| Index: net/http/http_stream_parser.cc
|
| diff --git a/net/http/http_stream_parser.cc b/net/http/http_stream_parser.cc
|
| index 5aeafa154727ac326814bfb0bd4b15bd1c50f95c..3f0b929861e9674e2bb201a811fda9d006a2309a 100644
|
| --- a/net/http/http_stream_parser.cc
|
| +++ b/net/http/http_stream_parser.cc
|
| @@ -833,7 +833,7 @@ int HttpStreamParser::HandleReadHeaderResult(int result) {
|
| // rather than empty HTTP/0.9 response.
|
| io_state_ = STATE_DONE;
|
| return ERR_EMPTY_RESPONSE;
|
| - } else if (request_->url.SchemeIsSecure()) {
|
| + } else if (request_->url.SchemeIsCryptographic()) {
|
| // The connection was closed in the middle of the headers. For HTTPS we
|
| // don't parse partial headers. Return a different error code so that we
|
| // know that we shouldn't attempt to retry the request.
|
| @@ -1080,7 +1080,7 @@ bool HttpStreamParser::IsConnectionReusable() const {
|
| }
|
|
|
| void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) {
|
| - if (request_->url.SchemeIsSecure() && connection_->socket()) {
|
| + if (request_->url.SchemeIsCryptographic() && connection_->socket()) {
|
| SSLClientSocket* ssl_socket =
|
| static_cast<SSLClientSocket*>(connection_->socket());
|
| ssl_socket->GetSSLInfo(ssl_info);
|
| @@ -1089,7 +1089,7 @@ void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) {
|
|
|
| void HttpStreamParser::GetSSLCertRequestInfo(
|
| SSLCertRequestInfo* cert_request_info) {
|
| - if (request_->url.SchemeIsSecure() && connection_->socket()) {
|
| + if (request_->url.SchemeIsCryptographic() && connection_->socket()) {
|
| SSLClientSocket* ssl_socket =
|
| static_cast<SSLClientSocket*>(connection_->socket());
|
| ssl_socket->GetSSLCertRequestInfo(cert_request_info);
|
|
|