OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
7 | 7 |
8 #include <stddef.h> | 8 #include <stddef.h> |
9 #include <stdint.h> | 9 #include <stdint.h> |
10 | 10 |
(...skipping 266 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
277 std::unique_ptr<PeerCertificateChain> server_cert_chain_; | 277 std::unique_ptr<PeerCertificateChain> server_cert_chain_; |
278 scoped_refptr<X509Certificate> server_cert_; | 278 scoped_refptr<X509Certificate> server_cert_; |
279 CertVerifyResult server_cert_verify_result_; | 279 CertVerifyResult server_cert_verify_result_; |
280 std::string ocsp_response_; | 280 std::string ocsp_response_; |
281 bool completed_connect_; | 281 bool completed_connect_; |
282 | 282 |
283 // Set when Read() or Write() successfully reads or writes data to or from the | 283 // Set when Read() or Write() successfully reads or writes data to or from the |
284 // network. | 284 // network. |
285 bool was_ever_used_; | 285 bool was_ever_used_; |
286 | 286 |
287 // List of DER-encoded X.509 DistinguishedName of certificate authorities | |
288 // allowed by the server. | |
289 std::vector<std::string> cert_authorities_; | |
290 // List of SSLClientCertType values for client certificates allowed by the | |
291 // server. | |
292 std::vector<SSLClientCertType> cert_key_types_; | |
293 | |
294 CertVerifier* const cert_verifier_; | 287 CertVerifier* const cert_verifier_; |
295 std::unique_ptr<CertVerifier::Request> cert_verifier_request_; | 288 std::unique_ptr<CertVerifier::Request> cert_verifier_request_; |
296 base::TimeTicks start_cert_verification_time_; | 289 base::TimeTicks start_cert_verification_time_; |
297 | 290 |
298 // Certificate Transparency: Verifier and result holder. | 291 // Certificate Transparency: Verifier and result holder. |
299 ct::CTVerifyResult ct_verify_result_; | 292 ct::CTVerifyResult ct_verify_result_; |
300 CTVerifier* cert_transparency_verifier_; | 293 CTVerifier* cert_transparency_verifier_; |
301 | 294 |
302 // The service for retrieving Channel ID keys. May be NULL. | 295 // The service for retrieving Channel ID keys. May be NULL. |
303 ChannelIDService* channel_id_service_; | 296 ChannelIDService* channel_id_service_; |
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
361 // True if PKP is bypassed due to a local trust anchor. | 354 // True if PKP is bypassed due to a local trust anchor. |
362 bool pkp_bypassed_; | 355 bool pkp_bypassed_; |
363 | 356 |
364 NetLogWithSource net_log_; | 357 NetLogWithSource net_log_; |
365 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 358 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
366 }; | 359 }; |
367 | 360 |
368 } // namespace net | 361 } // namespace net |
369 | 362 |
370 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 363 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
OLD | NEW |