| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/ssl_client_socket_impl.h" | 5 #include "net/socket/ssl_client_socket_impl.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <string.h> | 8 #include <string.h> |
| 9 | 9 |
| 10 #include <algorithm> | 10 #include <algorithm> |
| (...skipping 64 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 75 const int kNoPendingResult = 1; | 75 const int kNoPendingResult = 1; |
| 76 | 76 |
| 77 // Default size of the internal BoringSSL buffers. | 77 // Default size of the internal BoringSSL buffers. |
| 78 const int kDefaultOpenSSLBufferSize = 17 * 1024; | 78 const int kDefaultOpenSSLBufferSize = 17 * 1024; |
| 79 | 79 |
| 80 // TLS extension number use for Token Binding. | 80 // TLS extension number use for Token Binding. |
| 81 const unsigned int kTbExtNum = 24; | 81 const unsigned int kTbExtNum = 24; |
| 82 | 82 |
| 83 // Token Binding ProtocolVersions supported. | 83 // Token Binding ProtocolVersions supported. |
| 84 const uint8_t kTbProtocolVersionMajor = 0; | 84 const uint8_t kTbProtocolVersionMajor = 0; |
| 85 const uint8_t kTbProtocolVersionMinor = 10; | 85 const uint8_t kTbProtocolVersionMinor = 13; |
| 86 const uint8_t kTbMinProtocolVersionMajor = 0; | 86 const uint8_t kTbMinProtocolVersionMajor = 0; |
| 87 const uint8_t kTbMinProtocolVersionMinor = 10; | 87 const uint8_t kTbMinProtocolVersionMinor = 10; |
| 88 | 88 |
| 89 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { | 89 bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) { |
| 90 switch (EVP_MD_type(md)) { | 90 switch (EVP_MD_type(md)) { |
| 91 case NID_md5_sha1: | 91 case NID_md5_sha1: |
| 92 *hash = SSLPrivateKey::Hash::MD5_SHA1; | 92 *hash = SSLPrivateKey::Hash::MD5_SHA1; |
| 93 return true; | 93 return true; |
| 94 case NID_sha1: | 94 case NID_sha1: |
| 95 *hash = SSLPrivateKey::Hash::SHA1; | 95 *hash = SSLPrivateKey::Hash::SHA1; |
| (...skipping 1953 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2049 if (ERR_GET_REASON(info->error_code) == SSL_R_TLSV1_ALERT_ACCESS_DENIED && | 2049 if (ERR_GET_REASON(info->error_code) == SSL_R_TLSV1_ALERT_ACCESS_DENIED && |
| 2050 !certificate_requested_) { | 2050 !certificate_requested_) { |
| 2051 net_error = ERR_SSL_PROTOCOL_ERROR; | 2051 net_error = ERR_SSL_PROTOCOL_ERROR; |
| 2052 } | 2052 } |
| 2053 } | 2053 } |
| 2054 | 2054 |
| 2055 return net_error; | 2055 return net_error; |
| 2056 } | 2056 } |
| 2057 | 2057 |
| 2058 } // namespace net | 2058 } // namespace net |
| OLD | NEW |