| Index: net/socket/ssl_client_socket_openssl.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl.cc b/net/socket/ssl_client_socket_openssl.cc
|
| index c49326d89fefd85971c4b8ba3ee8b8ab15a4296e..70b5dcee610468cbfa5cbff581e5aa2b5b7d247c 100644
|
| --- a/net/socket/ssl_client_socket_openssl.cc
|
| +++ b/net/socket/ssl_client_socket_openssl.cc
|
| @@ -19,7 +19,7 @@
|
| #include "crypto/openssl_util.h"
|
| #include "net/base/cert_verifier.h"
|
| #include "net/base/net_errors.h"
|
| -#include "net/base/openssl_private_key_store.h"
|
| +#include "net/base/openssl_client_key_store.h"
|
| #include "net/base/single_request_cert_verifier.h"
|
| #include "net/base/ssl_cert_request_info.h"
|
| #include "net/base/ssl_connection_status_flags.h"
|
| @@ -590,15 +590,18 @@ int SSLClientSocketOpenSSL::ClientCertRequestCallback(SSL* ssl,
|
|
|
| // Second pass: a client certificate should have been selected.
|
| if (ssl_config_.client_cert) {
|
| - EVP_PKEY* privkey = OpenSSLPrivateKeyStore::GetInstance()->FetchPrivateKey(
|
| - X509_PUBKEY_get(X509_get_X509_PUBKEY(
|
| - ssl_config_.client_cert->os_cert_handle())));
|
| - if (privkey) {
|
| + // A note about ownership: FetchClientCertPrivateKey() increments
|
| + // the reference count of the EVP_PKEY. Ownership of this reference
|
| + // is passed directly to OpenSSL, which will release the reference
|
| + // using EVP_PKEY_free() when the SSL object is destroyed.
|
| + OpenSSLClientKeyStore::ScopedEVP_PKEY privkey;
|
| + if (OpenSSLClientKeyStore::GetInstance()->FetchClientCertPrivateKey(
|
| + ssl_config_.client_cert.get(), &privkey)) {
|
| // TODO(joth): (copied from NSS) We should wait for server certificate
|
| // verification before sending our credentials. See http://crbug.com/13934
|
| *x509 = X509Certificate::DupOSCertHandle(
|
| ssl_config_.client_cert->os_cert_handle());
|
| - *pkey = privkey;
|
| + *pkey = privkey.release();
|
| return 1;
|
| }
|
| LOG(WARNING) << "Client cert found without private key";
|
|
|