| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/quic_crypto_client_config.h" | 5 #include "net/quic/crypto/quic_crypto_client_config.h" |
| 6 | 6 |
| 7 #include "base/stl_util.h" | 7 #include "base/stl_util.h" |
| 8 #include "base/strings/string_util.h" | 8 #include "base/strings/string_util.h" |
| 9 #include "net/quic/crypto/cert_compressor.h" | 9 #include "net/quic/crypto/cert_compressor.h" |
| 10 #include "net/quic/crypto/chacha20_poly1305_encrypter.h" | 10 #include "net/quic/crypto/chacha20_poly1305_encrypter.h" |
| (...skipping 287 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 298 out->set_tag(kCHLO); | 298 out->set_tag(kCHLO); |
| 299 out->set_minimum_size(kClientHelloMinimumSize); | 299 out->set_minimum_size(kClientHelloMinimumSize); |
| 300 | 300 |
| 301 // Server name indication. We only send SNI if it's a valid domain name, as | 301 // Server name indication. We only send SNI if it's a valid domain name, as |
| 302 // per the spec. | 302 // per the spec. |
| 303 if (CryptoUtils::IsValidSNI(server_id.host())) { | 303 if (CryptoUtils::IsValidSNI(server_id.host())) { |
| 304 out->SetStringPiece(kSNI, server_id.host()); | 304 out->SetStringPiece(kSNI, server_id.host()); |
| 305 } | 305 } |
| 306 out->SetValue(kVER, QuicVersionToQuicTag(preferred_version)); | 306 out->SetValue(kVER, QuicVersionToQuicTag(preferred_version)); |
| 307 | 307 |
| 308 if (!client_version_.empty()) { |
| 309 out->SetStringPiece(kCVER, client_version_); |
| 310 } |
| 311 |
| 308 if (!cached->source_address_token().empty()) { | 312 if (!cached->source_address_token().empty()) { |
| 309 out->SetStringPiece(kSourceAddressTokenTag, cached->source_address_token()); | 313 out->SetStringPiece(kSourceAddressTokenTag, cached->source_address_token()); |
| 310 } | 314 } |
| 311 | 315 |
| 312 if (server_id.is_https()) { | 316 if (server_id.is_https()) { |
| 313 if (disable_ecdsa_) { | 317 if (disable_ecdsa_) { |
| 314 out->SetTaglist(kPDMD, kX59R, 0); | 318 out->SetTaglist(kPDMD, kX59R, 0); |
| 315 } else { | 319 } else { |
| 316 out->SetTaglist(kPDMD, kX509, 0); | 320 out->SetTaglist(kPDMD, kX509, 0); |
| 317 } | 321 } |
| (...skipping 442 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 760 return; | 764 return; |
| 761 } | 765 } |
| 762 | 766 |
| 763 // Update canonical version to point at the "most recent" entry. | 767 // Update canonical version to point at the "most recent" entry. |
| 764 canonical_server_map_[suffix_server_id] = server_id; | 768 canonical_server_map_[suffix_server_id] = server_id; |
| 765 | 769 |
| 766 server_state->InitializeFrom(*canonical_state); | 770 server_state->InitializeFrom(*canonical_state); |
| 767 } | 771 } |
| 768 | 772 |
| 769 } // namespace net | 773 } // namespace net |
| OLD | NEW |