| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/crypto_handshake.h" | 5 #include "net/quic/crypto/crypto_handshake.h" |
| 6 | 6 |
| 7 #include <ctype.h> | 7 #include <ctype.h> |
| 8 | 8 |
| 9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
| 10 #include "base/stl_util.h" | 10 #include "base/stl_util.h" |
| (...skipping 555 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 566 // TODO(rtenneti): Enable ECDSA proof verification on Windows. Disabled it | 566 // TODO(rtenneti): Enable ECDSA proof verification on Windows. Disabled it |
| 567 // because X509Certificate::GetPublicKeyInfo is not returning the correct | 567 // because X509Certificate::GetPublicKeyInfo is not returning the correct |
| 568 // type for ECDSA certificates. | 568 // type for ECDSA certificates. |
| 569 #if defined(OS_WIN) | 569 #if defined(OS_WIN) |
| 570 out->SetTaglist(kPDMD, kX59R, 0); | 570 out->SetTaglist(kPDMD, kX59R, 0); |
| 571 #else | 571 #else |
| 572 out->SetTaglist(kPDMD, kX509, 0); | 572 out->SetTaglist(kPDMD, kX509, 0); |
| 573 #endif | 573 #endif |
| 574 } | 574 } |
| 575 | 575 |
| 576 if (proof_verifier_.get() && !cached->proof_valid()) { |
| 577 // If we are expecting a certificate chain, double the size of the client |
| 578 // hello so that the response from the server can be larger - hopefully |
| 579 // including the whole certificate chain. |
| 580 out->set_minimum_size(kClientHelloMinimumSize * 2); |
| 581 } |
| 582 |
| 576 if (common_cert_sets) { | 583 if (common_cert_sets) { |
| 577 out->SetStringPiece(kCCS, common_cert_sets->GetCommonHashes()); | 584 out->SetStringPiece(kCCS, common_cert_sets->GetCommonHashes()); |
| 578 } | 585 } |
| 579 | 586 |
| 580 const vector<string>& certs = cached->certs(); | 587 const vector<string>& certs = cached->certs(); |
| 581 // We save |certs| in the QuicCryptoNegotiatedParameters so that, if the | 588 // We save |certs| in the QuicCryptoNegotiatedParameters so that, if the |
| 582 // client config is being used for multiple connections, another connection | 589 // client config is being used for multiple connections, another connection |
| 583 // doesn't update the cached certificates and cause us to be unable to | 590 // doesn't update the cached certificates and cause us to be unable to |
| 584 // process the server's compressed certificate chain. | 591 // process the server's compressed certificate chain. |
| 585 out_params->cached_certs = certs; | 592 out_params->cached_certs = certs; |
| (...skipping 287 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 873 | 880 |
| 874 ChannelIDSigner* QuicCryptoClientConfig::channel_id_signer() const { | 881 ChannelIDSigner* QuicCryptoClientConfig::channel_id_signer() const { |
| 875 return channel_id_signer_.get(); | 882 return channel_id_signer_.get(); |
| 876 } | 883 } |
| 877 | 884 |
| 878 void QuicCryptoClientConfig::SetChannelIDSigner(ChannelIDSigner* signer) { | 885 void QuicCryptoClientConfig::SetChannelIDSigner(ChannelIDSigner* signer) { |
| 879 channel_id_signer_.reset(signer); | 886 channel_id_signer_.reset(signer); |
| 880 } | 887 } |
| 881 | 888 |
| 882 } // namespace net | 889 } // namespace net |
| OLD | NEW |