| Index: net/socket/ssl_client_socket_nss.cc
|
| ===================================================================
|
| --- net/socket/ssl_client_socket_nss.cc (revision 65819)
|
| +++ net/socket/ssl_client_socket_nss.cc (working copy)
|
| @@ -397,6 +397,7 @@
|
|
|
| SSLClientSocketNSS::SSLClientSocketNSS(ClientSocketHandle* transport_socket,
|
| const std::string& hostname,
|
| + uint16 port,
|
| const SSLConfig& ssl_config,
|
| SSLHostInfo* ssl_host_info,
|
| DnsRRResolver* dnsrr_resolver)
|
| @@ -411,6 +412,7 @@
|
| this, &SSLClientSocketNSS::OnHandshakeIOComplete)),
|
| transport_(transport_socket),
|
| hostname_(hostname),
|
| + port_(port),
|
| ssl_config_(ssl_config),
|
| user_connect_callback_(NULL),
|
| user_read_callback_(NULL),
|
| @@ -858,10 +860,7 @@
|
| // Set the peer ID for session reuse. This is necessary when we create an
|
| // SSL tunnel through a proxy -- GetPeerName returns the proxy's address
|
| // rather than the destination server's address in that case.
|
| - // TODO(wtc): port in |peer_address| is not the server's port when a proxy is
|
| - // used.
|
| - std::string peer_id = base::StringPrintf("%s:%d", hostname_.c_str(),
|
| - peer_address.GetPort());
|
| + std::string peer_id = HostPortPair(hostname_, port_).ToString();
|
| SECStatus rv = SSL_SetSockPeerID(nss_fd_, const_cast<char*>(peer_id.c_str()));
|
| if (rv != SECSuccess)
|
| LogFailedNSSFunction(net_log_, "SSL_SetSockPeerID", peer_id.c_str());
|
| @@ -1184,7 +1183,7 @@
|
| void SSLClientSocketNSS::GetSSLCertRequestInfo(
|
| SSLCertRequestInfo* cert_request_info) {
|
| EnterFunction("");
|
| - cert_request_info->host_and_port = hostname_; // TODO(wtc): no port!
|
| + cert_request_info->host_and_port = HostPortPair(hostname_, port_).ToString();
|
| cert_request_info->client_certs = client_certs_;
|
| LeaveFunction(cert_request_info->client_certs.size());
|
| }
|
| @@ -2347,14 +2346,6 @@
|
| }
|
|
|
| int SSLClientSocketNSS::DoVerifyDNSSEC(int result) {
|
| -#if !defined(USE_OPENSSL)
|
| - if (ssl_config_.dns_cert_provenance_checking_enabled && dnsrr_resolver_) {
|
| - PeerCertificateChain certs(nss_fd_);
|
| - DoAsyncDNSCertProvenanceVerification(
|
| - hostname_, dnsrr_resolver_, certs.AsStringPieceVector());
|
| - }
|
| -#endif
|
| -
|
| if (ssl_config_.dnssec_enabled) {
|
| DNSValidationResult r = CheckDNSSECChain(hostname_, server_cert_nss_);
|
| if (r == DNSVR_SUCCESS) {
|
|
|