| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef NET_SSL_SSL_CONFIG_H_ | 5 #ifndef NET_SSL_SSL_CONFIG_H_ |
| 6 #define NET_SSL_SSL_CONFIG_H_ | 6 #define NET_SSL_SSL_CONFIG_H_ |
| 7 | 7 |
| 8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
| 9 #include "base/memory/ref_counted.h" | 9 #include "base/memory/ref_counted.h" |
| 10 #include "net/base/net_export.h" | 10 #include "net/base/net_export.h" |
| (...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 127 std::string der_cert; | 127 std::string der_cert; |
| 128 CertStatus cert_status; | 128 CertStatus cert_status; |
| 129 }; | 129 }; |
| 130 | 130 |
| 131 // Add any known-bad SSL certificate (with its cert status) to | 131 // Add any known-bad SSL certificate (with its cert status) to |
| 132 // |allowed_bad_certs| that should not trigger an ERR_CERT_* error when | 132 // |allowed_bad_certs| that should not trigger an ERR_CERT_* error when |
| 133 // calling SSLClientSocket::Connect. This would normally be done in | 133 // calling SSLClientSocket::Connect. This would normally be done in |
| 134 // response to the user explicitly accepting the bad certificate. | 134 // response to the user explicitly accepting the bad certificate. |
| 135 std::vector<CertAndStatus> allowed_bad_certs; | 135 std::vector<CertAndStatus> allowed_bad_certs; |
| 136 | 136 |
| 137 // True if we should send client_cert to the server. | 137 // True if we should send client_cert to the server (when acting as client). |
| 138 // When acting as server, overloaded to mean that we should request the client |
| 139 // to send a cert. |
| 138 bool send_client_cert; | 140 bool send_client_cert; |
| 139 | 141 |
| 140 bool verify_ev_cert; // True if we should verify the certificate for EV. | 142 bool verify_ev_cert; // True if we should verify the certificate for EV. |
| 141 | 143 |
| 142 bool version_fallback; // True if we are falling back to an older protocol | 144 bool version_fallback; // True if we are falling back to an older protocol |
| 143 // version (one still needs to decrement | 145 // version (one still needs to decrement |
| 144 // version_max). | 146 // version_max). |
| 145 | 147 |
| 146 // If cert_io_enabled is false, then certificate verification will not | 148 // If cert_io_enabled is false, then certificate verification will not |
| 147 // result in additional HTTP requests. (For example: to fetch missing | 149 // result in additional HTTP requests. (For example: to fetch missing |
| (...skipping 19 matching lines...) Expand all Loading... |
| 167 // |fastradio_padding_eligible| can be true when |fastradio_padding_enabled| | 169 // |fastradio_padding_eligible| can be true when |fastradio_padding_enabled| |
| 168 // is false: in this case, fastradio padding would not be enabled, but | 170 // is false: in this case, fastradio padding would not be enabled, but |
| 169 // metrics can be collected for experiments. | 171 // metrics can be collected for experiments. |
| 170 bool fastradio_padding_enabled; | 172 bool fastradio_padding_enabled; |
| 171 bool fastradio_padding_eligible; | 173 bool fastradio_padding_eligible; |
| 172 }; | 174 }; |
| 173 | 175 |
| 174 } // namespace net | 176 } // namespace net |
| 175 | 177 |
| 176 #endif // NET_SSL_SSL_CONFIG_H_ | 178 #endif // NET_SSL_SSL_CONFIG_H_ |
| OLD | NEW |