Index: net/http/http_network_transaction.cc |
diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc |
index e0c41002ee1fa8b78fdaed33b599b03ea928674e..8a8e7421e4bbd5d3e8f5390f3fd5f601c176b45d 100644 |
--- a/net/http/http_network_transaction.cc |
+++ b/net/http/http_network_transaction.cc |
@@ -1291,13 +1291,13 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) { |
// reflect servers require a deprecated cipher rather than merely prefer |
// it. This, however, has no security benefit until the ciphers are actually |
// removed. |
- if (!server_ssl_config_.enable_deprecated_cipher_suites && |
+ if (!server_ssl_config_.deprecated_cipher_suites_enabled && |
(error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH || |
error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) { |
net_log_.AddEvent( |
NetLog::TYPE_SSL_CIPHER_FALLBACK, |
base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error)); |
- server_ssl_config_.enable_deprecated_cipher_suites = true; |
+ server_ssl_config_.deprecated_cipher_suites_enabled = true; |
ResetConnectionAndRequestForResend(); |
return OK; |
} |
@@ -1514,7 +1514,7 @@ void HttpNetworkTransaction::RecordSSLFallbackMetrics(int result) { |
} |
UMA_HISTOGRAM_BOOLEAN("Net.ConnectionUsedSSLDeprecatedCipherFallback2", |
- server_ssl_config_.enable_deprecated_cipher_suites); |
+ server_ssl_config_.deprecated_cipher_suites_enabled); |
if (server_ssl_config_.version_fallback) { |
// Record the error code which triggered the fallback and the state the |