Index: net/base/openssl_util.cc |
diff --git a/net/base/openssl_util.cc b/net/base/openssl_util.cc |
deleted file mode 100644 |
index 51797ac88c205db021dfbfc5a4efea51ffa7de1f..0000000000000000000000000000000000000000 |
--- a/net/base/openssl_util.cc |
+++ /dev/null |
@@ -1,86 +0,0 @@ |
-// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. |
-// Use of this source code is governed by a BSD-style license that can be |
-// found in the LICENSE file. |
- |
-#include "net/base/openssl_util.h" |
- |
-#include <openssl/err.h> |
- |
-#include "base/logging.h" |
-#include "base/platform_thread.h" |
- |
-namespace net { |
- |
-namespace { |
- |
-// We do certificate verification after handshake, so we disable the default |
-// by registering a no-op verify function. |
-int NoOpVerifyCallback(X509_STORE_CTX*, void *) { |
- DVLOG(3) << "skipping cert verify"; |
- return 1; |
-} |
- |
-unsigned long CurrentThreadId() { |
- return static_cast<unsigned long>(PlatformThread::CurrentId()); |
-} |
- |
-SSL_CTX* CreateSSL_CTX() { |
- SSL_load_error_strings(); |
- SSL_library_init(); |
- OpenSSL_add_all_algorithms(); |
- return SSL_CTX_new(SSLv23_client_method()); |
-} |
- |
-} // namespace |
- |
-OpenSSLInitSingleton::OpenSSLInitSingleton() |
- : ssl_ctx_(CreateSSL_CTX()), |
- store_(X509_STORE_new()) { |
- CHECK(ssl_ctx_.get()); |
- CHECK(store_.get()); |
- |
- SSL_CTX_set_cert_verify_callback(ssl_ctx_.get(), NoOpVerifyCallback, NULL); |
- X509_STORE_set_default_paths(store_.get()); |
- // TODO(bulach): Enable CRL (see X509_STORE_set_flags(X509_V_FLAG_CRL_CHECK)). |
- int num_locks = CRYPTO_num_locks(); |
- for (int i = 0; i < num_locks; ++i) |
- locks_.push_back(new Lock()); |
- CRYPTO_set_locking_callback(LockingCallback); |
- CRYPTO_set_id_callback(CurrentThreadId); |
-} |
- |
-OpenSSLInitSingleton::~OpenSSLInitSingleton() { |
- CRYPTO_set_locking_callback(NULL); |
- EVP_cleanup(); |
- ERR_free_strings(); |
-} |
- |
-OpenSSLInitSingleton* GetOpenSSLInitSingleton() { |
- return Singleton<OpenSSLInitSingleton>::get(); |
-} |
- |
-void EnsureOpenSSLInit() { |
- Singleton<OpenSSLInitSingleton>::get(); |
-} |
- |
-// static |
-void OpenSSLInitSingleton::LockingCallback(int mode, |
- int n, |
- const char* file, |
- int line) { |
- GetOpenSSLInitSingleton()->OnLockingCallback(mode, n, file, line); |
-} |
- |
-void OpenSSLInitSingleton::OnLockingCallback(int mode, |
- int n, |
- const char* file, |
- int line) { |
- CHECK_LT(static_cast<size_t>(n), locks_.size()); |
- if (mode & CRYPTO_LOCK) |
- locks_[n]->Acquire(); |
- else |
- locks_[n]->Release(); |
-} |
- |
-} // namespace net |
- |