OLD | NEW |
1 /* | 1 /* |
2 * Copyright (C) 2006, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2006, 2008 Apple Inc. All rights reserved. |
3 * Copyright (C) 2009 Google Inc. All rights reserved. | 3 * Copyright (C) 2009 Google Inc. All rights reserved. |
4 * | 4 * |
5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
6 * modification, are permitted provided that the following conditions | 6 * modification, are permitted provided that the following conditions |
7 * are met: | 7 * are met: |
8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
101 struct SecurityDetails { | 101 struct SecurityDetails { |
102 DISALLOW_NEW(); | 102 DISALLOW_NEW(); |
103 SecurityDetails() | 103 SecurityDetails() |
104 : validFrom(0) | 104 : validFrom(0) |
105 , validTo(0) | 105 , validTo(0) |
106 { | 106 { |
107 } | 107 } |
108 // All strings are human-readable values. | 108 // All strings are human-readable values. |
109 String protocol; | 109 String protocol; |
110 String keyExchange; | 110 String keyExchange; |
| 111 // keyExchangeGroup is the empty string if not applicable for the connec
tion's key exchange. |
| 112 String keyExchangeGroup; |
111 String cipher; | 113 String cipher; |
112 // mac is the empty string when the connection cipher suite does not | 114 // mac is the empty string when the connection cipher suite does not |
113 // have a separate MAC value (i.e. if the cipher suite is AEAD). | 115 // have a separate MAC value (i.e. if the cipher suite is AEAD). |
114 String mac; | 116 String mac; |
115 String subjectName; | 117 String subjectName; |
116 Vector<String> sanList; | 118 Vector<String> sanList; |
117 String issuer; | 119 String issuer; |
118 time_t validFrom; | 120 time_t validFrom; |
119 time_t validTo; | 121 time_t validTo; |
120 // DER-encoded X509Certificate certificate chain. | 122 // DER-encoded X509Certificate certificate chain. |
(...skipping 88 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
209 HTTPVersion httpVersion() const { return m_httpVersion; } | 211 HTTPVersion httpVersion() const { return m_httpVersion; } |
210 void setHTTPVersion(HTTPVersion version) { m_httpVersion = version; } | 212 void setHTTPVersion(HTTPVersion version) { m_httpVersion = version; } |
211 | 213 |
212 bool hasMajorCertificateErrors() const { return m_hasMajorCertificateErrors;
} | 214 bool hasMajorCertificateErrors() const { return m_hasMajorCertificateErrors;
} |
213 void setHasMajorCertificateErrors(bool hasMajorCertificateErrors) { m_hasMaj
orCertificateErrors = hasMajorCertificateErrors; } | 215 void setHasMajorCertificateErrors(bool hasMajorCertificateErrors) { m_hasMaj
orCertificateErrors = hasMajorCertificateErrors; } |
214 | 216 |
215 SecurityStyle getSecurityStyle() const { return m_securityStyle; } | 217 SecurityStyle getSecurityStyle() const { return m_securityStyle; } |
216 void setSecurityStyle(SecurityStyle securityStyle) { m_securityStyle = secur
ityStyle; } | 218 void setSecurityStyle(SecurityStyle securityStyle) { m_securityStyle = secur
ityStyle; } |
217 | 219 |
218 const SecurityDetails* getSecurityDetails() const { return &m_securityDetail
s; } | 220 const SecurityDetails* getSecurityDetails() const { return &m_securityDetail
s; } |
219 void setSecurityDetails(const String& protocol, const String& keyExchange, c
onst String& cipher, const String& mac, const String& subjectName, const Vector<
String>& sanList, const String& issuer, time_t validFrom, time_t validTo, const
Vector<AtomicString>& certificate, const SignedCertificateTimestampList& sctList
); | 221 void setSecurityDetails(const String& protocol, const String& keyExchange, c
onst String& keyExchangeGroup, const String& cipher, const String& mac, const St
ring& subjectName, const Vector<String>& sanList, const String& issuer, time_t v
alidFrom, time_t validTo, const Vector<AtomicString>& certificate, const SignedC
ertificateTimestampList& sctList); |
220 | 222 |
221 long long appCacheID() const { return m_appCacheID; } | 223 long long appCacheID() const { return m_appCacheID; } |
222 void setAppCacheID(long long id) { m_appCacheID = id; } | 224 void setAppCacheID(long long id) { m_appCacheID = id; } |
223 | 225 |
224 const KURL& appCacheManifestURL() const { return m_appCacheManifestURL; } | 226 const KURL& appCacheManifestURL() const { return m_appCacheManifestURL; } |
225 void setAppCacheManifestURL(const KURL& url) { m_appCacheManifestURL = url;
} | 227 void setAppCacheManifestURL(const KURL& url) { m_appCacheManifestURL = url;
} |
226 | 228 |
227 bool wasFetchedViaSPDY() const { return m_wasFetchedViaSPDY; } | 229 bool wasFetchedViaSPDY() const { return m_wasFetchedViaSPDY; } |
228 void setWasFetchedViaSPDY(bool value) { m_wasFetchedViaSPDY = value; } | 230 void setWasFetchedViaSPDY(bool value) { m_wasFetchedViaSPDY = value; } |
229 | 231 |
(...skipping 241 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
471 unsigned short m_remotePort; | 473 unsigned short m_remotePort; |
472 long long m_encodedBodyLength; | 474 long long m_encodedBodyLength; |
473 long long m_decodedBodyLength; | 475 long long m_decodedBodyLength; |
474 String m_downloadedFilePath; | 476 String m_downloadedFilePath; |
475 RefPtr<BlobDataHandle> m_downloadedFileHandle; | 477 RefPtr<BlobDataHandle> m_downloadedFileHandle; |
476 }; | 478 }; |
477 | 479 |
478 } // namespace blink | 480 } // namespace blink |
479 | 481 |
480 #endif // ResourceResponse_h | 482 #endif // ResourceResponse_h |
OLD | NEW |