OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_stream_factory.h" | 5 #include "net/quic/quic_stream_factory.h" |
6 | 6 |
7 #include <set> | 7 #include <set> |
8 | 8 |
9 #include "base/message_loop/message_loop.h" | 9 #include "base/message_loop/message_loop.h" |
10 #include "base/message_loop/message_loop_proxy.h" | 10 #include "base/message_loop/message_loop_proxy.h" |
(...skipping 407 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
418 QuicClientSession* session = active_sessions_[host_port_proxy_pair]; | 418 QuicClientSession* session = active_sessions_[host_port_proxy_pair]; |
419 DCHECK(session); | 419 DCHECK(session); |
420 return scoped_ptr<QuicHttpStream>( | 420 return scoped_ptr<QuicHttpStream>( |
421 new QuicHttpStream(session->GetWeakPtr())); | 421 new QuicHttpStream(session->GetWeakPtr())); |
422 } | 422 } |
423 | 423 |
424 void QuicStreamFactory::OnIdleSession(QuicClientSession* session) { | 424 void QuicStreamFactory::OnIdleSession(QuicClientSession* session) { |
425 } | 425 } |
426 | 426 |
427 void QuicStreamFactory::OnSessionGoingAway(QuicClientSession* session) { | 427 void QuicStreamFactory::OnSessionGoingAway(QuicClientSession* session) { |
428 const QuicConnectionStats& stats = session->connection()->GetStats(); | |
428 const AliasSet& aliases = session_aliases_[session]; | 429 const AliasSet& aliases = session_aliases_[session]; |
429 for (AliasSet::const_iterator it = aliases.begin(); it != aliases.end(); | 430 for (AliasSet::const_iterator it = aliases.begin(); it != aliases.end(); |
430 ++it) { | 431 ++it) { |
431 DCHECK(active_sessions_.count(*it)); | 432 DCHECK(active_sessions_.count(*it)); |
432 DCHECK_EQ(session, active_sessions_[*it]); | 433 DCHECK_EQ(session, active_sessions_[*it]); |
433 active_sessions_.erase(*it); | 434 active_sessions_.erase(*it); |
434 if (!http_server_properties_) | 435 if (!http_server_properties_) |
435 continue; | 436 continue; |
436 | 437 |
437 if (!session->IsCryptoHandshakeConfirmed()) { | 438 if (!session->IsCryptoHandshakeConfirmed()) { |
438 // TODO(rch): In the special case where the session has received no | 439 // TODO(rch): In the special case where the session has received no |
439 // packets from the peer, we should consider blacklisting this | 440 // packets from the peer, we should consider blacklisting this |
440 // differently so that we still race TCP but we don't consider the | 441 // differently so that we still race TCP but we don't consider the |
441 // session connected until the handshake has been confirmed. | 442 // session connected until the handshake has been confirmed. |
442 http_server_properties_->SetBrokenAlternateProtocol(it->first); | 443 http_server_properties_->SetBrokenAlternateProtocol(it->first); |
444 UMA_HISTOGRAM_COUNTS("Net.QuicHandshakeNotConfirmedNumPacketsReceived", | |
445 stats.packets_received); | |
443 } else { | 446 } else { |
444 QuicConnectionStats stats = session->connection()->GetStats(); | 447 QuicConnectionStats stats = session->connection()->GetStats(); |
jar (doing other things)
2014/03/06 22:28:25
nit: Can we delete this since you pulled it out of
Ryan Hamilton
2014/03/06 22:42:58
Done. Also added a continue to the previous block
| |
445 HttpServerProperties::NetworkStats network_stats; | 448 HttpServerProperties::NetworkStats network_stats; |
446 network_stats.rtt = base::TimeDelta::FromMicroseconds(stats.rtt); | 449 network_stats.rtt = base::TimeDelta::FromMicroseconds(stats.rtt); |
447 network_stats.bandwidth_estimate = stats.estimated_bandwidth; | 450 network_stats.bandwidth_estimate = stats.estimated_bandwidth; |
448 http_server_properties_->SetServerNetworkStats( | 451 http_server_properties_->SetServerNetworkStats( |
449 it->first, network_stats); | 452 it->first, network_stats); |
450 } | 453 } |
451 } | 454 } |
452 IPEndPoint peer_address = session->connection()->peer_address(); | 455 IPEndPoint peer_address = session->connection()->peer_address(); |
453 ip_aliases_[peer_address].erase(session); | 456 ip_aliases_[peer_address].erase(session); |
454 if (ip_aliases_[peer_address].empty()) { | 457 if (ip_aliases_[peer_address].empty()) { |
(...skipping 230 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
685 // Copy the CachedState for the canonical server from canonical_crypto_config | 688 // Copy the CachedState for the canonical server from canonical_crypto_config |
686 // as the initial CachedState for the server_hostname in crypto_config. | 689 // as the initial CachedState for the server_hostname in crypto_config. |
687 crypto_config->InitializeFrom(server_hostname, | 690 crypto_config->InitializeFrom(server_hostname, |
688 canonical_host_port_proxy_pair.first.host(), | 691 canonical_host_port_proxy_pair.first.host(), |
689 canonical_crypto_config); | 692 canonical_crypto_config); |
690 // Update canonical version to point at the "most recent" crypto_config. | 693 // Update canonical version to point at the "most recent" crypto_config. |
691 canonical_hostname_to_origin_map_[canonical_host_port] = host_port_proxy_pair; | 694 canonical_hostname_to_origin_map_[canonical_host_port] = host_port_proxy_pair; |
692 } | 695 } |
693 | 696 |
694 } // namespace net | 697 } // namespace net |
OLD | NEW |