Index: net/quic/quic_crypto_client_stream.cc |
diff --git a/net/quic/quic_crypto_client_stream.cc b/net/quic/quic_crypto_client_stream.cc |
index c7d99ca043ac1fca0a22a562fde1e8a58557d754..0ae7247e5b66332621a6c9f3110ca46889cc3986 100644 |
--- a/net/quic/quic_crypto_client_stream.cc |
+++ b/net/quic/quic_crypto_client_stream.cc |
@@ -43,7 +43,7 @@ void QuicCryptoClientStream::ProofVerifierCallbackImpl::Cancel() { |
} |
QuicCryptoClientStream::QuicCryptoClientStream( |
- const QuicSessionKey& server_key, |
+ const QuicServerId& server_id, |
QuicClientSessionBase* session, |
ProofVerifyContext* verify_context, |
QuicCryptoClientConfig* crypto_config) |
@@ -51,7 +51,7 @@ QuicCryptoClientStream::QuicCryptoClientStream( |
next_state_(STATE_IDLE), |
num_client_hellos_(0), |
crypto_config_(crypto_config), |
- server_key_(server_key), |
+ server_id_(server_id), |
generation_counter_(0), |
proof_verify_callback_(NULL), |
verify_context_(verify_context) { |
@@ -93,7 +93,7 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
QuicErrorCode error; |
string error_details; |
QuicCryptoClientConfig::CachedState* cached = |
- crypto_config_->LookupOrCreate(server_key_); |
+ crypto_config_->LookupOrCreate(server_id_); |
if (in != NULL) { |
DVLOG(1) << "Client: Received " << in->DebugString(); |
@@ -105,7 +105,7 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
switch (state) { |
case STATE_INITIALIZE: { |
if (!cached->IsEmpty() && !cached->signature().empty() && |
- server_key_.is_https()) { |
+ server_id_.is_https()) { |
DCHECK(crypto_config_->proof_verifier()); |
// If the cached state needs to be verified, do it now. |
next_state_ = STATE_VERIFY_PROOF; |
@@ -125,9 +125,11 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
if (!cached->IsComplete(session()->connection()->clock()->WallNow())) { |
crypto_config_->FillInchoateClientHello( |
- server_key_, |
+ server_id_, |
session()->connection()->supported_versions().front(), |
- cached, &crypto_negotiated_params_, &out); |
+ cached, |
+ &crypto_negotiated_params_, |
+ &out); |
// Pad the inchoate client hello to fill up a packet. |
const size_t kFramingOverhead = 50; // A rough estimate. |
const size_t max_packet_size = |
@@ -151,7 +153,7 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
} |
session()->config()->ToHandshakeMessage(&out); |
error = crypto_config_->FillClientHello( |
- server_key_, |
+ server_id_, |
session()->connection()->connection_id(), |
session()->connection()->supported_versions().front(), |
session()->connection()->max_flow_control_receive_window_bytes(), |
@@ -214,7 +216,7 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
return; |
} |
if (!cached->proof_valid()) { |
- if (!server_key_.is_https()) { |
+ if (!server_id_.is_https()) { |
// We don't check the certificates for insecure QUIC connections. |
SetCachedProofValid(cached); |
} else if (!cached->signature().empty()) { |
@@ -236,7 +238,7 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
verify_ok_ = false; |
ProofVerifier::Status status = verifier->VerifyProof( |
- server_key_.host(), |
+ server_id_.host(), |
cached->server_config(), |
cached->certs(), |
cached->signature(), |