| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SSL_SSL_INFO_H_ | 5 #ifndef NET_SSL_SSL_INFO_H_ |
| 6 #define NET_SSL_SSL_INFO_H_ | 6 #define NET_SSL_SSL_INFO_H_ |
| 7 | 7 |
| 8 #include <stdint.h> | 8 #include <stdint.h> |
| 9 | 9 |
| 10 #include <vector> | 10 #include <vector> |
| (...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 44 | 44 |
| 45 SSLInfo(); | 45 SSLInfo(); |
| 46 SSLInfo(const SSLInfo& info); | 46 SSLInfo(const SSLInfo& info); |
| 47 ~SSLInfo(); | 47 ~SSLInfo(); |
| 48 SSLInfo& operator=(const SSLInfo& info); | 48 SSLInfo& operator=(const SSLInfo& info); |
| 49 | 49 |
| 50 void Reset(); | 50 void Reset(); |
| 51 | 51 |
| 52 bool is_valid() const { return cert.get() != NULL; } | 52 bool is_valid() const { return cert.get() != NULL; } |
| 53 | 53 |
| 54 // Returns the ID of the (EC)DH group used by the key exchange or zero if | |
| 55 // unknown (older cache entries may not store the value) or not applicable. | |
| 56 uint16_t GetKeyExchangeGroup() const; | |
| 57 | |
| 58 // Adds the specified |error| to the cert status. | 54 // Adds the specified |error| to the cert status. |
| 59 void SetCertError(int error); | 55 void SetCertError(int error); |
| 60 | 56 |
| 61 // Adds the SignedCertificateTimestamps and policy compliance details | 57 // Adds the SignedCertificateTimestamps and policy compliance details |
| 62 // from ct_verify_result to |signed_certificate_timestamps| and | 58 // from ct_verify_result to |signed_certificate_timestamps| and |
| 63 // |ct_policy_compliance_details|. SCTs are held in three separate | 59 // |ct_policy_compliance_details|. SCTs are held in three separate |
| 64 // vectors in ct_verify_result, each vetor representing a particular | 60 // vectors in ct_verify_result, each vetor representing a particular |
| 65 // verification state, this method associates each of the SCTs with | 61 // verification state, this method associates each of the SCTs with |
| 66 // the corresponding SCTVerifyStatus as it adds it to the | 62 // the corresponding SCTVerifyStatus as it adds it to the |
| 67 // |signed_certificate_timestamps| list. | 63 // |signed_certificate_timestamps| list. |
| (...skipping 11 matching lines...) Expand all Loading... |
| 79 // Bitmask of status info of |cert|, representing, for example, known errors | 75 // Bitmask of status info of |cert|, representing, for example, known errors |
| 80 // and extended validation (EV) status. | 76 // and extended validation (EV) status. |
| 81 // See cert_status_flags.h for values. | 77 // See cert_status_flags.h for values. |
| 82 CertStatus cert_status; | 78 CertStatus cert_status; |
| 83 | 79 |
| 84 // The security strength, in bits, of the SSL cipher suite. | 80 // The security strength, in bits, of the SSL cipher suite. |
| 85 // 0 means the connection is not encrypted. | 81 // 0 means the connection is not encrypted. |
| 86 // -1 means the security strength is unknown. | 82 // -1 means the security strength is unknown. |
| 87 int security_bits; | 83 int security_bits; |
| 88 | 84 |
| 89 // Security information of the SSL connection handshake. | 85 // The ID of the (EC)DH group used by the key exchange or zero if unknown |
| 90 // The meaning depends on the cipher used, see BoringSSL's |SSL_SESSION|'s | 86 // (older cache entries may not store the value) or not applicable. |
| 91 // key_exchange_info for more information. | 87 uint16_t key_exchange_group; |
| 92 // A zero indicates that the value is unknown. | |
| 93 // | |
| 94 // This field is deprecated. Use GetKeyExchangeGroup instead. See | |
| 95 // https://crbug.com/639421. | |
| 96 int key_exchange_info; | |
| 97 | 88 |
| 98 // Information about the SSL connection itself. See | 89 // Information about the SSL connection itself. See |
| 99 // ssl_connection_status_flags.h for values. The protocol version, | 90 // ssl_connection_status_flags.h for values. The protocol version, |
| 100 // ciphersuite, and compression in use are encoded within. | 91 // ciphersuite, and compression in use are encoded within. |
| 101 int connection_status; | 92 int connection_status; |
| 102 | 93 |
| 103 // If the certificate is valid, then this is true iff it was rooted at a | 94 // If the certificate is valid, then this is true iff it was rooted at a |
| 104 // standard CA root. (As opposed to a user-installed root.) | 95 // standard CA root. (As opposed to a user-installed root.) |
| 105 bool is_issued_by_known_root; | 96 bool is_issued_by_known_root; |
| 106 | 97 |
| (...skipping 48 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 155 // is true. | 146 // is true. |
| 156 ct::CertPolicyCompliance ct_cert_policy_compliance; | 147 ct::CertPolicyCompliance ct_cert_policy_compliance; |
| 157 | 148 |
| 158 // OCSP stapling details. | 149 // OCSP stapling details. |
| 159 OCSPVerifyResult ocsp_result; | 150 OCSPVerifyResult ocsp_result; |
| 160 }; | 151 }; |
| 161 | 152 |
| 162 } // namespace net | 153 } // namespace net |
| 163 | 154 |
| 164 #endif // NET_SSL_SSL_INFO_H_ | 155 #endif // NET_SSL_SSL_INFO_H_ |
| OLD | NEW |