Index: net/http/http_proxy_client_socket.cc |
diff --git a/net/http/http_proxy_client_socket.cc b/net/http/http_proxy_client_socket.cc |
index 9b577700ce1910c12d8e37e2138c0d7f5453d871..8b2bf2b9e7545d4619cedcf1eb4a5a910cbf8984 100644 |
--- a/net/http/http_proxy_client_socket.cc |
+++ b/net/http/http_proxy_client_socket.cc |
@@ -97,7 +97,7 @@ NextProto HttpProxyClientSocket::GetProtocolNegotiated() const { |
} |
const HttpResponseInfo* HttpProxyClientSocket::GetConnectResponseInfo() const { |
- return response_.headers ? &response_ : NULL; |
+ return response_.headers.get() ? &response_ : NULL; |
} |
HttpStream* HttpProxyClientSocket::CreateConnectResponseStream() { |
@@ -433,7 +433,8 @@ int HttpProxyClientSocket::DoSendRequest() { |
parser_buf_ = new GrowableIOBuffer(); |
http_stream_parser_.reset( |
- new HttpStreamParser(transport_.get(), &request_, parser_buf_, net_log_)); |
+ new HttpStreamParser( |
+ transport_.get(), &request_, parser_buf_.get(), net_log_)); |
return http_stream_parser_->SendRequest( |
request_line_, request_headers_, scoped_ptr<UploadDataStream>(), |
&response_, io_callback_); |
@@ -497,7 +498,7 @@ int HttpProxyClientSocket::DoReadHeadersComplete(int result) { |
// authentication code is smart enough to avoid being tricked by an |
// active network attacker. |
// The next state is intentionally not set as it should be STATE_NONE; |
- return HandleProxyAuthChallenge(auth_, &response_, net_log_); |
+ return HandleProxyAuthChallenge(auth_.get(), &response_, net_log_); |
default: |
// Ignore response to avoid letting the proxy impersonate the target |
@@ -515,8 +516,9 @@ int HttpProxyClientSocket::DoDrainBody() { |
DCHECK(drain_buf_); |
DCHECK(transport_->is_initialized()); |
next_state_ = STATE_DRAIN_BODY_COMPLETE; |
- return http_stream_parser_->ReadResponseBody(drain_buf_, kDrainBodyBufferSize, |
- io_callback_); |
+ return http_stream_parser_-> |
+ ReadResponseBody(drain_buf_.get(), kDrainBodyBufferSize, |
+ io_callback_); |
} |
int HttpProxyClientSocket::DoDrainBodyComplete(int result) { |