diff options
author | davidben <davidben@chromium.org> | 2015-05-12 14:26:02 -0700 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-05-12 21:26:14 +0000 |
commit | b38fe83bd9f34f101e705bff5397c9530b024edd (patch) | |
tree | 3f2c8eeadf036e77ac8dbbc193a837f5784929a7 /net/spdy/spdy_stream.h | |
parent | 6ee288a5be2c4aed73a35e92a18ce03bbc132447 (diff) | |
download | chromium_src-b38fe83bd9f34f101e705bff5397c9530b024edd.zip chromium_src-b38fe83bd9f34f101e705bff5397c9530b024edd.tar.gz chromium_src-b38fe83bd9f34f101e705bff5397c9530b024edd.tar.bz2 |
Remove SpdyStream::GetSSLCertRequestInfo.
SPDY's multiplexing is incompatible with the renego + client auth hack. The old
implementation also assumed that the SpdyStream was still alive which isn't
true. We could attempt save a copy of it, but that doesn't resolve the
fundamental incompatibility of the hack. Instead
https://codereview.chromium.org/1131763002/ disables renegotiation, so this
codepath should be impossible.
BUG=462283
Review URL: https://codereview.chromium.org/1128873008
Cr-Commit-Position: refs/heads/master@{#329493}
Diffstat (limited to 'net/spdy/spdy_stream.h')
-rw-r--r-- | net/spdy/spdy_stream.h | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/net/spdy/spdy_stream.h b/net/spdy/spdy_stream.h index a1821a3..73288ce 100644 --- a/net/spdy/spdy_stream.h +++ b/net/spdy/spdy_stream.h @@ -31,7 +31,6 @@ namespace net { class AddressList; class IPEndPoint; struct LoadTimingInfo; -class SSLCertRequestInfo; class SSLInfo; class SpdySession; @@ -378,10 +377,6 @@ class NET_EXPORT_PRIVATE SpdyStream { bool* was_npn_negotiated, NextProto* protocol_negotiated); - // Fills SSL Certificate Request info |cert_request_info| and returns - // true when SSL is in use. - bool GetSSLCertRequestInfo(SSLCertRequestInfo* cert_request_info); - // If the stream is stalled on sending data, but the session is not // stalled on sending data and |send_window_size_| is positive, then // set |send_stalled_by_flow_control_| to false and unstall the data |