Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(62)

Side by Side Diff: net/socket/ssl_client_socket_impl.h

Issue 2604513002: Optimize CT & OCSP handling code (Closed)
Patch Set: Review feedback round two Created 3 years, 12 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
7 7
8 #include <stddef.h> 8 #include <stddef.h>
9 #include <stdint.h> 9 #include <stdint.h>
10 10
(...skipping 259 matching lines...) Expand 10 before | Expand all | Expand 10 after
270 // SSL_get_error) associated with it. 270 // SSL_get_error) associated with it.
271 int pending_read_ssl_error_; 271 int pending_read_ssl_error_;
272 272
273 // If there is a pending read result, the OpenSSLErrorInfo associated with it. 273 // If there is a pending read result, the OpenSSLErrorInfo associated with it.
274 OpenSSLErrorInfo pending_read_error_info_; 274 OpenSSLErrorInfo pending_read_error_info_;
275 275
276 // Set when Connect finishes. 276 // Set when Connect finishes.
277 std::unique_ptr<PeerCertificateChain> server_cert_chain_; 277 std::unique_ptr<PeerCertificateChain> server_cert_chain_;
278 scoped_refptr<X509Certificate> server_cert_; 278 scoped_refptr<X509Certificate> server_cert_;
279 CertVerifyResult server_cert_verify_result_; 279 CertVerifyResult server_cert_verify_result_;
280 std::string ocsp_response_;
281 bool completed_connect_; 280 bool completed_connect_;
282 281
283 // Set when Read() or Write() successfully reads or writes data to or from the 282 // Set when Read() or Write() successfully reads or writes data to or from the
284 // network. 283 // network.
285 bool was_ever_used_; 284 bool was_ever_used_;
286 285
287 // List of DER-encoded X.509 DistinguishedName of certificate authorities 286 // List of DER-encoded X.509 DistinguishedName of certificate authorities
288 // allowed by the server. 287 // allowed by the server.
289 std::vector<std::string> cert_authorities_; 288 std::vector<std::string> cert_authorities_;
290 // List of SSLClientCertType values for client certificates allowed by the 289 // List of SSLClientCertType values for client certificates allowed by the
(...skipping 70 matching lines...) Expand 10 before | Expand all | Expand 10 after
361 // True if PKP is bypassed due to a local trust anchor. 360 // True if PKP is bypassed due to a local trust anchor.
362 bool pkp_bypassed_; 361 bool pkp_bypassed_;
363 362
364 NetLogWithSource net_log_; 363 NetLogWithSource net_log_;
365 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; 364 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_;
366 }; 365 };
367 366
368 } // namespace net 367 } // namespace net
369 368
370 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ 369 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698