| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 #include <stdint.h> | 9 #include <stdint.h> |
| 10 | 10 |
| (...skipping 266 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 277 std::unique_ptr<PeerCertificateChain> server_cert_chain_; | 277 std::unique_ptr<PeerCertificateChain> server_cert_chain_; |
| 278 scoped_refptr<X509Certificate> server_cert_; | 278 scoped_refptr<X509Certificate> server_cert_; |
| 279 CertVerifyResult server_cert_verify_result_; | 279 CertVerifyResult server_cert_verify_result_; |
| 280 std::string ocsp_response_; | 280 std::string ocsp_response_; |
| 281 bool completed_connect_; | 281 bool completed_connect_; |
| 282 | 282 |
| 283 // Set when Read() or Write() successfully reads or writes data to or from the | 283 // Set when Read() or Write() successfully reads or writes data to or from the |
| 284 // network. | 284 // network. |
| 285 bool was_ever_used_; | 285 bool was_ever_used_; |
| 286 | 286 |
| 287 // List of DER-encoded X.509 DistinguishedName of certificate authorities | |
| 288 // allowed by the server. | |
| 289 std::vector<std::string> cert_authorities_; | |
| 290 // List of SSLClientCertType values for client certificates allowed by the | |
| 291 // server. | |
| 292 std::vector<SSLClientCertType> cert_key_types_; | |
| 293 | |
| 294 CertVerifier* const cert_verifier_; | 287 CertVerifier* const cert_verifier_; |
| 295 std::unique_ptr<CertVerifier::Request> cert_verifier_request_; | 288 std::unique_ptr<CertVerifier::Request> cert_verifier_request_; |
| 296 base::TimeTicks start_cert_verification_time_; | 289 base::TimeTicks start_cert_verification_time_; |
| 297 | 290 |
| 298 // Certificate Transparency: Verifier and result holder. | 291 // Certificate Transparency: Verifier and result holder. |
| 299 ct::CTVerifyResult ct_verify_result_; | 292 ct::CTVerifyResult ct_verify_result_; |
| 300 CTVerifier* cert_transparency_verifier_; | 293 CTVerifier* cert_transparency_verifier_; |
| 301 | 294 |
| 302 // The service for retrieving Channel ID keys. May be NULL. | 295 // The service for retrieving Channel ID keys. May be NULL. |
| 303 ChannelIDService* channel_id_service_; | 296 ChannelIDService* channel_id_service_; |
| (...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 361 // True if PKP is bypassed due to a local trust anchor. | 354 // True if PKP is bypassed due to a local trust anchor. |
| 362 bool pkp_bypassed_; | 355 bool pkp_bypassed_; |
| 363 | 356 |
| 364 NetLogWithSource net_log_; | 357 NetLogWithSource net_log_; |
| 365 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 358 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
| 366 }; | 359 }; |
| 367 | 360 |
| 368 } // namespace net | 361 } // namespace net |
| 369 | 362 |
| 370 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 363 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| OLD | NEW |