| // Copyright (c) 2019 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "net/third_party/quiche/src/quic/core/crypto/tls_client_connection.h" | 
 |  | 
 | namespace quic { | 
 |  | 
 | TlsClientConnection::TlsClientConnection(SSL_CTX* ssl_ctx, Delegate* delegate) | 
 |     : TlsConnection(ssl_ctx, delegate->ConnectionDelegate()), | 
 |       delegate_(delegate) {} | 
 |  | 
 | // static | 
 | bssl::UniquePtr<SSL_CTX> TlsClientConnection::CreateSslCtx() { | 
 |   bssl::UniquePtr<SSL_CTX> ssl_ctx = TlsConnection::CreateSslCtx(); | 
 |   // Configure certificate verification. | 
 |   // TODO(nharper): This only verifies certs on initial connection, not on | 
 |   // resumption. Chromium has this callback be a no-op and verifies the | 
 |   // certificate after the connection is complete. We need to re-verify on | 
 |   // resumption in case of expiration or revocation/distrust. | 
 |   SSL_CTX_set_custom_verify(ssl_ctx.get(), SSL_VERIFY_PEER, &VerifyCallback); | 
 |   return ssl_ctx; | 
 | } | 
 |  | 
 | // static | 
 | enum ssl_verify_result_t TlsClientConnection::VerifyCallback( | 
 |     SSL* ssl, | 
 |     uint8_t* out_alert) { | 
 |   return static_cast<TlsClientConnection*>(ConnectionFromSsl(ssl)) | 
 |       ->delegate_->VerifyCert(out_alert); | 
 | } | 
 |  | 
 | }  // namespace quic |