Index: net/http/http_stream_parser.cc |
diff --git a/net/http/http_stream_parser.cc b/net/http/http_stream_parser.cc |
index 5aeafa154727ac326814bfb0bd4b15bd1c50f95c..3f0b929861e9674e2bb201a811fda9d006a2309a 100644 |
--- a/net/http/http_stream_parser.cc |
+++ b/net/http/http_stream_parser.cc |
@@ -833,7 +833,7 @@ int HttpStreamParser::HandleReadHeaderResult(int result) { |
// rather than empty HTTP/0.9 response. |
io_state_ = STATE_DONE; |
return ERR_EMPTY_RESPONSE; |
- } else if (request_->url.SchemeIsSecure()) { |
+ } else if (request_->url.SchemeIsCryptographic()) { |
// The connection was closed in the middle of the headers. For HTTPS we |
// don't parse partial headers. Return a different error code so that we |
// know that we shouldn't attempt to retry the request. |
@@ -1080,7 +1080,7 @@ bool HttpStreamParser::IsConnectionReusable() const { |
} |
void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) { |
- if (request_->url.SchemeIsSecure() && connection_->socket()) { |
+ if (request_->url.SchemeIsCryptographic() && connection_->socket()) { |
SSLClientSocket* ssl_socket = |
static_cast<SSLClientSocket*>(connection_->socket()); |
ssl_socket->GetSSLInfo(ssl_info); |
@@ -1089,7 +1089,7 @@ void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) { |
void HttpStreamParser::GetSSLCertRequestInfo( |
SSLCertRequestInfo* cert_request_info) { |
- if (request_->url.SchemeIsSecure() && connection_->socket()) { |
+ if (request_->url.SchemeIsCryptographic() && connection_->socket()) { |
SSLClientSocket* ssl_socket = |
static_cast<SSLClientSocket*>(connection_->socket()); |
ssl_socket->GetSSLCertRequestInfo(cert_request_info); |