OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
7 | 7 |
8 #include <stddef.h> | 8 #include <stddef.h> |
9 #include <stdint.h> | 9 #include <stdint.h> |
10 | 10 |
(...skipping 197 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
208 size_t max_out, | 208 size_t max_out, |
209 const EVP_MD* md, | 209 const EVP_MD* md, |
210 const uint8_t* in, | 210 const uint8_t* in, |
211 size_t in_len); | 211 size_t in_len); |
212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, | 212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
213 size_t* out_len, | 213 size_t* out_len, |
214 size_t max_out); | 214 size_t max_out); |
215 | 215 |
216 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); | 216 void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature); |
217 | 217 |
| 218 // Called whenever BoringSSL processes a protocol message. |
| 219 void MessageCallback(int is_write, |
| 220 int content_type, |
| 221 const void* buf, |
| 222 size_t len); |
| 223 |
218 int TokenBindingAdd(const uint8_t** out, | 224 int TokenBindingAdd(const uint8_t** out, |
219 size_t* out_len, | 225 size_t* out_len, |
220 int* out_alert_value); | 226 int* out_alert_value); |
221 int TokenBindingParse(const uint8_t* contents, | 227 int TokenBindingParse(const uint8_t* contents, |
222 size_t contents_len, | 228 size_t contents_len, |
223 int* out_alert_value); | 229 int* out_alert_value); |
224 | 230 |
225 void LogConnectEndEvent(int rv); | 231 void LogConnectEndEvent(int rv); |
226 | 232 |
227 // Record whether ALPN was used, and if so, the negotiated protocol, | 233 // Record whether ALPN was used, and if so, the negotiated protocol, |
(...skipping 120 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
348 // True if PKP is bypassed due to a local trust anchor. | 354 // True if PKP is bypassed due to a local trust anchor. |
349 bool pkp_bypassed_; | 355 bool pkp_bypassed_; |
350 | 356 |
351 NetLogWithSource net_log_; | 357 NetLogWithSource net_log_; |
352 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 358 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
353 }; | 359 }; |
354 | 360 |
355 } // namespace net | 361 } // namespace net |
356 | 362 |
357 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 363 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
OLD | NEW |