OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
7 | 7 |
8 #include <stddef.h> | 8 #include <stddef.h> |
9 #include <stdint.h> | 9 #include <stdint.h> |
10 | 10 |
(...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
194 void AddCTInfoToSSLInfo(SSLInfo* ssl_info) const; | 194 void AddCTInfoToSSLInfo(SSLInfo* ssl_info) const; |
195 | 195 |
196 // Returns a unique key string for the SSL session cache for | 196 // Returns a unique key string for the SSL session cache for |
197 // this socket. | 197 // this socket. |
198 std::string GetSessionCacheKey() const; | 198 std::string GetSessionCacheKey() const; |
199 | 199 |
200 // Returns true if renegotiations are allowed. | 200 // Returns true if renegotiations are allowed. |
201 bool IsRenegotiationAllowed() const; | 201 bool IsRenegotiationAllowed() const; |
202 | 202 |
203 // Callbacks for operations with the private key. | 203 // Callbacks for operations with the private key. |
204 int PrivateKeyTypeCallback(); | |
205 size_t PrivateKeyMaxSignatureLenCallback(); | |
206 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, | 204 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, |
207 size_t* out_len, | 205 size_t* out_len, |
208 size_t max_out, | 206 size_t max_out, |
209 const EVP_MD* md, | 207 const EVP_MD* md, |
210 const uint8_t* in, | 208 const uint8_t* in, |
211 size_t in_len); | 209 size_t in_len); |
212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, | 210 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
213 size_t* out_len, | 211 size_t* out_len, |
214 size_t max_out); | 212 size_t max_out); |
215 | 213 |
(...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
348 // True if PKP is bypassed due to a local trust anchor. | 346 // True if PKP is bypassed due to a local trust anchor. |
349 bool pkp_bypassed_; | 347 bool pkp_bypassed_; |
350 | 348 |
351 NetLogWithSource net_log_; | 349 NetLogWithSource net_log_; |
352 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 350 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
353 }; | 351 }; |
354 | 352 |
355 } // namespace net | 353 } // namespace net |
356 | 354 |
357 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 355 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
OLD | NEW |