Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(69)

Side by Side Diff: net/quic/core/crypto/quic_crypto_server_config.cc

Issue 2324833004: Define Stable API for WebRTC/Quartc (Closed)
Patch Set: Add virtual destructors required by WebRTC compiler. Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/core/crypto/quic_crypto_server_config.h" 5 #include "net/quic/core/crypto/quic_crypto_server_config.h"
6 6
7 #include <stdlib.h> 7 #include <stdlib.h>
8 8
9 #include <algorithm> 9 #include <algorithm>
10 #include <memory> 10 #include <memory>
(...skipping 612 matching lines...) Expand 10 before | Expand all | Expand 10 after
623 } 623 }
624 DCHECK(proof_source_.get()); 624 DCHECK(proof_source_.get());
625 string chlo_hash; 625 string chlo_hash;
626 CryptoUtils::HashHandshakeMessage(client_hello, &chlo_hash); 626 CryptoUtils::HashHandshakeMessage(client_hello, &chlo_hash);
627 // No need to get a new proof if one was already generated. 627 // No need to get a new proof if one was already generated.
628 if (!crypto_proof->chain && 628 if (!crypto_proof->chain &&
629 !proof_source_->GetProof(server_ip, info.sni.as_string(), 629 !proof_source_->GetProof(server_ip, info.sni.as_string(),
630 primary_config->serialized, version, chlo_hash, 630 primary_config->serialized, version, chlo_hash,
631 &crypto_proof->chain, &crypto_proof->signature, 631 &crypto_proof->chain, &crypto_proof->signature,
632 &crypto_proof->cert_sct)) { 632 &crypto_proof->cert_sct)) {
633 *error_details = "Missing or invalid crypto proof.";
Ryan Hamilton 2016/10/10 19:48:30 nit: This should probably land in a distinct CL an
zhihuang1 2016/10/13 06:22:39 Done. https://codereview.chromium.org/2302643003/
633 return QUIC_HANDSHAKE_FAILED; 634 return QUIC_HANDSHAKE_FAILED;
634 } 635 }
635 636
636 StringPiece cert_sct; 637 StringPiece cert_sct;
637 if (client_hello.GetStringPiece(kCertificateSCTTag, &cert_sct) && 638 if (client_hello.GetStringPiece(kCertificateSCTTag, &cert_sct) &&
638 cert_sct.empty()) { 639 cert_sct.empty()) {
639 params->sct_supported_by_client = true; 640 params->sct_supported_by_client = true;
640 } 641 }
641 642
642 if (!info.reject_reasons.empty() || !requested_config.get()) { 643 if (!info.reject_reasons.empty() || !requested_config.get()) {
(...skipping 1428 matching lines...) Expand 10 before | Expand all | Expand 10 after
2071 priority(0), 2072 priority(0),
2072 source_address_token_boxer(nullptr) {} 2073 source_address_token_boxer(nullptr) {}
2073 2074
2074 QuicCryptoServerConfig::Config::~Config() { 2075 QuicCryptoServerConfig::Config::~Config() {
2075 base::STLDeleteElements(&key_exchanges); 2076 base::STLDeleteElements(&key_exchanges);
2076 } 2077 }
2077 2078
2078 QuicCryptoProof::QuicCryptoProof() {} 2079 QuicCryptoProof::QuicCryptoProof() {}
2079 QuicCryptoProof::~QuicCryptoProof() {} 2080 QuicCryptoProof::~QuicCryptoProof() {}
2080 } // namespace net 2081 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698