| Index: net/socket/ssl_client_socket.cc
|
| diff --git a/net/socket/ssl_client_socket.cc b/net/socket/ssl_client_socket.cc
|
| index c524ae49479b378b54a1667bd022edf464e14b2e..52146afabd1fd6afc83b3134149641f1ea1689e5 100644
|
| --- a/net/socket/ssl_client_socket.cc
|
| +++ b/net/socket/ssl_client_socket.cc
|
| @@ -57,20 +57,6 @@ const char* SSLClientSocket::NextProtoToString(NextProto next_proto) {
|
| }
|
|
|
| // static
|
| -const char* SSLClientSocket::NextProtoStatusToString(
|
| - const SSLClientSocket::NextProtoStatus status) {
|
| - switch (status) {
|
| - case kNextProtoUnsupported:
|
| - return "unsupported";
|
| - case kNextProtoNegotiated:
|
| - return "negotiated";
|
| - case kNextProtoNoOverlap:
|
| - return "no-overlap";
|
| - }
|
| - return NULL;
|
| -}
|
| -
|
| -// static
|
| void SSLClientSocket::SetSSLKeyLogFile(
|
| const base::FilePath& path,
|
| const scoped_refptr<base::SequencedTaskRunner>& task_runner) {
|
| @@ -104,11 +90,11 @@ std::vector<uint8_t> SSLClientSocket::SerializeNextProtos(
|
| for (const NextProto next_proto : next_protos) {
|
| const std::string proto = NextProtoToString(next_proto);
|
| if (proto.size() > 255) {
|
| - LOG(WARNING) << "Ignoring overlong NPN/ALPN protocol: " << proto;
|
| + LOG(WARNING) << "Ignoring overlong ALPN protocol: " << proto;
|
| continue;
|
| }
|
| if (proto.size() == 0) {
|
| - LOG(WARNING) << "Ignoring empty NPN/ALPN protocol";
|
| + LOG(WARNING) << "Ignoring empty ALPN protocol";
|
| continue;
|
| }
|
| wire_protos.push_back(proto.size());
|
|
|