Index: net/socket/ssl_client_socket_openssl.cc |
diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc |
index 871e0e337d53e0690a1f217c2e08f0095118be5f..6620f283407064f2651e2bb7ea391e5cc5ed2b0a 100644 |
--- a/net/socket/ssl_client_socket_openssl.cc |
+++ b/net/socket/ssl_client_socket_openssl.cc |
@@ -19,6 +19,7 @@ |
#include "base/bind.h" |
#include "base/callback_helpers.h" |
#include "base/lazy_instance.h" |
+#include "base/macros.h" |
#include "base/memory/singleton.h" |
#include "base/metrics/histogram_macros.h" |
#include "base/metrics/sparse_histogram.h" |
@@ -99,7 +100,7 @@ void FreeX509Stack(STACK_OF(X509)* ptr) { |
using ScopedX509Stack = crypto::ScopedOpenSSL<STACK_OF(X509), FreeX509Stack>; |
// Used for encoding the |connection_status| field of an SSLInfo object. |
-int EncodeSSLConnectionStatus(uint16 cipher_suite, |
+int EncodeSSLConnectionStatus(uint16_t cipher_suite, |
int compression, |
int version) { |
return cipher_suite | |
@@ -765,7 +766,7 @@ bool SSLClientSocketOpenSSL::GetSSLInfo(SSLInfo* ssl_info) { |
SSL_SESSION_get_key_exchange_info(SSL_get_session(ssl_)); |
ssl_info->connection_status = EncodeSSLConnectionStatus( |
- static_cast<uint16>(SSL_CIPHER_get_id(cipher)), 0 /* no compression */, |
+ static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)), 0 /* no compression */, |
GetNetSSLVersion(ssl_)); |
if (!SSL_get_secure_renegotiation_support(ssl_)) |
@@ -833,11 +834,11 @@ int SSLClientSocketOpenSSL::Write(IOBuffer* buf, |
return rv; |
} |
-int SSLClientSocketOpenSSL::SetReceiveBufferSize(int32 size) { |
+int SSLClientSocketOpenSSL::SetReceiveBufferSize(int32_t size) { |
return transport_->socket()->SetReceiveBufferSize(size); |
} |
-int SSLClientSocketOpenSSL::SetSendBufferSize(int32 size) { |
+int SSLClientSocketOpenSSL::SetSendBufferSize(int32_t size) { |
return transport_->socket()->SetSendBufferSize(size); |
} |
@@ -987,10 +988,10 @@ int SSLClientSocketOpenSSL::Init() { |
// Get list of ciphers that are enabled. |
STACK_OF(SSL_CIPHER)* enabled_ciphers = SSL_get_ciphers(ssl_); |
DCHECK(enabled_ciphers); |
- std::vector<uint16> enabled_ciphers_vector; |
+ std::vector<uint16_t> enabled_ciphers_vector; |
for (size_t i = 0; i < sk_SSL_CIPHER_num(enabled_ciphers); ++i) { |
const SSL_CIPHER* cipher = sk_SSL_CIPHER_value(enabled_ciphers, i); |
- const uint16 id = static_cast<uint16>(SSL_CIPHER_get_id(cipher)); |
+ const uint16_t id = static_cast<uint16_t>(SSL_CIPHER_get_id(cipher)); |
enabled_ciphers_vector.push_back(id); |
} |
@@ -1938,7 +1939,7 @@ int SSLClientSocketOpenSSL::SelectNextProtoCallback(unsigned char** out, |
const unsigned char* in, |
unsigned int inlen) { |
if (ssl_config_.npn_protos.empty()) { |
- *out = reinterpret_cast<uint8*>( |
+ *out = reinterpret_cast<uint8_t*>( |
const_cast<char*>(kDefaultSupportedNPNProtocol)); |
*outlen = arraysize(kDefaultSupportedNPNProtocol) - 1; |
npn_status_ = kNextProtoUnsupported; |