OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SSL_SSL_CONFIG_H_ | 5 #ifndef NET_SSL_SSL_CONFIG_H_ |
6 #define NET_SSL_SSL_CONFIG_H_ | 6 #define NET_SSL_SSL_CONFIG_H_ |
7 | 7 |
8 #include <stdint.h> | 8 #include <stdint.h> |
9 | 9 |
10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
(...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
75 | 75 |
76 // rev_checking_required_local_anchors is true if revocation checking is | 76 // rev_checking_required_local_anchors is true if revocation checking is |
77 // required to succeed when certificates chain to local trust anchors (that | 77 // required to succeed when certificates chain to local trust anchors (that |
78 // is, non-public CAs). If revocation information cannot be obtained, such | 78 // is, non-public CAs). If revocation information cannot be obtained, such |
79 // certificates will be treated as revoked ("hard-fail"). | 79 // certificates will be treated as revoked ("hard-fail"). |
80 // Note: This is distinct from rev_checking_enabled. If true, it is | 80 // Note: This is distinct from rev_checking_enabled. If true, it is |
81 // equivalent to also setting rev_checking_enabled, but only when the | 81 // equivalent to also setting rev_checking_enabled, but only when the |
82 // certificate chain chains to a local (non-public) trust anchor. | 82 // certificate chain chains to a local (non-public) trust anchor. |
83 bool rev_checking_required_local_anchors; | 83 bool rev_checking_required_local_anchors; |
84 | 84 |
| 85 // sha1_local_anchors_enabled is true if SHA-1 signed certificates issued by a |
| 86 // local (non-public) trust anchor should be allowed. |
| 87 bool sha1_local_anchors_enabled; |
| 88 |
85 // The minimum and maximum protocol versions that are enabled. | 89 // The minimum and maximum protocol versions that are enabled. |
86 // (Use the SSL_PROTOCOL_VERSION_xxx enumerators defined above.) | 90 // (Use the SSL_PROTOCOL_VERSION_xxx enumerators defined above.) |
87 // SSL 2.0 and SSL 3.0 are not supported. If version_max < version_min, it | 91 // SSL 2.0 and SSL 3.0 are not supported. If version_max < version_min, it |
88 // means no protocol versions are enabled. | 92 // means no protocol versions are enabled. |
89 uint16_t version_min; | 93 uint16_t version_min; |
90 uint16_t version_max; | 94 uint16_t version_max; |
91 | 95 |
92 // version_fallback_min contains the minimum version that is acceptable to | 96 // version_fallback_min contains the minimum version that is acceptable to |
93 // fallback to. Versions before this may be tried to see whether they would | 97 // fallback to. Versions before this may be tried to see whether they would |
94 // have succeeded and thus to give a better message to the user, but the | 98 // have succeeded and thus to give a better message to the user, but the |
(...skipping 92 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
187 // The list of application-level protocols to enable renegotiation for. | 191 // The list of application-level protocols to enable renegotiation for. |
188 NextProtoVector renego_allowed_for_protos; | 192 NextProtoVector renego_allowed_for_protos; |
189 | 193 |
190 scoped_refptr<X509Certificate> client_cert; | 194 scoped_refptr<X509Certificate> client_cert; |
191 scoped_refptr<SSLPrivateKey> client_private_key; | 195 scoped_refptr<SSLPrivateKey> client_private_key; |
192 }; | 196 }; |
193 | 197 |
194 } // namespace net | 198 } // namespace net |
195 | 199 |
196 #endif // NET_SSL_SSL_CONFIG_H_ | 200 #endif // NET_SSL_SSL_CONFIG_H_ |
OLD | NEW |