| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index 355fd508ace5afaa4a4a108e48c643476c240555..e70713cf1c0c6ee62b09053e243b65222780e232 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -91,64 +91,6 @@ const uint8_t kTbProtocolVersionMinor = 4;
|
| const uint8_t kTbMinProtocolVersionMajor = 0;
|
| const uint8_t kTbMinProtocolVersionMinor = 3;
|
|
|
| -void FreeX509Stack(STACK_OF(X509)* ptr) {
|
| - sk_X509_pop_free(ptr, X509_free);
|
| -}
|
| -
|
| -using ScopedX509Stack = crypto::ScopedOpenSSL<STACK_OF(X509), FreeX509Stack>;
|
| -
|
| -// Used for encoding the |connection_status| field of an SSLInfo object.
|
| -int EncodeSSLConnectionStatus(uint16_t cipher_suite,
|
| - int compression,
|
| - int version) {
|
| - return cipher_suite |
|
| - ((compression & SSL_CONNECTION_COMPRESSION_MASK) <<
|
| - SSL_CONNECTION_COMPRESSION_SHIFT) |
|
| - ((version & SSL_CONNECTION_VERSION_MASK) <<
|
| - SSL_CONNECTION_VERSION_SHIFT);
|
| -}
|
| -
|
| -// Returns the net SSL version number (see ssl_connection_status_flags.h) for
|
| -// this SSL connection.
|
| -int GetNetSSLVersion(SSL* ssl) {
|
| - switch (SSL_version(ssl)) {
|
| - case TLS1_VERSION:
|
| - return SSL_CONNECTION_VERSION_TLS1;
|
| - case TLS1_1_VERSION:
|
| - return SSL_CONNECTION_VERSION_TLS1_1;
|
| - case TLS1_2_VERSION:
|
| - return SSL_CONNECTION_VERSION_TLS1_2;
|
| - default:
|
| - NOTREACHED();
|
| - return SSL_CONNECTION_VERSION_UNKNOWN;
|
| - }
|
| -}
|
| -
|
| -ScopedX509 OSCertHandleToOpenSSL(
|
| - X509Certificate::OSCertHandle os_handle) {
|
| -#if defined(USE_OPENSSL_CERTS)
|
| - return ScopedX509(X509Certificate::DupOSCertHandle(os_handle));
|
| -#else // !defined(USE_OPENSSL_CERTS)
|
| - std::string der_encoded;
|
| - if (!X509Certificate::GetDEREncoded(os_handle, &der_encoded))
|
| - return ScopedX509();
|
| - const uint8_t* bytes = reinterpret_cast<const uint8_t*>(der_encoded.data());
|
| - return ScopedX509(d2i_X509(NULL, &bytes, der_encoded.size()));
|
| -#endif // defined(USE_OPENSSL_CERTS)
|
| -}
|
| -
|
| -ScopedX509Stack OSCertHandlesToOpenSSL(
|
| - const X509Certificate::OSCertHandles& os_handles) {
|
| - ScopedX509Stack stack(sk_X509_new_null());
|
| - for (size_t i = 0; i < os_handles.size(); i++) {
|
| - ScopedX509 x509 = OSCertHandleToOpenSSL(os_handles[i]);
|
| - if (!x509)
|
| - return ScopedX509Stack();
|
| - sk_X509_push(stack.get(), x509.release());
|
| - }
|
| - return stack;
|
| -}
|
| -
|
| bool EVP_MDToPrivateKeyHash(const EVP_MD* md, SSLPrivateKey::Hash* hash) {
|
| switch (EVP_MD_type(md)) {
|
| case NID_md5_sha1:
|
| @@ -845,9 +787,11 @@ bool SSLClientSocketOpenSSL::GetSSLInfo(SSLInfo* ssl_info) {
|
| ssl_info->key_exchange_info =
|
| SSL_SESSION_get_key_exchange_info(SSL_get_session(ssl_));
|
|
|
| - ssl_info->connection_status = EncodeSSLConnectionStatus(
|
| - static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)), 0 /* no compression */,
|
| - GetNetSSLVersion(ssl_));
|
| + SSLConnectionStatusSetCipherSuite(
|
| + static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)),
|
| + &ssl_info->connection_status);
|
| + SSLConnectionStatusSetVersion(GetNetSSLVersion(ssl_),
|
| + &ssl_info->connection_status);
|
|
|
| if (!SSL_get_secure_renegotiation_support(ssl_))
|
| ssl_info->connection_status |= SSL_CONNECTION_NO_RENEGOTIATION_EXTENSION;
|
|
|