| Index: net/http/http_stream_parser.cc
|
| diff --git a/net/http/http_stream_parser.cc b/net/http/http_stream_parser.cc
|
| index 23208877a0f1b2d423206f556d5a55a545f32937..8fe55d83a859c34b16e5987a093ead0e567d2043 100644
|
| --- a/net/http/http_stream_parser.cc
|
| +++ b/net/http/http_stream_parser.cc
|
| @@ -792,7 +792,7 @@ int HttpStreamParser::HandleReadHeaderResult(int result) {
|
| // rather than empty HTTP/0.9 response.
|
| io_state_ = STATE_DONE;
|
| return ERR_EMPTY_RESPONSE;
|
| - } else if (request_->url.SchemeIsSecure()) {
|
| + } else if (request_->url.SchemeIsCryptographic()) {
|
| // The connection was closed in the middle of the headers. For HTTPS we
|
| // don't parse partial headers. Return a different error code so that we
|
| // know that we shouldn't attempt to retry the request.
|
| @@ -1039,7 +1039,7 @@ bool HttpStreamParser::IsConnectionReusable() const {
|
| }
|
|
|
| void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) {
|
| - if (request_->url.SchemeIsSecure() && connection_->socket()) {
|
| + if (request_->url.SchemeIsCryptographic() && connection_->socket()) {
|
| SSLClientSocket* ssl_socket =
|
| static_cast<SSLClientSocket*>(connection_->socket());
|
| ssl_socket->GetSSLInfo(ssl_info);
|
| @@ -1048,7 +1048,7 @@ void HttpStreamParser::GetSSLInfo(SSLInfo* ssl_info) {
|
|
|
| void HttpStreamParser::GetSSLCertRequestInfo(
|
| SSLCertRequestInfo* cert_request_info) {
|
| - if (request_->url.SchemeIsSecure() && connection_->socket()) {
|
| + if (request_->url.SchemeIsCryptographic() && connection_->socket()) {
|
| SSLClientSocket* ssl_socket =
|
| static_cast<SSLClientSocket*>(connection_->socket());
|
| ssl_socket->GetSSLCertRequestInfo(cert_request_info);
|
|
|