OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/spdy/spdy_session.h" | 5 #include "net/spdy/spdy_session.h" |
6 | 6 |
7 #include <map> | 7 #include <map> |
8 | 8 |
9 #include "base/basictypes.h" | 9 #include "base/basictypes.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 420 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
431 | 431 |
432 state_ = CONNECTED; | 432 state_ = CONNECTED; |
433 connection_.reset(connection); | 433 connection_.reset(connection); |
434 connection_->AddLayeredPool(this); | 434 connection_->AddLayeredPool(this); |
435 is_secure_ = is_secure; | 435 is_secure_ = is_secure; |
436 certificate_error_code_ = certificate_error_code; | 436 certificate_error_code_ = certificate_error_code; |
437 | 437 |
438 NextProto protocol = g_default_protocol; | 438 NextProto protocol = g_default_protocol; |
439 if (is_secure_) { | 439 if (is_secure_) { |
440 SSLClientSocket* ssl_socket = GetSSLClientSocket(); | 440 SSLClientSocket* ssl_socket = GetSSLClientSocket(); |
441 NextProto protocol_negotiated = ssl_socket->protocol_negotiated(); | 441 NextProto protocol_negotiated = ssl_socket->GetNegotiatedProtocol(); |
442 if (protocol_negotiated != kProtoUnknown) { | 442 if (protocol_negotiated != kProtoUnknown) { |
443 protocol = protocol_negotiated; | 443 protocol = protocol_negotiated; |
444 } | 444 } |
445 | 445 |
446 if (ssl_socket->WasDomainBoundCertSent()) { | 446 if (ssl_socket->WasDomainBoundCertSent()) { |
447 // According to the SPDY spec, the credential associated with the TLS | 447 // According to the SPDY spec, the credential associated with the TLS |
448 // connection is stored in slot[1]. | 448 // connection is stored in slot[1]. |
449 credential_state_.SetHasCredential(GURL("https://" + | 449 credential_state_.SetHasCredential(GURL("https://" + |
450 host_port_pair().ToString())); | 450 host_port_pair().ToString())); |
451 } | 451 } |
(...skipping 174 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
626 DCHECK(priority >= net::HIGHEST && priority < net::NUM_PRIORITIES); | 626 DCHECK(priority >= net::HIGHEST && priority < net::NUM_PRIORITIES); |
627 | 627 |
628 DCHECK_EQ(active_streams_[stream_id].get(), stream.get()); | 628 DCHECK_EQ(active_streams_[stream_id].get(), stream.get()); |
629 return OK; | 629 return OK; |
630 } | 630 } |
631 | 631 |
632 bool SpdySession::NeedsCredentials() const { | 632 bool SpdySession::NeedsCredentials() const { |
633 if (!is_secure_) | 633 if (!is_secure_) |
634 return false; | 634 return false; |
635 SSLClientSocket* ssl_socket = GetSSLClientSocket(); | 635 SSLClientSocket* ssl_socket = GetSSLClientSocket(); |
636 if (ssl_socket->protocol_negotiated() < kProtoSPDY3) | 636 if (ssl_socket->GetNegotiatedProtocol() < kProtoSPDY3) |
637 return false; | 637 return false; |
638 return ssl_socket->WasDomainBoundCertSent(); | 638 return ssl_socket->WasDomainBoundCertSent(); |
639 } | 639 } |
640 | 640 |
641 void SpdySession::AddPooledAlias(const HostPortProxyPair& alias) { | 641 void SpdySession::AddPooledAlias(const HostPortProxyPair& alias) { |
642 pooled_aliases_.insert(alias); | 642 pooled_aliases_.insert(alias); |
643 } | 643 } |
644 | 644 |
645 int SpdySession::GetProtocolVersion() const { | 645 int SpdySession::GetProtocolVersion() const { |
646 DCHECK(buffered_spdy_framer_.get()); | 646 DCHECK(buffered_spdy_framer_.get()); |
(...skipping 533 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1180 | 1180 |
1181 dict->SetInteger("active_streams", active_streams_.size()); | 1181 dict->SetInteger("active_streams", active_streams_.size()); |
1182 | 1182 |
1183 dict->SetInteger("unclaimed_pushed_streams", | 1183 dict->SetInteger("unclaimed_pushed_streams", |
1184 unclaimed_pushed_streams_.size()); | 1184 unclaimed_pushed_streams_.size()); |
1185 | 1185 |
1186 dict->SetBoolean("is_secure", is_secure_); | 1186 dict->SetBoolean("is_secure", is_secure_); |
1187 | 1187 |
1188 NextProto proto = kProtoUnknown; | 1188 NextProto proto = kProtoUnknown; |
1189 if (is_secure_) { | 1189 if (is_secure_) { |
1190 proto = GetSSLClientSocket()->protocol_negotiated(); | 1190 proto = GetSSLClientSocket()->GetNegotiatedProtocol(); |
1191 } | 1191 } |
1192 dict->SetString("protocol_negotiated", | 1192 dict->SetString("protocol_negotiated", |
1193 SSLClientSocket::NextProtoToString(proto)); | 1193 SSLClientSocket::NextProtoToString(proto)); |
1194 | 1194 |
1195 dict->SetInteger("error", error_); | 1195 dict->SetInteger("error", error_); |
1196 dict->SetInteger("max_concurrent_streams", max_concurrent_streams_); | 1196 dict->SetInteger("max_concurrent_streams", max_concurrent_streams_); |
1197 | 1197 |
1198 dict->SetInteger("streams_initiated_count", streams_initiated_count_); | 1198 dict->SetInteger("streams_initiated_count", streams_initiated_count_); |
1199 dict->SetInteger("streams_pushed_count", streams_pushed_count_); | 1199 dict->SetInteger("streams_pushed_count", streams_pushed_count_); |
1200 dict->SetInteger("streams_pushed_and_claimed_count", | 1200 dict->SetInteger("streams_pushed_and_claimed_count", |
(...skipping 99 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1300 bool SpdySession::GetSSLInfo(SSLInfo* ssl_info, | 1300 bool SpdySession::GetSSLInfo(SSLInfo* ssl_info, |
1301 bool* was_npn_negotiated, | 1301 bool* was_npn_negotiated, |
1302 NextProto* protocol_negotiated) { | 1302 NextProto* protocol_negotiated) { |
1303 if (!is_secure_) { | 1303 if (!is_secure_) { |
1304 *protocol_negotiated = kProtoUnknown; | 1304 *protocol_negotiated = kProtoUnknown; |
1305 return false; | 1305 return false; |
1306 } | 1306 } |
1307 SSLClientSocket* ssl_socket = GetSSLClientSocket(); | 1307 SSLClientSocket* ssl_socket = GetSSLClientSocket(); |
1308 ssl_socket->GetSSLInfo(ssl_info); | 1308 ssl_socket->GetSSLInfo(ssl_info); |
1309 *was_npn_negotiated = ssl_socket->was_npn_negotiated(); | 1309 *was_npn_negotiated = ssl_socket->was_npn_negotiated(); |
1310 *protocol_negotiated = ssl_socket->protocol_negotiated(); | 1310 *protocol_negotiated = ssl_socket->GetNegotiatedProtocol(); |
1311 return true; | 1311 return true; |
1312 } | 1312 } |
1313 | 1313 |
1314 bool SpdySession::GetSSLCertRequestInfo( | 1314 bool SpdySession::GetSSLCertRequestInfo( |
1315 SSLCertRequestInfo* cert_request_info) { | 1315 SSLCertRequestInfo* cert_request_info) { |
1316 if (!is_secure_) | 1316 if (!is_secure_) |
1317 return false; | 1317 return false; |
1318 GetSSLClientSocket()->GetSSLCertRequestInfo(cert_request_info); | 1318 GetSSLClientSocket()->GetSSLCertRequestInfo(cert_request_info); |
1319 return true; | 1319 return true; |
1320 } | 1320 } |
(...skipping 654 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1975 SSLClientSocket* SpdySession::GetSSLClientSocket() const { | 1975 SSLClientSocket* SpdySession::GetSSLClientSocket() const { |
1976 if (!is_secure_) | 1976 if (!is_secure_) |
1977 return NULL; | 1977 return NULL; |
1978 SSLClientSocket* ssl_socket = | 1978 SSLClientSocket* ssl_socket = |
1979 reinterpret_cast<SSLClientSocket*>(connection_->socket()); | 1979 reinterpret_cast<SSLClientSocket*>(connection_->socket()); |
1980 DCHECK(ssl_socket); | 1980 DCHECK(ssl_socket); |
1981 return ssl_socket; | 1981 return ssl_socket; |
1982 } | 1982 } |
1983 | 1983 |
1984 } // namespace net | 1984 } // namespace net |
OLD | NEW |