| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 936b346d7a6a853c52df085eca5163b74ec15a62..3f01db21b342cfdcb0181e56391a195ffe3bbeed 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -62,8 +62,7 @@ int MapOpenSSLError(int err) {
|
|
|
| SSLClientSocketOpenSSL::SSLClientSocketOpenSSL(
|
| ClientSocketHandle* transport_socket,
|
| - const std::string& hostname,
|
| - uint16 port,
|
| + const HostPortPair& host_and_port,
|
| const SSLConfig& ssl_config)
|
| : ALLOW_THIS_IN_INITIALIZER_LIST(buffer_send_callback_(
|
| this, &SSLClientSocketOpenSSL::BufferSendComplete)),
|
| @@ -80,8 +79,7 @@ SSLClientSocketOpenSSL::SSLClientSocketOpenSSL(
|
| ssl_(NULL),
|
| transport_bio_(NULL),
|
| transport_(transport_socket),
|
| - hostname_(hostname),
|
| - port_(port),
|
| + host_and_port_(host_and_port),
|
| ssl_config_(ssl_config),
|
| completed_handshake_(false),
|
| net_log_(transport_socket->socket()->NetLog()) {
|
| @@ -101,7 +99,7 @@ bool SSLClientSocketOpenSSL::Init() {
|
| return false;
|
| }
|
|
|
| - if (!SSL_set_tlsext_host_name(ssl_, hostname_.c_str())) {
|
| + if (!SSL_set_tlsext_host_name(ssl_, host_and_port_.host().c_str())) {
|
| MaybeLogSSLError();
|
| return false;
|
| }
|
| @@ -350,7 +348,7 @@ int SSLClientSocketOpenSSL::DoVerifyCert(int result) {
|
| if (ssl_config_.verify_ev_cert)
|
| flags |= X509Certificate::VERIFY_EV_CERT;
|
| verifier_.reset(new CertVerifier);
|
| - return verifier_->Verify(server_cert_, hostname_, flags,
|
| + return verifier_->Verify(server_cert_, host_and_port_.host(), flags,
|
| &server_cert_verify_result_,
|
| &handshake_io_callback_);
|
| }
|
|
|