Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(362)

Side by Side Diff: net/ssl/ssl_config.h

Issue 2800853008: Add a dedicated error code for TLS 1.3 interference. (Closed)
Patch Set: mpearson comment Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/socket/ssl_client_socket_unittest.cc ('k') | net/ssl/ssl_config.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_SSL_SSL_CONFIG_H_ 5 #ifndef NET_SSL_SSL_CONFIG_H_
6 #define NET_SSL_SSL_CONFIG_H_ 6 #define NET_SSL_SSL_CONFIG_H_
7 7
8 #include <stdint.h> 8 #include <stdint.h>
9 9
10 #include "base/memory/ref_counted.h" 10 #include "base/memory/ref_counted.h"
(...skipping 96 matching lines...) Expand 10 before | Expand all | Expand 10 after
107 // 107 //
108 // NOTE: because they are under a fallback, connections are still vulnerable 108 // NOTE: because they are under a fallback, connections are still vulnerable
109 // to them as far as downgrades are concerned, so this should only be used for 109 // to them as far as downgrades are concerned, so this should only be used for
110 // measurement of ciphers not to be carried long-term. It is no fix for 110 // measurement of ciphers not to be carried long-term. It is no fix for
111 // servers with bad configurations without full removal. 111 // servers with bad configurations without full removal.
112 // 112 //
113 // TODO(davidben): This is no longer used. Remove 113 // TODO(davidben): This is no longer used. Remove
114 // it. https://crbug.com/684730. 114 // it. https://crbug.com/684730.
115 bool deprecated_cipher_suites_enabled; 115 bool deprecated_cipher_suites_enabled;
116 116
117 // Enables the version interference probing mode. While TLS 1.3 has avoided
118 // most endpoint intolerance, middlebox interference with TLS 1.3 is
119 // rampant. This causes the connection to be discarded on success with
120 // ERR_SSL_VERSION_INTERFERENCE.
121 bool version_interference_probe;
122
117 bool channel_id_enabled; // True if TLS channel ID extension is enabled. 123 bool channel_id_enabled; // True if TLS channel ID extension is enabled.
118 124
119 // List of Token Binding key parameters supported by the client. If empty, 125 // List of Token Binding key parameters supported by the client. If empty,
120 // Token Binding will be disabled, even if token_binding_enabled is true. 126 // Token Binding will be disabled, even if token_binding_enabled is true.
121 std::vector<TokenBindingParam> token_binding_params; 127 std::vector<TokenBindingParam> token_binding_params;
122 128
123 bool false_start_enabled; // True if we'll use TLS False Start. 129 bool false_start_enabled; // True if we'll use TLS False Start.
124 // True if the Certificate Transparency signed_certificate_timestamp 130 // True if the Certificate Transparency signed_certificate_timestamp
125 // TLS extension is enabled. 131 // TLS extension is enabled.
126 bool signed_cert_timestamps_enabled; 132 bool signed_cert_timestamps_enabled;
(...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after
171 // The list of application-level protocols to enable renegotiation for. 177 // The list of application-level protocols to enable renegotiation for.
172 NextProtoVector renego_allowed_for_protos; 178 NextProtoVector renego_allowed_for_protos;
173 179
174 scoped_refptr<X509Certificate> client_cert; 180 scoped_refptr<X509Certificate> client_cert;
175 scoped_refptr<SSLPrivateKey> client_private_key; 181 scoped_refptr<SSLPrivateKey> client_private_key;
176 }; 182 };
177 183
178 } // namespace net 184 } // namespace net
179 185
180 #endif // NET_SSL_SSL_CONFIG_H_ 186 #endif // NET_SSL_SSL_CONFIG_H_
OLDNEW
« no previous file with comments | « net/socket/ssl_client_socket_unittest.cc ('k') | net/ssl/ssl_config.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698