Use EXPECT_EQ when possible.
[chromium-blink-merge.git] / net / ssl / ssl_config.cc
blob8efdd58386edfc5b02f99000f088b6b8ae65f2f7
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/ssl/ssl_config.h"
7 namespace net {
9 const uint16 kDefaultSSLVersionMin = SSL_PROTOCOL_VERSION_TLS1;
11 const uint16 kDefaultSSLVersionMax = SSL_PROTOCOL_VERSION_TLS1_2;
13 const uint16 kDefaultSSLVersionFallbackMin = SSL_PROTOCOL_VERSION_TLS1;
15 SSLConfig::CertAndStatus::CertAndStatus() : cert_status(0) {}
17 SSLConfig::CertAndStatus::~CertAndStatus() {}
19 SSLConfig::SSLConfig()
20 : rev_checking_enabled(false),
21 rev_checking_required_local_anchors(false),
22 version_min(kDefaultSSLVersionMin),
23 version_max(kDefaultSSLVersionMax),
24 version_fallback_min(kDefaultSSLVersionFallbackMin),
25 channel_id_enabled(true),
26 false_start_enabled(true),
27 signed_cert_timestamps_enabled(true),
28 require_forward_secrecy(false),
29 send_client_cert(false),
30 verify_ev_cert(false),
31 version_fallback(false),
32 cert_io_enabled(true) {
35 SSLConfig::~SSLConfig() {}
37 bool SSLConfig::IsAllowedBadCert(X509Certificate* cert,
38 CertStatus* cert_status) const {
39 std::string der_cert;
40 if (!X509Certificate::GetDEREncoded(cert->os_cert_handle(), &der_cert))
41 return false;
42 return IsAllowedBadCert(der_cert, cert_status);
45 bool SSLConfig::IsAllowedBadCert(const base::StringPiece& der_cert,
46 CertStatus* cert_status) const {
47 for (size_t i = 0; i < allowed_bad_certs.size(); ++i) {
48 if (der_cert == allowed_bad_certs[i].der_cert) {
49 if (cert_status)
50 *cert_status = allowed_bad_certs[i].cert_status;
51 return true;
54 return false;
57 } // namespace net