OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_SSL_SSL_CONFIG_H_ | 5 #ifndef NET_SSL_SSL_CONFIG_H_ |
6 #define NET_SSL_SSL_CONFIG_H_ | 6 #define NET_SSL_SSL_CONFIG_H_ |
7 | 7 |
8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
9 #include "base/memory/ref_counted.h" | 9 #include "base/memory/ref_counted.h" |
10 #include "net/base/net_export.h" | 10 #include "net/base/net_export.h" |
(...skipping 116 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
127 std::string der_cert; | 127 std::string der_cert; |
128 CertStatus cert_status; | 128 CertStatus cert_status; |
129 }; | 129 }; |
130 | 130 |
131 // Add any known-bad SSL certificate (with its cert status) to | 131 // Add any known-bad SSL certificate (with its cert status) to |
132 // |allowed_bad_certs| that should not trigger an ERR_CERT_* error when | 132 // |allowed_bad_certs| that should not trigger an ERR_CERT_* error when |
133 // calling SSLClientSocket::Connect. This would normally be done in | 133 // calling SSLClientSocket::Connect. This would normally be done in |
134 // response to the user explicitly accepting the bad certificate. | 134 // response to the user explicitly accepting the bad certificate. |
135 std::vector<CertAndStatus> allowed_bad_certs; | 135 std::vector<CertAndStatus> allowed_bad_certs; |
136 | 136 |
137 // True if we should send client_cert to the server. | 137 // True if we should send client_cert to the server (when acting as client). |
| 138 // When acting as server, overloaded to mean that we should request the client |
| 139 // to send a cert. |
138 bool send_client_cert; | 140 bool send_client_cert; |
139 | 141 |
140 bool verify_ev_cert; // True if we should verify the certificate for EV. | 142 bool verify_ev_cert; // True if we should verify the certificate for EV. |
141 | 143 |
142 bool version_fallback; // True if we are falling back to an older protocol | 144 bool version_fallback; // True if we are falling back to an older protocol |
143 // version (one still needs to decrement | 145 // version (one still needs to decrement |
144 // version_max). | 146 // version_max). |
145 | 147 |
146 // If cert_io_enabled is false, then certificate verification will not | 148 // If cert_io_enabled is false, then certificate verification will not |
147 // result in additional HTTP requests. (For example: to fetch missing | 149 // result in additional HTTP requests. (For example: to fetch missing |
(...skipping 19 matching lines...) Expand all Loading... |
167 // |fastradio_padding_eligible| can be true when |fastradio_padding_enabled| | 169 // |fastradio_padding_eligible| can be true when |fastradio_padding_enabled| |
168 // is false: in this case, fastradio padding would not be enabled, but | 170 // is false: in this case, fastradio padding would not be enabled, but |
169 // metrics can be collected for experiments. | 171 // metrics can be collected for experiments. |
170 bool fastradio_padding_enabled; | 172 bool fastradio_padding_enabled; |
171 bool fastradio_padding_eligible; | 173 bool fastradio_padding_eligible; |
172 }; | 174 }; |
173 | 175 |
174 } // namespace net | 176 } // namespace net |
175 | 177 |
176 #endif // NET_SSL_SSL_CONFIG_H_ | 178 #endif // NET_SSL_SSL_CONFIG_H_ |
OLD | NEW |