| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/loader/resource_loader.h" | 5 #include "content/browser/loader/resource_loader.h" |
| 6 | 6 |
| 7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
| 8 #include "base/location.h" | 8 #include "base/location.h" |
| 9 #include "base/metrics/histogram.h" | 9 #include "base/metrics/histogram.h" |
| 10 #include "base/profiler/scoped_tracker.h" | 10 #include "base/profiler/scoped_tracker.h" |
| (...skipping 97 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 108 request, &response->head.appcache_id, | 108 request, &response->head.appcache_id, |
| 109 &response->head.appcache_manifest_url); | 109 &response->head.appcache_manifest_url); |
| 110 if (info->is_load_timing_enabled()) | 110 if (info->is_load_timing_enabled()) |
| 111 request->GetLoadTimingInfo(&response->head.load_timing); | 111 request->GetLoadTimingInfo(&response->head.load_timing); |
| 112 | 112 |
| 113 if (request->ssl_info().cert.get()) { | 113 if (request->ssl_info().cert.get()) { |
| 114 SSLStatus ssl_status; | 114 SSLStatus ssl_status; |
| 115 GetSSLStatusForRequest(request->url(), request->ssl_info(), | 115 GetSSLStatusForRequest(request->url(), request->ssl_info(), |
| 116 info->GetChildID(), &ssl_status); | 116 info->GetChildID(), &ssl_status); |
| 117 response->head.security_info = SerializeSecurityInfo(ssl_status); | 117 response->head.security_info = SerializeSecurityInfo(ssl_status); |
| 118 response->head.has_major_certificate_errors = |
| 119 net::IsCertStatusError(ssl_status.cert_status) && |
| 120 !net::IsCertStatusMinorError(ssl_status.cert_status); |
| 118 } else { | 121 } else { |
| 119 // We should not have any SSL state. | 122 // We should not have any SSL state. |
| 120 DCHECK(!request->ssl_info().cert_status); | 123 DCHECK(!request->ssl_info().cert_status); |
| 121 DCHECK_EQ(request->ssl_info().security_bits, -1); | 124 DCHECK_EQ(request->ssl_info().security_bits, -1); |
| 122 DCHECK_EQ(request->ssl_info().key_exchange_info, 0); | 125 DCHECK_EQ(request->ssl_info().key_exchange_info, 0); |
| 123 DCHECK(!request->ssl_info().connection_status); | 126 DCHECK(!request->ssl_info().connection_status); |
| 124 } | 127 } |
| 125 } | 128 } |
| 126 | 129 |
| 127 } // namespace | 130 } // namespace |
| (...skipping 577 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 705 case net::URLRequestStatus::FAILED: | 708 case net::URLRequestStatus::FAILED: |
| 706 status = STATUS_UNDEFINED; | 709 status = STATUS_UNDEFINED; |
| 707 break; | 710 break; |
| 708 } | 711 } |
| 709 | 712 |
| 710 UMA_HISTOGRAM_ENUMERATION("Net.Prefetch.Pattern", status, STATUS_MAX); | 713 UMA_HISTOGRAM_ENUMERATION("Net.Prefetch.Pattern", status, STATUS_MAX); |
| 711 } | 714 } |
| 712 } | 715 } |
| 713 | 716 |
| 714 } // namespace content | 717 } // namespace content |
| OLD | NEW |