Comment #1 on issue 16166 by [email protected]: SSL over SOCKS in  
Linux fails
http://code.google.com/p/chromium/issues/detail?id=16166

The following revision refers to this bug:
     http://src.chromium.org/viewvc/chrome?view=rev&revision=20170

------------------------------------------------------------------------
r20170 | [email protected] | 2009-07-08 11:23:41 -0700 (Wed, 08 Jul  
2009) | 6 lines
Changed paths:
    M  
http://src.chromium.org/viewvc/chrome/trunk/src/net/socket/socks_client_socket.cc?r1=20170&r2=20169
    M  
http://src.chromium.org/viewvc/chrome/trunk/src/net/socket/socks_client_socket.h?r1=20170&r2=20169

Correctly implementing GetPeerName() to point to  
TCPClientSocket::GetPeerName(). This is used by the SSL layer in Linux to  
resolve Peer Names, which caused a trap to be generated (  
http://crbug/16166 )

BUG=16166
TEST=fix of the above BUG

Review URL: http://codereview.chromium.org/149242
------------------------------------------------------------------------


--
You received this message because you are listed in the owner
or CC fields of this issue, or because you starred this issue.
You may adjust your issue notification preferences at:
http://code.google.com/hosting/settings

--~--~---------~--~----~------------~-------~--~----~
Automated mail from issue updates at http://crbug.com/
Subscription options: http://groups.google.com/group/chromium-bugs
-~----------~----~----~----~------~----~------~--~---

Reply via email to