Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/core/crypto/quic_crypto_server_config.h" | 5 #include "net/quic/core/crypto/quic_crypto_server_config.h" |
| 6 | 6 |
| 7 #include <stdlib.h> | 7 #include <stdlib.h> |
| 8 | 8 |
| 9 #include <algorithm> | 9 #include <algorithm> |
| 10 #include <memory> | 10 #include <memory> |
| (...skipping 612 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 623 } | 623 } |
| 624 DCHECK(proof_source_.get()); | 624 DCHECK(proof_source_.get()); |
| 625 string chlo_hash; | 625 string chlo_hash; |
| 626 CryptoUtils::HashHandshakeMessage(client_hello, &chlo_hash); | 626 CryptoUtils::HashHandshakeMessage(client_hello, &chlo_hash); |
| 627 // No need to get a new proof if one was already generated. | 627 // No need to get a new proof if one was already generated. |
| 628 if (!crypto_proof->chain && | 628 if (!crypto_proof->chain && |
| 629 !proof_source_->GetProof(server_ip, info.sni.as_string(), | 629 !proof_source_->GetProof(server_ip, info.sni.as_string(), |
| 630 primary_config->serialized, version, chlo_hash, | 630 primary_config->serialized, version, chlo_hash, |
| 631 &crypto_proof->chain, &crypto_proof->signature, | 631 &crypto_proof->chain, &crypto_proof->signature, |
| 632 &crypto_proof->cert_sct)) { | 632 &crypto_proof->cert_sct)) { |
| 633 *error_details = "Missing or invalid crypto proof."; | |
|
Ryan Hamilton
2016/10/10 19:48:30
nit: This should probably land in a distinct CL an
zhihuang1
2016/10/13 06:22:39
Done.
https://codereview.chromium.org/2302643003/
| |
| 633 return QUIC_HANDSHAKE_FAILED; | 634 return QUIC_HANDSHAKE_FAILED; |
| 634 } | 635 } |
| 635 | 636 |
| 636 StringPiece cert_sct; | 637 StringPiece cert_sct; |
| 637 if (client_hello.GetStringPiece(kCertificateSCTTag, &cert_sct) && | 638 if (client_hello.GetStringPiece(kCertificateSCTTag, &cert_sct) && |
| 638 cert_sct.empty()) { | 639 cert_sct.empty()) { |
| 639 params->sct_supported_by_client = true; | 640 params->sct_supported_by_client = true; |
| 640 } | 641 } |
| 641 | 642 |
| 642 if (!info.reject_reasons.empty() || !requested_config.get()) { | 643 if (!info.reject_reasons.empty() || !requested_config.get()) { |
| (...skipping 1428 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 2071 priority(0), | 2072 priority(0), |
| 2072 source_address_token_boxer(nullptr) {} | 2073 source_address_token_boxer(nullptr) {} |
| 2073 | 2074 |
| 2074 QuicCryptoServerConfig::Config::~Config() { | 2075 QuicCryptoServerConfig::Config::~Config() { |
| 2075 base::STLDeleteElements(&key_exchanges); | 2076 base::STLDeleteElements(&key_exchanges); |
| 2076 } | 2077 } |
| 2077 | 2078 |
| 2078 QuicCryptoProof::QuicCryptoProof() {} | 2079 QuicCryptoProof::QuicCryptoProof() {} |
| 2079 QuicCryptoProof::~QuicCryptoProof() {} | 2080 QuicCryptoProof::~QuicCryptoProof() {} |
| 2080 } // namespace net | 2081 } // namespace net |
| OLD | NEW |