Index: net/quic/quic_crypto_client_stream.cc |
diff --git a/net/quic/quic_crypto_client_stream.cc b/net/quic/quic_crypto_client_stream.cc |
index 4d9d032a9041b0c9827818d6d4f6564fe45448cc..a1016938e8da264baa81b2d75d195a37d52ce49e 100644 |
--- a/net/quic/quic_crypto_client_stream.cc |
+++ b/net/quic/quic_crypto_client_stream.cc |
@@ -448,17 +448,21 @@ void QuicCryptoClientStream::DoHandshakeLoop( |
void QuicCryptoClientStream::DoInitializeServerConfigUpdate( |
QuicCryptoClientConfig::CachedState* cached) { |
+ bool update_ignored = false; |
if (!server_id_.is_https()) { |
// We don't check the certificates for insecure QUIC connections. |
SetCachedProofValid(cached); |
next_state_ = STATE_VERIFY_PROOF_DONE; |
- return; |
- } |
- if (!cached->IsEmpty() && !cached->signature().empty()) { |
+ } else if (!cached->IsEmpty() && !cached->signature().empty()) { |
// Note that we verify the proof even if the cached proof is valid. |
DCHECK(crypto_config_->proof_verifier()); |
next_state_ = STATE_VERIFY_PROOF; |
+ } else { |
+ update_ignored = true; |
+ next_state_ = STATE_VERIFY_PROOF_DONE; |
} |
+ UMA_HISTOGRAM_BOOLEAN("Net.QuicNumServerConfig.UpdateMessagesIgnored", |
+ update_ignored); |
} |
QuicAsyncStatus QuicCryptoClientStream::DoVerifyProof( |