| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright (C) 2006, 2008 Apple Inc. All rights reserved. | 2 * Copyright (C) 2006, 2008 Apple Inc. All rights reserved. |
| 3 * Copyright (C) 2009 Google Inc. All rights reserved. | 3 * Copyright (C) 2009 Google Inc. All rights reserved. |
| 4 * | 4 * |
| 5 * Redistribution and use in source and binary forms, with or without | 5 * Redistribution and use in source and binary forms, with or without |
| 6 * modification, are permitted provided that the following conditions | 6 * modification, are permitted provided that the following conditions |
| 7 * are met: | 7 * are met: |
| 8 * 1. Redistributions of source code must retain the above copyright | 8 * 1. Redistributions of source code must retain the above copyright |
| 9 * notice, this list of conditions and the following disclaimer. | 9 * notice, this list of conditions and the following disclaimer. |
| 10 * 2. Redistributions in binary form must reproduce the above copyright | 10 * 2. Redistributions in binary form must reproduce the above copyright |
| (...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 100 | 100 |
| 101 struct SecurityDetails { | 101 struct SecurityDetails { |
| 102 DISALLOW_NEW(); | 102 DISALLOW_NEW(); |
| 103 SecurityDetails() | 103 SecurityDetails() |
| 104 : certID(0) | 104 : certID(0) |
| 105 { | 105 { |
| 106 } | 106 } |
| 107 // All strings are human-readable values. | 107 // All strings are human-readable values. |
| 108 String protocol; | 108 String protocol; |
| 109 String keyExchange; | 109 String keyExchange; |
| 110 // keyExchangeGroup is the empty string if not applicable for the connec
tion's key exchange. |
| 111 String keyExchangeGroup; |
| 110 String cipher; | 112 String cipher; |
| 111 // mac is the empty string when the connection cipher suite does not | 113 // mac is the empty string when the connection cipher suite does not |
| 112 // have a separate MAC value (i.e. if the cipher suite is AEAD). | 114 // have a separate MAC value (i.e. if the cipher suite is AEAD). |
| 113 String mac; | 115 String mac; |
| 114 int certID; | 116 int certID; |
| 115 SignedCertificateTimestampList sctList; | 117 SignedCertificateTimestampList sctList; |
| 116 }; | 118 }; |
| 117 | 119 |
| 118 class ExtraData : public RefCounted<ExtraData> { | 120 class ExtraData : public RefCounted<ExtraData> { |
| 119 public: | 121 public: |
| (...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 205 const CString& getSecurityInfo() const { return m_securityInfo; } | 207 const CString& getSecurityInfo() const { return m_securityInfo; } |
| 206 void setSecurityInfo(const CString& securityInfo) { m_securityInfo = securit
yInfo; } | 208 void setSecurityInfo(const CString& securityInfo) { m_securityInfo = securit
yInfo; } |
| 207 | 209 |
| 208 bool hasMajorCertificateErrors() const { return m_hasMajorCertificateErrors;
} | 210 bool hasMajorCertificateErrors() const { return m_hasMajorCertificateErrors;
} |
| 209 void setHasMajorCertificateErrors(bool hasMajorCertificateErrors) { m_hasMaj
orCertificateErrors = hasMajorCertificateErrors; } | 211 void setHasMajorCertificateErrors(bool hasMajorCertificateErrors) { m_hasMaj
orCertificateErrors = hasMajorCertificateErrors; } |
| 210 | 212 |
| 211 SecurityStyle getSecurityStyle() const { return m_securityStyle; } | 213 SecurityStyle getSecurityStyle() const { return m_securityStyle; } |
| 212 void setSecurityStyle(SecurityStyle securityStyle) { m_securityStyle = secur
ityStyle; } | 214 void setSecurityStyle(SecurityStyle securityStyle) { m_securityStyle = secur
ityStyle; } |
| 213 | 215 |
| 214 const SecurityDetails* getSecurityDetails() const { return &m_securityDetail
s; } | 216 const SecurityDetails* getSecurityDetails() const { return &m_securityDetail
s; } |
| 215 void setSecurityDetails(const String& protocol, const String& keyExchange, c
onst String& cipher, const String& mac, int certId, const SignedCertificateTimes
tampList& sctList); | 217 void setSecurityDetails(const String& protocol, const String& keyExchange, c
onst String& keyExchangeGroup, const String& cipher, const String& mac, int cert
Id, const SignedCertificateTimestampList& sctList); |
| 216 | 218 |
| 217 long long appCacheID() const { return m_appCacheID; } | 219 long long appCacheID() const { return m_appCacheID; } |
| 218 void setAppCacheID(long long id) { m_appCacheID = id; } | 220 void setAppCacheID(long long id) { m_appCacheID = id; } |
| 219 | 221 |
| 220 const KURL& appCacheManifestURL() const { return m_appCacheManifestURL; } | 222 const KURL& appCacheManifestURL() const { return m_appCacheManifestURL; } |
| 221 void setAppCacheManifestURL(const KURL& url) { m_appCacheManifestURL = url;
} | 223 void setAppCacheManifestURL(const KURL& url) { m_appCacheManifestURL = url;
} |
| 222 | 224 |
| 223 bool wasFetchedViaSPDY() const { return m_wasFetchedViaSPDY; } | 225 bool wasFetchedViaSPDY() const { return m_wasFetchedViaSPDY; } |
| 224 void setWasFetchedViaSPDY(bool value) { m_wasFetchedViaSPDY = value; } | 226 void setWasFetchedViaSPDY(bool value) { m_wasFetchedViaSPDY = value; } |
| 225 | 227 |
| (...skipping 244 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 470 unsigned short m_remotePort; | 472 unsigned short m_remotePort; |
| 471 long long m_encodedBodyLength; | 473 long long m_encodedBodyLength; |
| 472 long long m_decodedBodyLength; | 474 long long m_decodedBodyLength; |
| 473 String m_downloadedFilePath; | 475 String m_downloadedFilePath; |
| 474 RefPtr<BlobDataHandle> m_downloadedFileHandle; | 476 RefPtr<BlobDataHandle> m_downloadedFileHandle; |
| 475 }; | 477 }; |
| 476 | 478 |
| 477 } // namespace blink | 479 } // namespace blink |
| 478 | 480 |
| 479 #endif // ResourceResponse_h | 481 #endif // ResourceResponse_h |
| OLD | NEW |