summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_client_socket.h
diff options
context:
space:
mode:
authorszym@chromium.org <szym@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-13 20:27:14 +0000
committerszym@chromium.org <szym@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-13 20:27:14 +0000
commit09ac0db93bf70afdb1e7fece9048fd48841b4151 (patch)
treed9fdef93c041fc74cf71bed04edd4a7fc130b224 /net/socket/ssl_client_socket.h
parent8393c30362716313ccc200e7c11c761eb0a42982 (diff)
downloadchromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.zip
chromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.tar.gz
chromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.tar.bz2
Revert of https://codereview.chromium.org/92443002/
Reason for revert: Does not compile on CrOS amd64 net/cert/ct_objects_extractor_nss.cc:528:66: error: narrowing conversion (...) from 'std::basic_string<char>::size_type {aka long unsigned int}' to 'unsigned int' inside { } is ill-formed in C++11 [-Werror=narrowing] ocsp_response.data())), ocsp_response.size() }; TBR=wtc@chromium.org,rsleevi@chromium.org,ekasper@google.com NOTREECHECKS=true NOTRY=true Review URL: https://codereview.chromium.org/108113006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240731 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_client_socket.h')
-rw-r--r--net/socket/ssl_client_socket.h20
1 files changed, 6 insertions, 14 deletions
diff --git a/net/socket/ssl_client_socket.h b/net/socket/ssl_client_socket.h
index 410062d..40840e4 100644
--- a/net/socket/ssl_client_socket.h
+++ b/net/socket/ssl_client_socket.h
@@ -7,7 +7,6 @@
#include <string>
-#include "base/gtest_prod_util.h"
#include "net/base/completion_callback.h"
#include "net/base/load_flags.h"
#include "net/base/net_errors.h"
@@ -132,15 +131,18 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
// Public for ssl_client_socket_openssl_unittest.cc.
virtual bool WasChannelIDSent() const;
+ // Returns true if the server sent Certificate Transparency SCTs
+ // via a TLS extension.
+ // Temporary glue for testing while the CT code hasn't landed.
+ // TODO(ekasper): expose received SCTs via SSLInfo instead.
+ virtual bool WereSignedCertTimestampsReceived() const;
+
protected:
virtual void set_channel_id_sent(bool channel_id_sent);
virtual void set_signed_cert_timestamps_received(
bool signed_cert_timestamps_received);
- virtual void set_stapled_ocsp_response_received(
- bool stapled_ocsp_response_received);
-
// Records histograms for channel id support during full handshakes - resumed
// handshakes are ignored.
static void RecordChannelIDSupport(
@@ -155,14 +157,6 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
ServerBoundCertService* server_bound_cert_service);
private:
- // For signed_cert_timestamps_received_ and stapled_ocsp_response_received_.
- FRIEND_TEST_ALL_PREFIXES(SSLClientSocketTest,
- ConnectSignedCertTimestampsEnabledTLSExtension);
- FRIEND_TEST_ALL_PREFIXES(SSLClientSocketTest,
- ConnectSignedCertTimestampsEnabledOCSP);
- FRIEND_TEST_ALL_PREFIXES(SSLClientSocketTest,
- ConnectSignedCertTimestampsDisabled);
-
// True if NPN was responded to, independent of selecting SPDY or HTTP.
bool was_npn_negotiated_;
// True if NPN successfully negotiated SPDY.
@@ -173,8 +167,6 @@ class NET_EXPORT SSLClientSocket : public SSLSocket {
bool channel_id_sent_;
// True if SCTs were received via a TLS extension.
bool signed_cert_timestamps_received_;
- // True if a stapled OCSP response was received.
- bool stapled_ocsp_response_received_;
};
} // namespace net