Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 #include <stdint.h> | 9 #include <stdint.h> |
| 10 | 10 |
| (...skipping 200 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 211 size_t max_out, | 211 size_t max_out, |
| 212 const EVP_MD* md, | 212 const EVP_MD* md, |
| 213 const uint8_t* in, | 213 const uint8_t* in, |
| 214 size_t in_len); | 214 size_t in_len); |
| 215 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, | 215 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
| 216 size_t* out_len, | 216 size_t* out_len, |
| 217 size_t max_out); | 217 size_t max_out); |
| 218 | 218 |
| 219 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); | 219 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); |
| 220 | 220 |
| 221 void MessageCallback(int is_write, | |
|
eroman
2017/02/17 22:16:51
Documentation?
davidben
2017/04/18 20:51:17
Done.
| |
| 222 int content_type, | |
| 223 const void* buf, | |
| 224 size_t len); | |
| 225 | |
| 221 int TokenBindingAdd(const uint8_t** out, | 226 int TokenBindingAdd(const uint8_t** out, |
| 222 size_t* out_len, | 227 size_t* out_len, |
| 223 int* out_alert_value); | 228 int* out_alert_value); |
| 224 int TokenBindingParse(const uint8_t* contents, | 229 int TokenBindingParse(const uint8_t* contents, |
| 225 size_t contents_len, | 230 size_t contents_len, |
| 226 int* out_alert_value); | 231 int* out_alert_value); |
| 227 | 232 |
| 228 void LogConnectEndEvent(int rv); | 233 void LogConnectEndEvent(int rv); |
| 229 | 234 |
| 230 // Record whether ALPN was used, and if so, the negotiated protocol, | 235 // Record whether ALPN was used, and if so, the negotiated protocol, |
| (...skipping 121 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 352 // True if PKP is bypassed due to a local trust anchor. | 357 // True if PKP is bypassed due to a local trust anchor. |
| 353 bool pkp_bypassed_; | 358 bool pkp_bypassed_; |
| 354 | 359 |
| 355 NetLogWithSource net_log_; | 360 NetLogWithSource net_log_; |
| 356 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 361 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
| 357 }; | 362 }; |
| 358 | 363 |
| 359 } // namespace net | 364 } // namespace net |
| 360 | 365 |
| 361 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 366 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| OLD | NEW |