| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 #include <stdint.h> | 9 #include <stdint.h> |
| 10 | 10 |
| (...skipping 197 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 208 size_t max_out, | 208 size_t max_out, |
| 209 const EVP_MD* md, | 209 const EVP_MD* md, |
| 210 const uint8_t* in, | 210 const uint8_t* in, |
| 211 size_t in_len); | 211 size_t in_len); |
| 212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, | 212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
| 213 size_t* out_len, | 213 size_t* out_len, |
| 214 size_t max_out); | 214 size_t max_out); |
| 215 | 215 |
| 216 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); | 216 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); |
| 217 | 217 |
| 218 // Called whenever BoringSSL processes a protocol message. |
| 219 void MessageCallback(int is_write, |
| 220 int content_type, |
| 221 const void* buf, |
| 222 size_t len); |
| 223 |
| 218 int TokenBindingAdd(const uint8_t** out, | 224 int TokenBindingAdd(const uint8_t** out, |
| 219 size_t* out_len, | 225 size_t* out_len, |
| 220 int* out_alert_value); | 226 int* out_alert_value); |
| 221 int TokenBindingParse(const uint8_t* contents, | 227 int TokenBindingParse(const uint8_t* contents, |
| 222 size_t contents_len, | 228 size_t contents_len, |
| 223 int* out_alert_value); | 229 int* out_alert_value); |
| 224 | 230 |
| 225 void LogConnectEndEvent(int rv); | 231 void LogConnectEndEvent(int rv); |
| 226 | 232 |
| 227 // Record whether ALPN was used, and if so, the negotiated protocol, | 233 // Record whether ALPN was used, and if so, the negotiated protocol, |
| (...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 348 // True if PKP is bypassed due to a local trust anchor. | 354 // True if PKP is bypassed due to a local trust anchor. |
| 349 bool pkp_bypassed_; | 355 bool pkp_bypassed_; |
| 350 | 356 |
| 351 NetLogWithSource net_log_; | 357 NetLogWithSource net_log_; |
| 352 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 358 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
| 353 }; | 359 }; |
| 354 | 360 |
| 355 } // namespace net | 361 } // namespace net |
| 356 | 362 |
| 357 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 363 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| OLD | NEW |