Index: net/socket/ssl_client_socket_openssl.cc |
diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc |
index c78a9742bf8324c3cc1d8e138c7e04589b89e4f7..74ac8fc7a7a577ca268e217545f85e2d82437260 100644 |
--- a/net/socket/ssl_client_socket_openssl.cc |
+++ b/net/socket/ssl_client_socket_openssl.cc |
@@ -927,12 +927,12 @@ int SSLClientSocketOpenSSL::DoHandshake() { |
int net_error = OK; |
int rv = SSL_do_handshake(ssl_); |
- // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
- tracked_objects::ScopedTracker tracking_profile2( |
- FROM_HERE_WITH_EXPLICIT_FUNCTION( |
- "424386 SSLClientSocketOpenSSL::DoHandshake2")); |
- |
if (client_auth_cert_needed_) { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile2( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::DoHandshake2")); |
+ |
net_error = ERR_SSL_CLIENT_AUTH_CERT_NEEDED; |
// If the handshake already succeeded (because the server requests but |
// doesn't require a client cert), we need to invalidate the SSL session |
@@ -948,6 +948,11 @@ int SSLClientSocketOpenSSL::DoHandshake() { |
} |
} |
} else if (rv == 1) { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile3( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::DoHandshake3")); |
+ |
if (trying_cached_session_ && logging::DEBUG_MODE) { |
DVLOG(2) << "Result of session reuse for " << host_and_port_.ToString() |
<< " is: " << (SSL_session_reused(ssl_) ? "Success" : "Fail"); |
@@ -995,6 +1000,11 @@ int SSLClientSocketOpenSSL::DoHandshake() { |
UpdateServerCert(); |
GotoState(STATE_VERIFY_CERT); |
} else { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile4( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::DoHandshake4")); |
+ |
int ssl_error = SSL_get_error(ssl_, rv); |
if (ssl_error == SSL_ERROR_WANT_CHANNEL_ID_LOOKUP) { |
@@ -1200,6 +1210,11 @@ void SSLClientSocketOpenSSL::DoConnectCallback(int rv) { |
} |
void SSLClientSocketOpenSSL::UpdateServerCert() { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::UpdateServerCert")); |
+ |
server_cert_chain_->Reset(SSL_get_peer_cert_chain(ssl_)); |
server_cert_ = server_cert_chain_->AsOSChain(); |
@@ -1271,7 +1286,7 @@ void SSLClientSocketOpenSSL::VerifyCT() { |
SSLConfigService::GetEVCertsWhitelist(); |
if (!policy_enforcer_->DoesConformToCTEVPolicy( |
server_cert_verify_result_.verified_cert.get(), |
- ev_whitelist.get(), ct_verify_result_)) { |
+ ev_whitelist.get(), ct_verify_result_, net_log_)) { |
// TODO(eranm): Log via the BoundNetLog, see crbug.com/437766 |
VLOG(1) << "EV certificate for " |
<< server_cert_verify_result_.verified_cert->subject() |
@@ -1869,6 +1884,11 @@ long SSLClientSocketOpenSSL::BIOCallback( |
int cmd, |
const char *argp, int argi, long argl, |
long retvalue) { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::BIOCallback")); |
+ |
SSLClientSocketOpenSSL* socket = reinterpret_cast<SSLClientSocketOpenSSL*>( |
BIO_get_callback_arg(bio)); |
CHECK(socket); |
@@ -1880,6 +1900,11 @@ long SSLClientSocketOpenSSL::BIOCallback( |
void SSLClientSocketOpenSSL::InfoCallback(const SSL* ssl, |
int type, |
int /*val*/) { |
+ // TODO(vadimt): Remove ScopedTracker below once crbug.com/424386 is fixed. |
+ tracked_objects::ScopedTracker tracking_profile( |
+ FROM_HERE_WITH_EXPLICIT_FUNCTION( |
+ "424386 SSLClientSocketOpenSSL::InfoCallback")); |
+ |
if (type == SSL_CB_HANDSHAKE_DONE) { |
SSLClientSocketOpenSSL* ssl_socket = |
SSLContext::GetInstance()->GetClientSocketFromSSL(ssl); |