Index: net/socket/ssl_client_socket_openssl.cc |
=================================================================== |
--- net/socket/ssl_client_socket_openssl.cc (revision 81350) |
+++ net/socket/ssl_client_socket_openssl.cc (working copy) |
@@ -12,8 +12,8 @@ |
#include "base/memory/singleton.h" |
#include "base/metrics/histogram.h" |
-#include "base/openssl_util.h" |
#include "base/synchronization/lock.h" |
+#include "crypto/openssl_util.h" |
#include "net/base/cert_verifier.h" |
#include "net/base/net_errors.h" |
#include "net/base/openssl_private_key_store.h" |
@@ -172,7 +172,7 @@ |
// error stack if needed. Note that |tracer| is not currently used in the |
// implementation, but is passed in anyway as this ensures the caller will clear |
// any residual codes left on the error stack. |
-int MapOpenSSLError(int err, const base::OpenSSLErrStackTracer& tracer) { |
+int MapOpenSSLError(int err, const crypto::OpenSSLErrStackTracer& tracer) { |
switch (err) { |
case SSL_ERROR_WANT_READ: |
case SSL_ERROR_WANT_WRITE: |
@@ -206,7 +206,7 @@ |
void OnSessionAdded(const HostPortPair& host_and_port, SSL_SESSION* session) { |
// Declare the session cleaner-upper before the lock, so any call into |
// OpenSSL to free the session will happen after the lock is released. |
- base::ScopedOpenSSL<SSL_SESSION, SSL_SESSION_free> session_to_free; |
+ crypto::ScopedOpenSSL<SSL_SESSION, SSL_SESSION_free> session_to_free; |
base::AutoLock lock(lock_); |
DCHECK_EQ(0U, session_map_.count(session)); |
@@ -228,7 +228,7 @@ |
void OnSessionRemoved(SSL_SESSION* session) { |
// Declare the session cleaner-upper before the lock, so any call into |
// OpenSSL to free the session will happen after the lock is released. |
- base::ScopedOpenSSL<SSL_SESSION, SSL_SESSION_free> session_to_free; |
+ crypto::ScopedOpenSSL<SSL_SESSION, SSL_SESSION_free> session_to_free; |
base::AutoLock lock(lock_); |
SessionMap::iterator it = session_map_.find(session); |
@@ -301,7 +301,7 @@ |
friend struct DefaultSingletonTraits<SSLContext>; |
SSLContext() { |
- base::EnsureOpenSSLInit(); |
+ crypto::EnsureOpenSSLInit(); |
ssl_socket_data_index_ = SSL_get_ex_new_index(0, 0, 0, 0, 0); |
DCHECK_NE(ssl_socket_data_index_, -1); |
ssl_ctx_.reset(SSL_CTX_new(SSLv23_client_method())); |
@@ -358,7 +358,7 @@ |
// SSLClientSocketOpenSSL object from an SSL instance. |
int ssl_socket_data_index_; |
- base::ScopedOpenSSL<SSL_CTX, SSL_CTX_free> ssl_ctx_; |
+ crypto::ScopedOpenSSL<SSL_CTX, SSL_CTX_free> ssl_ctx_; |
SSLSessionCache session_cache_; |
}; |
@@ -415,7 +415,7 @@ |
DCHECK(!transport_bio_); |
SSLContext* context = SSLContext::GetInstance(); |
- base::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
ssl_ = SSL_new(context->ssl_ctx()); |
if (!ssl_ || !context->SetClientSocketForSSL(ssl_, this)) |
@@ -723,7 +723,7 @@ |
} |
int SSLClientSocketOpenSSL::DoHandshake() { |
- base::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
int net_error = net::OK; |
int rv = SSL_do_handshake(ssl_); |
@@ -855,7 +855,7 @@ |
if (server_cert_) |
return server_cert_; |
- base::ScopedOpenSSL<X509, X509_free> cert(SSL_get_peer_certificate(ssl_)); |
+ crypto::ScopedOpenSSL<X509, X509_free> cert(SSL_get_peer_certificate(ssl_)); |
if (!cert.get()) { |
LOG(WARNING) << "SSL_get_peer_certificate returned NULL"; |
return NULL; |
@@ -1165,7 +1165,7 @@ |
} |
int SSLClientSocketOpenSSL::DoPayloadRead() { |
- base::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
int rv = SSL_read(ssl_, user_read_buf_->data(), user_read_buf_len_); |
// We don't need to invalidate the non-client-authenticated SSL session |
// because the server will renegotiate anyway. |
@@ -1180,7 +1180,7 @@ |
} |
int SSLClientSocketOpenSSL::DoPayloadWrite() { |
- base::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
+ crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
int rv = SSL_write(ssl_, user_write_buf_->data(), user_write_buf_len_); |
if (rv >= 0) |