Comment #1 on issue 16166 by [email protected]: SSL over SOCKS in
Linux fails
http://code.google.com/p/chromium/issues/detail?id=16166
The following revision refers to this bug:
http://src.chromium.org/viewvc/chrome?view=rev&revision=20170
------------------------------------------------------------------------
r20170 | [email protected] | 2009-07-08 11:23:41 -0700 (Wed, 08 Jul
2009) | 6 lines
Changed paths:
M
http://src.chromium.org/viewvc/chrome/trunk/src/net/socket/socks_client_socket.cc?r1=20170&r2=20169
M
http://src.chromium.org/viewvc/chrome/trunk/src/net/socket/socks_client_socket.h?r1=20170&r2=20169
Correctly implementing GetPeerName() to point to
TCPClientSocket::GetPeerName(). This is used by the SSL layer in Linux to
resolve Peer Names, which caused a trap to be generated (
http://crbug/16166 )
BUG=16166
TEST=fix of the above BUG
Review URL: http://codereview.chromium.org/149242
------------------------------------------------------------------------
--
You received this message because you are listed in the owner
or CC fields of this issue, or because you starred this issue.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings
--~--~---------~--~----~------------~-------~--~----~
Automated mail from issue updates at http://crbug.com/
Subscription options: http://groups.google.com/group/chromium-bugs
-~----------~----~----~----~------~----~------~--~---