| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 5 #ifndef NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 6 #define NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| 7 | 7 |
| 8 #include <stddef.h> | 8 #include <stddef.h> |
| 9 #include <stdint.h> | 9 #include <stdint.h> |
| 10 | 10 |
| (...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 194 void AddCTInfoToSSLInfo(SSLInfo* ssl_info) const; | 194 void AddCTInfoToSSLInfo(SSLInfo* ssl_info) const; |
| 195 | 195 |
| 196 // Returns a unique key string for the SSL session cache for | 196 // Returns a unique key string for the SSL session cache for |
| 197 // this socket. | 197 // this socket. |
| 198 std::string GetSessionCacheKey() const; | 198 std::string GetSessionCacheKey() const; |
| 199 | 199 |
| 200 // Returns true if renegotiations are allowed. | 200 // Returns true if renegotiations are allowed. |
| 201 bool IsRenegotiationAllowed() const; | 201 bool IsRenegotiationAllowed() const; |
| 202 | 202 |
| 203 // Callbacks for operations with the private key. | 203 // Callbacks for operations with the private key. |
| 204 int PrivateKeyTypeCallback(); | |
| 205 size_t PrivateKeyMaxSignatureLenCallback(); | |
| 206 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, | 204 ssl_private_key_result_t PrivateKeySignDigestCallback(uint8_t* out, |
| 207 size_t* out_len, | 205 size_t* out_len, |
| 208 size_t max_out, | 206 size_t max_out, |
| 209 const EVP_MD* md, | 207 const EVP_MD* md, |
| 210 const uint8_t* in, | 208 const uint8_t* in, |
| 211 size_t in_len); | 209 size_t in_len); |
| 212 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, | 210 ssl_private_key_result_t PrivateKeyCompleteCallback(uint8_t* out, |
| 213 size_t* out_len, | 211 size_t* out_len, |
| 214 size_t max_out); | 212 size_t max_out); |
| 215 | 213 |
| (...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 348 // True if PKP is bypassed due to a local trust anchor. | 346 // True if PKP is bypassed due to a local trust anchor. |
| 349 bool pkp_bypassed_; | 347 bool pkp_bypassed_; |
| 350 | 348 |
| 351 NetLogWithSource net_log_; | 349 NetLogWithSource net_log_; |
| 352 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; | 350 base::WeakPtrFactory<SSLClientSocketImpl> weak_factory_; |
| 353 }; | 351 }; |
| 354 | 352 |
| 355 } // namespace net | 353 } // namespace net |
| 356 | 354 |
| 357 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ | 355 #endif // NET_SOCKET_SSL_CLIENT_SOCKET_IMPL_H_ |
| OLD | NEW |