diff options
author | joth@chromium.org <joth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-12-02 10:04:10 +0000 |
---|---|---|
committer | joth@chromium.org <joth@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-12-02 10:04:10 +0000 |
commit | 718c967f73fbdc4193e11930e5fe3bb5ff6ab6a5 (patch) | |
tree | a96e859ea1efeec2bc25ae76bdbf317e631c0d1c /net/socket/ssl_client_socket_openssl.h | |
parent | 9c635f24128b5638dac833499fb1fd5ee2be6375 (diff) | |
download | chromium_src-718c967f73fbdc4193e11930e5fe3bb5ff6ab6a5.zip chromium_src-718c967f73fbdc4193e11930e5fe3bb5ff6ab6a5.tar.gz chromium_src-718c967f73fbdc4193e11930e5fe3bb5ff6ab6a5.tar.bz2 |
Fixes the remaining unit tests failures for OpenSSL:
- implements basic client certificate support in ssl socket
- adds special-case IP address support to allow SSL connections to the test server (iff there is a trusted certificate in the store with 127.0.0.1 in its name)
- enables the test server for loading the temporary cert
- implements the DES encryptor (removed TODO about refactoring the file layout as it's already covered by a TODO in the .h file)
- disabled KeygenHandler tests, as this is not implemented for openssl
- disables the (firefox) importer unittests.
BUG=None
TEST=net_unittests now run green
Review URL: http://codereview.chromium.org/5195001
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@67990 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_client_socket_openssl.h')
-rw-r--r-- | net/socket/ssl_client_socket_openssl.h | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/net/socket/ssl_client_socket_openssl.h b/net/socket/ssl_client_socket_openssl.h index e7bfe3c..99e92f2 100644 --- a/net/socket/ssl_client_socket_openssl.h +++ b/net/socket/ssl_client_socket_openssl.h @@ -15,7 +15,9 @@ #include "net/socket/client_socket_handle.h" typedef struct bio_st BIO; +typedef struct evp_pkey_st EVP_PKEY; typedef struct ssl_st SSL; +typedef struct x509_st X509; namespace net { @@ -38,6 +40,10 @@ class SSLClientSocketOpenSSL : public SSLClientSocket { const HostPortPair& host_and_port() const { return host_and_port_; } + // Callback from the SSL layer that indicates the remote server is requesting + // a certificate for this client. + int ClientCertRequestCallback(SSL* ssl, X509** x509, EVP_PKEY** pkey); + // SSLClientSocket methods: virtual void GetSSLInfo(SSLInfo* ssl_info); virtual void GetSSLCertRequestInfo(SSLCertRequestInfo* cert_request_info); @@ -71,7 +77,6 @@ class SSLClientSocketOpenSSL : public SSLClientSocket { int DoVerifyCert(int result); int DoVerifyCertComplete(int result); void DoConnectCallback(int result); - void InvalidateSessionIfBadCertificate(); X509Certificate* UpdateServerCert(); void OnHandshakeIOComplete(int result); |