Index: net/socket/ssl_client_socket_win.cc |
diff --git a/net/socket/ssl_client_socket_win.cc b/net/socket/ssl_client_socket_win.cc |
index 30441ce023b80059bbc4864eb2b9cd3632a808c5..c6ad7977953b6667cef1e438e7ab4d6c67714a15 100644 |
--- a/net/socket/ssl_client_socket_win.cc |
+++ b/net/socket/ssl_client_socket_win.cc |
@@ -397,7 +397,7 @@ SSLClientSocketWin::SSLClientSocketWin(ClientSocketHandle* transport_socket, |
transport_(transport_socket), |
host_and_port_(host_and_port), |
ssl_config_(ssl_config), |
- user_connect_callback_(NULL), |
+ old_user_connect_callback_(NULL), |
user_read_callback_(NULL), |
user_read_buf_len_(0), |
user_write_callback_(NULL), |
@@ -563,7 +563,30 @@ SSLClientSocketWin::GetNextProto(std::string* proto) { |
int SSLClientSocketWin::Connect(OldCompletionCallback* callback) { |
DCHECK(transport_.get()); |
DCHECK(next_state_ == STATE_NONE); |
- DCHECK(!user_connect_callback_); |
+ DCHECK(!old_user_connect_callback_); |
csilv
2011/12/06 21:03:18
make this check match line 589
James Hawkins
2011/12/06 22:19:30
Done.
|
+ |
+ net_log_.BeginEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
+ |
+ int rv = InitializeSSLContext(); |
+ if (rv != OK) { |
+ net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
+ return rv; |
+ } |
+ |
+ writing_first_token_ = true; |
+ next_state_ = STATE_HANDSHAKE_WRITE; |
+ rv = DoLoop(OK); |
+ if (rv == ERR_IO_PENDING) { |
+ old_user_connect_callback_ = callback; |
+ } else { |
+ net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
+ } |
+ return rv; |
+} |
+int SSLClientSocketWin::Connect(const CompletionCallback& callback) { |
+ DCHECK(transport_.get()); |
+ DCHECK(next_state_ == STATE_NONE); |
+ DCHECK(!old_user_connect_callback_ && user_connect_callback_.is_null()); |
net_log_.BeginEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
@@ -840,7 +863,7 @@ void SSLClientSocketWin::OnHandshakeIOComplete(int result) { |
// If there is no connect callback available to call, we are renegotiating |
// (which occurs because we are in the middle of a Read when the |
// renegotiation process starts). So we complete the Read here. |
- if (!user_connect_callback_) { |
+ if (!old_user_connect_callback_ && user_connect_callback_.is_null()) { |
OldCompletionCallback* c = user_read_callback_; |
user_read_callback_ = NULL; |
user_read_buf_ = NULL; |
@@ -849,9 +872,15 @@ void SSLClientSocketWin::OnHandshakeIOComplete(int result) { |
return; |
} |
net_log_.EndEvent(NetLog::TYPE_SSL_CONNECT, NULL); |
- OldCompletionCallback* c = user_connect_callback_; |
- user_connect_callback_ = NULL; |
- c->Run(rv); |
+ if (old_user_connect_callback_) { |
+ OldCompletionCallback* c = old_user_connect_callback_; |
+ old_user_connect_callback_ = NULL; |
+ c->Run(rv); |
+ } else { |
+ CompletionCallback c = user_connect_callback_; |
+ user_connect_callback_.Reset(); |
+ c.Run(rv); |
+ } |
} |
} |
@@ -1547,7 +1576,7 @@ int SSLClientSocketWin::DidCompleteHandshake() { |
// Called when a renegotiation is completed. |result| is the verification |
// result of the server certificate received during renegotiation. |
void SSLClientSocketWin::DidCompleteRenegotiation() { |
- DCHECK(!user_connect_callback_); |
+ DCHECK(!old_user_connect_callback_ && user_connect_callback_.is_null()); |
DCHECK(user_read_callback_); |
renegotiating_ = false; |
next_state_ = STATE_COMPLETED_RENEGOTIATION; |