signed_cert_timestamps_received_ = signed_cert_timestamps_received; | 166 signed_cert_timestamps_received_ = signed_cert_timestamps_received; |
| 163 } | 167 } |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 202 bool signed_cert_timestamps_received_; | 206 bool signed_cert_timestamps_received_; |
| 203 // True if a stapled OCSP response was received. | 207 // True if a stapled OCSP response was received. |
| 204 bool stapled_ocsp_response_received_; | 208 bool stapled_ocsp_response_received_; |
| 205 // Protocol negotiation extension used. | 209 // Protocol negotiation extension used. |
| 206 SSLNegotiationExtension negotiation_extension_; | 210 SSLNegotiationExtension negotiation_extension_; |
| 207 }; | 211 }; |
| 208 | 212 |
| 209 } // namespace net | 213 } // namespace net |
| 210 | 214 |
| 211 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_H_ | 215 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_H_ |
| OLD | NEW |