Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(203)

Unified Diff: net/socket/ssl_client_socket.h

Issue 356713005: Rename ServerBoundCert => ChannelID to reflect the current name (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: fix cookies_list.js Created 6 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/socket/ssl_client_socket.h
diff --git a/net/socket/ssl_client_socket.h b/net/socket/ssl_client_socket.h
index a43e58cc26b852fb86d92a1a5ac7c4e7c357b286..99bdd41db1102011239029fab4c20de21437b950 100644
--- a/net/socket/ssl_client_socket.h
+++ b/net/socket/ssl_client_socket.h
@@ -18,7 +18,7 @@ namespace net {
class CertVerifier;
class CTVerifier;
-class ServerBoundCertService;
+class ChannelIDService;
class SSLCertRequestInfo;
struct SSLConfig;
class SSLInfo;
@@ -30,23 +30,23 @@ class X509Certificate;
struct SSLClientSocketContext {
SSLClientSocketContext()
: cert_verifier(NULL),
- server_bound_cert_service(NULL),
+ channel_id_service(NULL),
transport_security_state(NULL),
cert_transparency_verifier(NULL) {}
SSLClientSocketContext(CertVerifier* cert_verifier_arg,
- ServerBoundCertService* server_bound_cert_service_arg,
+ ChannelIDService* channel_id_service_arg,
TransportSecurityState* transport_security_state_arg,
CTVerifier* cert_transparency_verifier_arg,
const std::string& ssl_session_cache_shard_arg)
: cert_verifier(cert_verifier_arg),
- server_bound_cert_service(server_bound_cert_service_arg),
+ channel_id_service(channel_id_service_arg),
transport_security_state(transport_security_state_arg),
cert_transparency_verifier(cert_transparency_verifier_arg),
ssl_session_cache_shard(ssl_session_cache_shard_arg) {}
CertVerifier* cert_verifier;
- ServerBoundCertService* server_bound_cert_service;
+ ChannelIDService* channel_id_service;
TransportSecurityState* transport_security_state;
CTVerifier* cert_transparency_verifier;
// ssl_session_cache_shard is an opaque string that identifies a shard of the
@@ -121,9 +121,9 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
virtual void set_protocol_negotiated(NextProto protocol_negotiated);
- // Returns the ServerBoundCertService used by this socket, or NULL if
- // server bound certificates are not supported.
- virtual ServerBoundCertService* GetServerBoundCertService() const = 0;
+ // Returns the ChannelIDService used by this socket, or NULL if
+ // channel ids are not supported.
+ virtual ChannelIDService* GetChannelIDService() const = 0;
// Returns true if a channel ID was sent on this connection.
// This may be useful for protocols, like SPDY, which allow the same
@@ -145,7 +145,7 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
// Records histograms for channel id support during full handshakes - resumed
// handshakes are ignored.
static void RecordChannelIDSupport(
- ServerBoundCertService* server_bound_cert_service,
+ ChannelIDService* channel_id_service,
bool negotiated_channel_id,
bool channel_id_enabled,
bool supports_ecc);
@@ -153,7 +153,7 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
// Returns whether TLS channel ID is enabled.
static bool IsChannelIDEnabled(
const SSLConfig& ssl_config,
- ServerBoundCertService* server_bound_cert_service);
+ ChannelIDService* channel_id_service);
// For unit testing only.
// Returns the unverified certificate chain as presented by server.

Powered by Google App Engine
This is Rietveld 408576698