| Index: net/http/http_network_transaction.cc
|
| diff --git a/net/http/http_network_transaction.cc b/net/http/http_network_transaction.cc
|
| index e0c41002ee1fa8b78fdaed33b599b03ea928674e..8a8e7421e4bbd5d3e8f5390f3fd5f601c176b45d 100644
|
| --- a/net/http/http_network_transaction.cc
|
| +++ b/net/http/http_network_transaction.cc
|
| @@ -1291,13 +1291,13 @@ int HttpNetworkTransaction::HandleSSLHandshakeError(int error) {
|
| // reflect servers require a deprecated cipher rather than merely prefer
|
| // it. This, however, has no security benefit until the ciphers are actually
|
| // removed.
|
| - if (!server_ssl_config_.enable_deprecated_cipher_suites &&
|
| + if (!server_ssl_config_.deprecated_cipher_suites_enabled &&
|
| (error == ERR_SSL_VERSION_OR_CIPHER_MISMATCH ||
|
| error == ERR_CONNECTION_CLOSED || error == ERR_CONNECTION_RESET)) {
|
| net_log_.AddEvent(
|
| NetLog::TYPE_SSL_CIPHER_FALLBACK,
|
| base::Bind(&NetLogSSLCipherFallbackCallback, &request_->url, error));
|
| - server_ssl_config_.enable_deprecated_cipher_suites = true;
|
| + server_ssl_config_.deprecated_cipher_suites_enabled = true;
|
| ResetConnectionAndRequestForResend();
|
| return OK;
|
| }
|
| @@ -1514,7 +1514,7 @@ void HttpNetworkTransaction::RecordSSLFallbackMetrics(int result) {
|
| }
|
|
|
| UMA_HISTOGRAM_BOOLEAN("Net.ConnectionUsedSSLDeprecatedCipherFallback2",
|
| - server_ssl_config_.enable_deprecated_cipher_suites);
|
| + server_ssl_config_.deprecated_cipher_suites_enabled);
|
|
|
| if (server_ssl_config_.version_fallback) {
|
| // Record the error code which triggered the fallback and the state the
|
|
|