| Index: net/quic/quic_crypto_client_stream.cc
|
| diff --git a/net/quic/quic_crypto_client_stream.cc b/net/quic/quic_crypto_client_stream.cc
|
| index f3a924b9ef4770b4f6dc9b996ac1155ee2dcd9a8..19f3cec25bb014b526163e894ce0537d835c31a0 100644
|
| --- a/net/quic/quic_crypto_client_stream.cc
|
| +++ b/net/quic/quic_crypto_client_stream.cc
|
| @@ -78,6 +78,7 @@ QuicCryptoClientStream::QuicCryptoClientStream(
|
| crypto_config_(crypto_config),
|
| server_id_(server_id),
|
| generation_counter_(0),
|
| + channel_id_sent_(false),
|
| channel_id_source_callback_(NULL),
|
| verify_context_(verify_context),
|
| proof_verify_callback_(NULL) {
|
| @@ -110,9 +111,7 @@ int QuicCryptoClientStream::num_sent_client_hellos() const {
|
| }
|
|
|
| bool QuicCryptoClientStream::WasChannelIDSent() const {
|
| - // TODO(rch): we should replace this with a boolean member so we
|
| - // can free the memory associated with the key after we're finished with it.
|
| - return channel_id_key_.get() != NULL;
|
| + return channel_id_sent_;
|
| }
|
|
|
| // kMaxClientHellos is the maximum number of times that we'll send a client
|
| @@ -203,6 +202,7 @@ void QuicCryptoClientStream::DoHandshakeLoop(
|
| CloseConnectionWithDetails(error, error_details);
|
| return;
|
| }
|
| + channel_id_sent_ = (channel_id_key_.get() != NULL);
|
| if (cached->proof_verify_details()) {
|
| client_session()->OnProofVerifyDetailsAvailable(
|
| *cached->proof_verify_details());
|
|
|