Chromium Code Reviews| Index: net/quic/quic_crypto_client_stream.cc |
| diff --git a/net/quic/quic_crypto_client_stream.cc b/net/quic/quic_crypto_client_stream.cc |
| index 4d9d032a9041b0c9827818d6d4f6564fe45448cc..efc81aa39ac6b30c2ebd8c58c62f514672ed1be5 100644 |
| --- a/net/quic/quic_crypto_client_stream.cc |
| +++ b/net/quic/quic_crypto_client_stream.cc |
| @@ -448,17 +448,21 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
| void QuicCryptoClientStream::DoInitializeServerConfigUpdate( |
| QuicCryptoClientConfig::CachedState* cached) { |
| + bool update_ignored = false; |
| if (!server_id_.is_https()) { |
| // We don't check the certificates for insecure QUIC connections. |
| SetCachedProofValid(cached); |
| next_state_ = STATE_VERIFY_PROOF_DONE; |
| - return; |
| - } |
| - if (!cached->IsEmpty() && !cached->signature().empty()) { |
| + } else if (!cached->IsEmpty() && !cached->signature().empty()) { |
| // Note that we verify the proof even if the cached proof is valid. |
| DCHECK(crypto_config_->proof_verifier()); |
| next_state_ = STATE_VERIFY_PROOF; |
| + } else { |
| + update_ignored = true; |
| + next_state_ = STATE_VERIFY_PROOF_DONE; |
| } |
| + UMA_HISTOGRAM_BOOLEAN("Net.QuicNumServerConfigUpdateMessagesIgnored", |
|
Alexei Svitkine (slow)
2014/09/19 17:08:04
Nit: How about naming this Net.QuicNumServerConfig
ramant (doing other things)
2014/09/19 17:17:07
Done.
|
| + update_ignored); |
| } |
| QuicAsyncStatus QuicCryptoClientStream::DoVerifyProof( |