| Index: net/socket/ssl_client_socket_impl.cc | 
| diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc | 
| index 01acc54ffcfe0c1d2f14381263c74147f1adf978..7c4a54838b08de976d657dba0848efc1495bf74a 100644 | 
| --- a/net/socket/ssl_client_socket_impl.cc | 
| +++ b/net/socket/ssl_client_socket_impl.cc | 
| @@ -48,7 +48,6 @@ | 
| #include "net/ssl/ssl_cipher_suite_names.h" | 
| #include "net/ssl/ssl_client_session_cache.h" | 
| #include "net/ssl/ssl_connection_status_flags.h" | 
| -#include "net/ssl/ssl_failure_state.h" | 
| #include "net/ssl/ssl_info.h" | 
| #include "net/ssl/ssl_private_key.h" | 
| #include "net/ssl/token_binding.h" | 
| @@ -511,7 +510,6 @@ SSLClientSocketImpl::SSLClientSocketImpl( | 
| channel_id_sent_(false), | 
| session_pending_(false), | 
| certificate_verified_(false), | 
| -      ssl_failure_state_(SSL_FAILURE_NONE), | 
| signature_result_(kNoPendingResult), | 
| transport_security_state_(context.transport_security_state), | 
| policy_enforcer_(context.ct_policy_enforcer), | 
| @@ -589,10 +587,6 @@ crypto::ECPrivateKey* SSLClientSocketImpl::GetChannelIDKey() const { | 
| return channel_id_key_.get(); | 
| } | 
|  | 
| -SSLFailureState SSLClientSocketImpl::GetSSLFailureState() const { | 
| -  return ssl_failure_state_; | 
| -} | 
| - | 
| int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label, | 
| bool has_context, | 
| const base::StringPiece& context, | 
| @@ -707,7 +701,6 @@ void SSLClientSocketImpl::Disconnect() { | 
| session_pending_ = false; | 
| certificate_verified_ = false; | 
| channel_id_request_.Cancel(); | 
| -  ssl_failure_state_ = SSL_FAILURE_NONE; | 
|  | 
| signature_result_ = kNoPendingResult; | 
| signature_.clear(); | 
| @@ -1136,31 +1129,6 @@ int SSLClientSocketImpl::DoHandshake() { | 
| net_log_.AddEvent( | 
| NetLog::TYPE_SSL_HANDSHAKE_ERROR, | 
| CreateNetLogOpenSSLErrorCallback(net_error, ssl_error, error_info)); | 
| - | 
| -    // Classify the handshake failure. This is used to determine causes of the | 
| -    // TLS version fallback. | 
| - | 
| -    // |cipher| is the current outgoing cipher suite, so it is non-null iff | 
| -    // ChangeCipherSpec was sent. | 
| -    const SSL_CIPHER* cipher = SSL_get_current_cipher(ssl_); | 
| -    if (SSL_get_state(ssl_) == SSL3_ST_CR_SRVR_HELLO_A) { | 
| -      ssl_failure_state_ = SSL_FAILURE_CLIENT_HELLO; | 
| -    } else if (cipher && (SSL_CIPHER_get_id(cipher) == | 
| -                              TLS1_CK_DHE_RSA_WITH_AES_128_GCM_SHA256 || | 
| -                          SSL_CIPHER_get_id(cipher) == | 
| -                              TLS1_CK_RSA_WITH_AES_128_GCM_SHA256)) { | 
| -      ssl_failure_state_ = SSL_FAILURE_BUGGY_GCM; | 
| -    } else if (cipher && ssl_config_.send_client_cert) { | 
| -      ssl_failure_state_ = SSL_FAILURE_CLIENT_AUTH; | 
| -    } else if (ERR_GET_LIB(error_info.error_code) == ERR_LIB_SSL && | 
| -               ERR_GET_REASON(error_info.error_code) == | 
| -                   SSL_R_OLD_SESSION_VERSION_NOT_RETURNED) { | 
| -      ssl_failure_state_ = SSL_FAILURE_SESSION_MISMATCH; | 
| -    } else if (cipher && npn_status_ != kNextProtoUnsupported) { | 
| -      ssl_failure_state_ = SSL_FAILURE_NEXT_PROTO; | 
| -    } else { | 
| -      ssl_failure_state_ = SSL_FAILURE_UNKNOWN; | 
| -    } | 
| } | 
|  | 
| next_handshake_state_ = STATE_HANDSHAKE_COMPLETE; | 
|  |