Index: net/socket/ssl_client_socket.h |
diff --git a/net/socket/ssl_client_socket.h b/net/socket/ssl_client_socket.h |
index a43e58cc26b852fb86d92a1a5ac7c4e7c357b286..99bdd41db1102011239029fab4c20de21437b950 100644 |
--- a/net/socket/ssl_client_socket.h |
+++ b/net/socket/ssl_client_socket.h |
@@ -18,7 +18,7 @@ namespace net { |
class CertVerifier; |
class CTVerifier; |
-class ServerBoundCertService; |
+class ChannelIDService; |
class SSLCertRequestInfo; |
struct SSLConfig; |
class SSLInfo; |
@@ -30,23 +30,23 @@ class X509Certificate; |
struct SSLClientSocketContext { |
SSLClientSocketContext() |
: cert_verifier(NULL), |
- server_bound_cert_service(NULL), |
+ channel_id_service(NULL), |
transport_security_state(NULL), |
cert_transparency_verifier(NULL) {} |
SSLClientSocketContext(CertVerifier* cert_verifier_arg, |
- ServerBoundCertService* server_bound_cert_service_arg, |
+ ChannelIDService* channel_id_service_arg, |
TransportSecurityState* transport_security_state_arg, |
CTVerifier* cert_transparency_verifier_arg, |
const std::string& ssl_session_cache_shard_arg) |
: cert_verifier(cert_verifier_arg), |
- server_bound_cert_service(server_bound_cert_service_arg), |
+ channel_id_service(channel_id_service_arg), |
transport_security_state(transport_security_state_arg), |
cert_transparency_verifier(cert_transparency_verifier_arg), |
ssl_session_cache_shard(ssl_session_cache_shard_arg) {} |
CertVerifier* cert_verifier; |
- ServerBoundCertService* server_bound_cert_service; |
+ ChannelIDService* channel_id_service; |
TransportSecurityState* transport_security_state; |
CTVerifier* cert_transparency_verifier; |
// ssl_session_cache_shard is an opaque string that identifies a shard of the |
@@ -121,9 +121,9 @@ class NET_EXPORT SSLClientSocket : public SSLSocket { |
virtual void set_protocol_negotiated(NextProto protocol_negotiated); |
- // Returns the ServerBoundCertService used by this socket, or NULL if |
- // server bound certificates are not supported. |
- virtual ServerBoundCertService* GetServerBoundCertService() const = 0; |
+ // Returns the ChannelIDService used by this socket, or NULL if |
+ // channel ids are not supported. |
+ virtual ChannelIDService* GetChannelIDService() const = 0; |
// Returns true if a channel ID was sent on this connection. |
// This may be useful for protocols, like SPDY, which allow the same |
@@ -145,7 +145,7 @@ class NET_EXPORT SSLClientSocket : public SSLSocket { |
// Records histograms for channel id support during full handshakes - resumed |
// handshakes are ignored. |
static void RecordChannelIDSupport( |
- ServerBoundCertService* server_bound_cert_service, |
+ ChannelIDService* channel_id_service, |
bool negotiated_channel_id, |
bool channel_id_enabled, |
bool supports_ecc); |
@@ -153,7 +153,7 @@ class NET_EXPORT SSLClientSocket : public SSLSocket { |
// Returns whether TLS channel ID is enabled. |
static bool IsChannelIDEnabled( |
const SSLConfig& ssl_config, |
- ServerBoundCertService* server_bound_cert_service); |
+ ChannelIDService* channel_id_service); |
// For unit testing only. |
// Returns the unverified certificate chain as presented by server. |