summaryrefslogtreecommitdiffstats
path: root/net/http/http_network_transaction.h
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-02-19 23:14:48 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-02-19 23:14:48 +0000
commitfab9ca551a96625486fa2c5b0883186edb1bed39 (patch)
tree399ae12d8791b78968f9501d5e706f829967862e /net/http/http_network_transaction.h
parent2535a2f5393527e97a1146579d19311aa6b9ffdc (diff)
downloadchromium_src-fab9ca551a96625486fa2c5b0883186edb1bed39.zip
chromium_src-fab9ca551a96625486fa2c5b0883186edb1bed39.tar.gz
chromium_src-fab9ca551a96625486fa2c5b0883186edb1bed39.tar.bz2
Fix a SPDY regression introduced in r39037. When we ignore certificate
errors for SPDY, we need to set |result| to OK. Add rudimentary support for restarting a SPDY network transaction after the user ignores a certificate error. This requires turning |use_spdy| into a class member. R=willchan BUG=35108 TEST=Testing SPDY with NPN against a server with a broken certificate should not result in an SSL certificate error page. Review URL: http://codereview.chromium.org/651054 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@39508 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/http/http_network_transaction.h')
-rw-r--r--net/http/http_network_transaction.h4
1 files changed, 4 insertions, 0 deletions
diff --git a/net/http/http_network_transaction.h b/net/http/http_network_transaction.h
index c7aec45..9a4036e 100644
--- a/net/http/http_network_transaction.h
+++ b/net/http/http_network_transaction.h
@@ -311,6 +311,10 @@ class HttpNetworkTransaction : public HttpTransaction {
// the real request/response of the transaction.
bool establishing_tunnel_;
+ // True if SPDY has been negotiated using the TLS next protocol negotiation
+ // (NPN) extension.
+ bool use_spdy_;
+
// True if we've used the username/password embedded in the URL. This
// makes sure we use the embedded identity only once for the transaction,
// preventing an infinite auth restart loop.