| Index: net/quic/core/quic_session.cc
|
| diff --git a/net/quic/core/quic_session.cc b/net/quic/core/quic_session.cc
|
| index dba6c46b25c5e382a541af587ff1829e66c7e457..28d256bc30b77480fbf4f390702de54164f21dab 100644
|
| --- a/net/quic/core/quic_session.cc
|
| +++ b/net/quic/core/quic_session.cc
|
| @@ -50,8 +50,8 @@ void QuicSession::Initialize() {
|
| connection_->set_visitor(this);
|
| connection_->SetFromConfig(config_);
|
|
|
| - DCHECK_EQ(kCryptoStreamId, GetCryptoStream()->id());
|
| - static_stream_map_[kCryptoStreamId] = GetCryptoStream();
|
| + DCHECK_EQ(kCryptoStreamId, GetMutableCryptoStream()->id());
|
| + static_stream_map_[kCryptoStreamId] = GetMutableCryptoStream();
|
| }
|
|
|
| QuicSession::~QuicSession() {
|
| @@ -295,7 +295,7 @@ QuicConsumedData QuicSession::WritevData(
|
| // it might end up resulting in unencrypted stream data being sent.
|
| // While this is impossible to avoid given sufficient corruption, this
|
| // seems like a reasonable mitigation.
|
| - if (id == kCryptoStreamId && stream != GetCryptoStream()) {
|
| + if (id == kCryptoStreamId && stream != GetMutableCryptoStream()) {
|
| QUIC_BUG << "Stream id mismatch";
|
| connection_->CloseConnection(
|
| QUIC_INTERNAL_ERROR,
|
| @@ -425,11 +425,11 @@ void QuicSession::UpdateFlowControlOnFinalReceivedByteOffset(
|
| }
|
| }
|
|
|
| -bool QuicSession::IsEncryptionEstablished() {
|
| +bool QuicSession::IsEncryptionEstablished() const {
|
| return GetCryptoStream()->encryption_established();
|
| }
|
|
|
| -bool QuicSession::IsCryptoHandshakeConfirmed() {
|
| +bool QuicSession::IsCryptoHandshakeConfirmed() const {
|
| return GetCryptoStream()->handshake_confirmed();
|
| }
|
|
|
|
|