| Index: net/socket/ssl_client_socket_nss.cc | 
| =================================================================== | 
| --- net/socket/ssl_client_socket_nss.cc	(revision 65819) | 
| +++ net/socket/ssl_client_socket_nss.cc	(working copy) | 
| @@ -397,6 +397,7 @@ | 
|  | 
| SSLClientSocketNSS::SSLClientSocketNSS(ClientSocketHandle* transport_socket, | 
| const std::string& hostname, | 
| +                                       uint16 port, | 
| const SSLConfig& ssl_config, | 
| SSLHostInfo* ssl_host_info, | 
| DnsRRResolver* dnsrr_resolver) | 
| @@ -411,6 +412,7 @@ | 
| this, &SSLClientSocketNSS::OnHandshakeIOComplete)), | 
| transport_(transport_socket), | 
| hostname_(hostname), | 
| +      port_(port), | 
| ssl_config_(ssl_config), | 
| user_connect_callback_(NULL), | 
| user_read_callback_(NULL), | 
| @@ -858,10 +860,7 @@ | 
| // Set the peer ID for session reuse.  This is necessary when we create an | 
| // SSL tunnel through a proxy -- GetPeerName returns the proxy's address | 
| // rather than the destination server's address in that case. | 
| -  // TODO(wtc): port in |peer_address| is not the server's port when a proxy is | 
| -  // used. | 
| -  std::string peer_id = base::StringPrintf("%s:%d", hostname_.c_str(), | 
| -                                           peer_address.GetPort()); | 
| +  std::string peer_id = HostPortPair(hostname_, port_).ToString(); | 
| SECStatus rv = SSL_SetSockPeerID(nss_fd_, const_cast<char*>(peer_id.c_str())); | 
| if (rv != SECSuccess) | 
| LogFailedNSSFunction(net_log_, "SSL_SetSockPeerID", peer_id.c_str()); | 
| @@ -1184,7 +1183,7 @@ | 
| void SSLClientSocketNSS::GetSSLCertRequestInfo( | 
| SSLCertRequestInfo* cert_request_info) { | 
| EnterFunction(""); | 
| -  cert_request_info->host_and_port = hostname_;  // TODO(wtc): no port! | 
| +  cert_request_info->host_and_port = HostPortPair(hostname_, port_).ToString(); | 
| cert_request_info->client_certs = client_certs_; | 
| LeaveFunction(cert_request_info->client_certs.size()); | 
| } | 
| @@ -2347,14 +2346,6 @@ | 
| } | 
|  | 
| int SSLClientSocketNSS::DoVerifyDNSSEC(int result) { | 
| -#if !defined(USE_OPENSSL) | 
| -  if (ssl_config_.dns_cert_provenance_checking_enabled && dnsrr_resolver_) { | 
| -    PeerCertificateChain certs(nss_fd_); | 
| -    DoAsyncDNSCertProvenanceVerification( | 
| -        hostname_, dnsrr_resolver_, certs.AsStringPieceVector()); | 
| -  } | 
| -#endif | 
| - | 
| if (ssl_config_.dnssec_enabled) { | 
| DNSValidationResult r = CheckDNSSECChain(hostname_, server_cert_nss_); | 
| if (r == DNSVR_SUCCESS) { | 
|  |