Index: net/socket/ssl_client_socket_impl.cc |
diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc |
index 94f7f1c418bbc3cb5a22c71873d159d07815e818..1c963b794274f24a064de2af18b0a27161d70121 100644 |
--- a/net/socket/ssl_client_socket_impl.cc |
+++ b/net/socket/ssl_client_socket_impl.cc |
@@ -597,17 +597,14 @@ int SSLClientSocketImpl::ExportKeyingMaterial(const base::StringPiece& label, |
crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
- int rv = SSL_export_keying_material( |
- ssl_, out, outlen, label.data(), label.size(), |
- reinterpret_cast<const unsigned char*>(context.data()), context.length(), |
- has_context ? 1 : 0); |
- |
- if (rv != 1) { |
- int ssl_error = SSL_get_error(ssl_, rv); |
- LOG(ERROR) << "Failed to export keying material;" |
- << " returned " << rv << ", SSL error code " << ssl_error; |
- return MapOpenSSLError(ssl_error, err_tracer); |
+ if (!SSL_export_keying_material( |
+ ssl_, out, outlen, label.data(), label.size(), |
+ reinterpret_cast<const unsigned char*>(context.data()), |
+ context.length(), has_context ? 1 : 0)) { |
+ LOG(ERROR) << "Failed to export keying material."; |
+ return ERR_FAILED; |
} |
+ |
return OK; |
} |
@@ -1272,11 +1269,9 @@ int SSLClientSocketImpl::DoChannelIDLookupComplete(int result) { |
// type. |
DCHECK(channel_id_key_); |
crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); |
- int rv = SSL_set1_tls_channel_id(ssl_, channel_id_key_->key()); |
- if (!rv) { |
+ if (!SSL_set1_tls_channel_id(ssl_, channel_id_key_->key())) { |
LOG(ERROR) << "Failed to set Channel ID."; |
- int err = SSL_get_error(ssl_, rv); |
- return MapOpenSSLError(err, err_tracer); |
+ return ERR_FAILED; |
} |
// Return to the handshake. |