| Index: net/socket/ssl_client_socket_mac.cc | 
| diff --git a/net/socket/ssl_client_socket_mac.cc b/net/socket/ssl_client_socket_mac.cc | 
| index f1d2278832aee55850a85060ca87f13a4ef8540c..a19c1b6f3ee5a980609605475444296bb7e6f71d 100644 | 
| --- a/net/socket/ssl_client_socket_mac.cc | 
| +++ b/net/socket/ssl_client_socket_mac.cc | 
| @@ -19,6 +19,7 @@ | 
| #include "net/base/net_log.h" | 
| #include "net/base/ssl_cert_request_info.h" | 
| #include "net/base/ssl_info.h" | 
| +#include "net/socket/client_socket_handle.h" | 
|  | 
| // Welcome to Mac SSL. We've been waiting for you. | 
| // | 
| @@ -496,7 +497,7 @@ EnabledCipherSuites::EnabledCipherSuites() { | 
|  | 
| //----------------------------------------------------------------------------- | 
|  | 
| -SSLClientSocketMac::SSLClientSocketMac(ClientSocket* transport_socket, | 
| +SSLClientSocketMac::SSLClientSocketMac(ClientSocketHandle* transport_socket, | 
| const std::string& hostname, | 
| const SSLConfig& ssl_config) | 
| : handshake_io_callback_(this, &SSLClientSocketMac::OnHandshakeIOComplete), | 
| @@ -518,7 +519,7 @@ SSLClientSocketMac::SSLClientSocketMac(ClientSocket* transport_socket, | 
| client_cert_requested_(false), | 
| ssl_context_(NULL), | 
| pending_send_error_(OK), | 
| -      net_log_(transport_socket->NetLog()) { | 
| +      net_log_(transport_socket->socket()->NetLog()) { | 
| } | 
|  | 
| SSLClientSocketMac::~SSLClientSocketMac() { | 
| @@ -560,7 +561,7 @@ void SSLClientSocketMac::Disconnect() { | 
|  | 
| // Shut down anything that may call us back. | 
| verifier_.reset(); | 
| -  transport_->Disconnect(); | 
| +  transport_->socket()->Disconnect(); | 
| } | 
|  | 
| bool SSLClientSocketMac::IsConnected() const { | 
| @@ -570,7 +571,7 @@ bool SSLClientSocketMac::IsConnected() const { | 
| // layer (HttpNetworkTransaction) needs to handle a persistent connection | 
| // closed by the server when we send a request anyway, a false positive in | 
| // exchange for simpler code is a good trade-off. | 
| -  return completed_handshake_ && transport_->IsConnected(); | 
| +  return completed_handshake_ && transport_->socket()->IsConnected(); | 
| } | 
|  | 
| bool SSLClientSocketMac::IsConnectedAndIdle() const { | 
| @@ -579,13 +580,14 @@ bool SSLClientSocketMac::IsConnectedAndIdle() const { | 
| // Strictly speaking, we should check if we have received the close_notify | 
| // alert message from the server, and return false in that case.  Although | 
| // the close_notify alert message means EOF in the SSL layer, it is just | 
| -  // bytes to the transport layer below, so transport_->IsConnectedAndIdle() | 
| -  // returns the desired false when we receive close_notify. | 
| -  return completed_handshake_ && transport_->IsConnectedAndIdle(); | 
| +  // bytes to the transport layer below, so | 
| +  // transport_->socket()->IsConnectedAndIdle() returns the desired false | 
| +  // when we receive close_notify. | 
| +  return completed_handshake_ && transport_->socket()->IsConnectedAndIdle(); | 
| } | 
|  | 
| int SSLClientSocketMac::GetPeerAddress(AddressList* address) const { | 
| -  return transport_->GetPeerAddress(address); | 
| +  return transport_->socket()->GetPeerAddress(address); | 
| } | 
|  | 
| int SSLClientSocketMac::Read(IOBuffer* buf, int buf_len, | 
| @@ -627,11 +629,11 @@ int SSLClientSocketMac::Write(IOBuffer* buf, int buf_len, | 
| } | 
|  | 
| bool SSLClientSocketMac::SetReceiveBufferSize(int32 size) { | 
| -  return transport_->SetReceiveBufferSize(size); | 
| +  return transport_->socket()->SetReceiveBufferSize(size); | 
| } | 
|  | 
| bool SSLClientSocketMac::SetSendBufferSize(int32 size) { | 
| -  return transport_->SetSendBufferSize(size); | 
| +  return transport_->socket()->SetSendBufferSize(size); | 
| } | 
|  | 
| void SSLClientSocketMac::GetSSLInfo(SSLInfo* ssl_info) { | 
| @@ -805,7 +807,7 @@ int SSLClientSocketMac::InitializeSSLContext() { | 
| // different peers, which puts us through certificate validation again | 
| // and catches hostname/certificate name mismatches. | 
| AddressList address; | 
| -    int rv = transport_->GetPeerAddress(&address); | 
| +    int rv = transport_->socket()->GetPeerAddress(&address); | 
| if (rv != OK) | 
| return rv; | 
| const struct addrinfo* ai = address.head(); | 
| @@ -1217,9 +1219,9 @@ OSStatus SSLClientSocketMac::SSLReadCallback(SSLConnectionRef connection, | 
| int rv = 1;  // any old value to spin the loop below | 
| while (rv > 0 && total_read < *data_length) { | 
| us->read_io_buf_ = new IOBuffer(*data_length - total_read); | 
| -    rv = us->transport_->Read(us->read_io_buf_, | 
| -                              *data_length - total_read, | 
| -                              &us->transport_read_callback_); | 
| +    rv = us->transport_->socket()->Read(us->read_io_buf_, | 
| +                                        *data_length - total_read, | 
| +                                        &us->transport_read_callback_); | 
|  | 
| if (rv >= 0) { | 
| us->recv_buffer_.insert(us->recv_buffer_.end(), | 
| @@ -1279,9 +1281,9 @@ OSStatus SSLClientSocketMac::SSLWriteCallback(SSLConnectionRef connection, | 
| us->write_io_buf_ = new IOBuffer(us->send_buffer_.size()); | 
| memcpy(us->write_io_buf_->data(), &us->send_buffer_[0], | 
| us->send_buffer_.size()); | 
| -    rv = us->transport_->Write(us->write_io_buf_, | 
| -                               us->send_buffer_.size(), | 
| -                               &us->transport_write_callback_); | 
| +    rv = us->transport_->socket()->Write(us->write_io_buf_, | 
| +                                         us->send_buffer_.size(), | 
| +                                         &us->transport_write_callback_); | 
| if (rv > 0) { | 
| us->send_buffer_.erase(us->send_buffer_.begin(), | 
| us->send_buffer_.begin() + rv); | 
|  |