OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // NOTE: No header guards are used, since this file is intended to be expanded | 5 // NOTE: No header guards are used, since this file is intended to be expanded |
6 // directly into net_log.h. DO NOT include this file anywhere else. | 6 // directly into net_log.h. DO NOT include this file anywhere else. |
7 | 7 |
8 // In the event of a failure, a many end events will have a |net_error| | 8 // In the event of a failure, a many end events will have a |net_error| |
9 // parameter with the integer error code associated with the failure. Most | 9 // parameter with the integer error code associated with the failure. Most |
10 // of these parameters are not individually documented. | 10 // of these parameters are not individually documented. |
(...skipping 1559 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1570 // { | 1570 // { |
1571 // } | 1571 // } |
1572 EVENT_TYPE(QUIC_SESSION_CERTIFICATE_VERIFY_FAILED) | 1572 EVENT_TYPE(QUIC_SESSION_CERTIFICATE_VERIFY_FAILED) |
1573 | 1573 |
1574 // Session verified a certificate from the server. | 1574 // Session verified a certificate from the server. |
1575 // { | 1575 // { |
1576 // "subjects": <list of DNS names that the certificate is valid for>, | 1576 // "subjects": <list of DNS names that the certificate is valid for>, |
1577 // } | 1577 // } |
1578 EVENT_TYPE(QUIC_SESSION_CERTIFICATE_VERIFIED) | 1578 EVENT_TYPE(QUIC_SESSION_CERTIFICATE_VERIFIED) |
1579 | 1579 |
| 1580 // Session's proof validation completed. |
| 1581 EVENT_TYPE(QUIC_SESSION_PROOF_VALIDATED) |
| 1582 |
| 1583 // Session's channel validation completed. |
| 1584 EVENT_TYPE(QUIC_SESSION_CHANNEL_VALIDATED) |
| 1585 |
1580 // Session received a QUIC packet. | 1586 // Session received a QUIC packet. |
1581 // { | 1587 // { |
1582 // "peer_address": <The ip:port of the peer>, | 1588 // "peer_address": <The ip:port of the peer>, |
1583 // "self_address": <The local ip:port which received the packet>, | 1589 // "self_address": <The local ip:port which received the packet>, |
1584 // } | 1590 // } |
1585 EVENT_TYPE(QUIC_SESSION_PACKET_RECEIVED) | 1591 EVENT_TYPE(QUIC_SESSION_PACKET_RECEIVED) |
1586 | 1592 |
1587 // Session sent a QUIC packet. | 1593 // Session sent a QUIC packet. |
1588 // { | 1594 // { |
1589 // "encryption_level": <The EncryptionLevel of the packet>, | 1595 // "encryption_level": <The EncryptionLevel of the packet>, |
(...skipping 1388 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2978 // The start/end of some portion of the SAFE_BROWSING_CHECKING_URL during which | 2984 // The start/end of some portion of the SAFE_BROWSING_CHECKING_URL during which |
2979 // the request is delayed due to that check. | 2985 // the request is delayed due to that check. |
2980 // | 2986 // |
2981 // The BEGIN phase contains the following parameters: | 2987 // The BEGIN phase contains the following parameters: |
2982 // { | 2988 // { |
2983 // "url": <The URL being checked>, | 2989 // "url": <The URL being checked>, |
2984 // "defer_reason" : < "at_start", "at_response", "redirect", | 2990 // "defer_reason" : < "at_start", "at_response", "redirect", |
2985 // "resumed_redirect", "unchecked_redirect"> | 2991 // "resumed_redirect", "unchecked_redirect"> |
2986 // } | 2992 // } |
2987 EVENT_TYPE(SAFE_BROWSING_DEFERRED) | 2993 EVENT_TYPE(SAFE_BROWSING_DEFERRED) |
OLD | NEW |