| Index: net/socket/socks5_client_socket.cc
|
| diff --git a/net/socket/socks5_client_socket.cc b/net/socket/socks5_client_socket.cc
|
| index ae362ceb4ce0e70ee243813639d88a669b440894..eff5992d1645ae77c9d3db3288472da051f9edf7 100644
|
| --- a/net/socket/socks5_client_socket.cc
|
| +++ b/net/socket/socks5_client_socket.cc
|
| @@ -14,6 +14,7 @@
|
| #include "base/trace_event/trace_event.h"
|
| #include "net/base/io_buffer.h"
|
| #include "net/log/net_log.h"
|
| +#include "net/log/net_log_event_type.h"
|
| #include "net/socket/client_socket_handle.h"
|
|
|
| namespace net {
|
| @@ -57,7 +58,7 @@ int SOCKS5ClientSocket::Connect(const CompletionCallback& callback) {
|
| if (completed_handshake_)
|
| return OK;
|
|
|
| - net_log_.BeginEvent(NetLog::TYPE_SOCKS5_CONNECT);
|
| + net_log_.BeginEvent(NetLogEventType::SOCKS5_CONNECT);
|
|
|
| next_state_ = STATE_GREET_WRITE;
|
| buffer_.clear();
|
| @@ -66,7 +67,7 @@ int SOCKS5ClientSocket::Connect(const CompletionCallback& callback) {
|
| if (rv == ERR_IO_PENDING) {
|
| user_callback_ = callback;
|
| } else {
|
| - net_log_.EndEventWithNetErrorCode(NetLog::TYPE_SOCKS5_CONNECT, rv);
|
| + net_log_.EndEventWithNetErrorCode(NetLogEventType::SOCKS5_CONNECT, rv);
|
| }
|
| return rv;
|
| }
|
| @@ -202,7 +203,7 @@ void SOCKS5ClientSocket::OnIOComplete(int result) {
|
| DCHECK_NE(STATE_NONE, next_state_);
|
| int rv = DoLoop(result);
|
| if (rv != ERR_IO_PENDING) {
|
| - net_log_.EndEvent(NetLog::TYPE_SOCKS5_CONNECT);
|
| + net_log_.EndEvent(NetLogEventType::SOCKS5_CONNECT);
|
| DoCallback(rv);
|
| }
|
| }
|
| @@ -226,41 +227,43 @@ int SOCKS5ClientSocket::DoLoop(int last_io_result) {
|
| switch (state) {
|
| case STATE_GREET_WRITE:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_SOCKS5_GREET_WRITE);
|
| + net_log_.BeginEvent(NetLogEventType::SOCKS5_GREET_WRITE);
|
| rv = DoGreetWrite();
|
| break;
|
| case STATE_GREET_WRITE_COMPLETE:
|
| rv = DoGreetWriteComplete(rv);
|
| - net_log_.EndEventWithNetErrorCode(NetLog::TYPE_SOCKS5_GREET_WRITE, rv);
|
| + net_log_.EndEventWithNetErrorCode(
|
| + NetLogEventType::SOCKS5_GREET_WRITE, rv);
|
| break;
|
| case STATE_GREET_READ:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_SOCKS5_GREET_READ);
|
| + net_log_.BeginEvent(NetLogEventType::SOCKS5_GREET_READ);
|
| rv = DoGreetRead();
|
| break;
|
| case STATE_GREET_READ_COMPLETE:
|
| rv = DoGreetReadComplete(rv);
|
| - net_log_.EndEventWithNetErrorCode(NetLog::TYPE_SOCKS5_GREET_READ, rv);
|
| + net_log_.EndEventWithNetErrorCode(
|
| + NetLogEventType::SOCKS5_GREET_READ, rv);
|
| break;
|
| case STATE_HANDSHAKE_WRITE:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_SOCKS5_HANDSHAKE_WRITE);
|
| + net_log_.BeginEvent(NetLogEventType::SOCKS5_HANDSHAKE_WRITE);
|
| rv = DoHandshakeWrite();
|
| break;
|
| case STATE_HANDSHAKE_WRITE_COMPLETE:
|
| rv = DoHandshakeWriteComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_SOCKS5_HANDSHAKE_WRITE, rv);
|
| + NetLogEventType::SOCKS5_HANDSHAKE_WRITE, rv);
|
| break;
|
| case STATE_HANDSHAKE_READ:
|
| DCHECK_EQ(OK, rv);
|
| - net_log_.BeginEvent(NetLog::TYPE_SOCKS5_HANDSHAKE_READ);
|
| + net_log_.BeginEvent(NetLogEventType::SOCKS5_HANDSHAKE_READ);
|
| rv = DoHandshakeRead();
|
| break;
|
| case STATE_HANDSHAKE_READ_COMPLETE:
|
| rv = DoHandshakeReadComplete(rv);
|
| net_log_.EndEventWithNetErrorCode(
|
| - NetLog::TYPE_SOCKS5_HANDSHAKE_READ, rv);
|
| + NetLogEventType::SOCKS5_HANDSHAKE_READ, rv);
|
| break;
|
| default:
|
| NOTREACHED() << "bad state";
|
| @@ -277,7 +280,7 @@ int SOCKS5ClientSocket::DoGreetWrite() {
|
| // Since we only have 1 byte to send the hostname length in, if the
|
| // URL has a hostname longer than 255 characters we can't send it.
|
| if (0xFF < host_request_info_.hostname().size()) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_HOSTNAME_TOO_BIG);
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_HOSTNAME_TOO_BIG);
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
|
|
| @@ -324,7 +327,8 @@ int SOCKS5ClientSocket::DoGreetReadComplete(int result) {
|
| return result;
|
|
|
| if (result == 0) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNEXPECTEDLY_CLOSED_DURING_GREETING);
|
| + net_log_.AddEvent(
|
| + NetLogEventType::SOCKS_UNEXPECTEDLY_CLOSED_DURING_GREETING);
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
|
|
| @@ -337,12 +341,12 @@ int SOCKS5ClientSocket::DoGreetReadComplete(int result) {
|
|
|
| // Got the greet data.
|
| if (buffer_[0] != kSOCKS5Version) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNEXPECTED_VERSION,
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_UNEXPECTED_VERSION,
|
| NetLog::IntCallback("version", buffer_[0]));
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
| if (buffer_[1] != 0x00) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNEXPECTED_AUTH,
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_UNEXPECTED_AUTH,
|
| NetLog::IntCallback("method", buffer_[1]));
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
| @@ -434,7 +438,8 @@ int SOCKS5ClientSocket::DoHandshakeReadComplete(int result) {
|
|
|
| // The underlying socket closed unexpectedly.
|
| if (result == 0) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNEXPECTEDLY_CLOSED_DURING_HANDSHAKE);
|
| + net_log_.AddEvent(
|
| + NetLogEventType::SOCKS_UNEXPECTEDLY_CLOSED_DURING_HANDSHAKE);
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
|
|
| @@ -445,12 +450,12 @@ int SOCKS5ClientSocket::DoHandshakeReadComplete(int result) {
|
| // and accordingly increase them
|
| if (bytes_received_ == kReadHeaderSize) {
|
| if (buffer_[0] != kSOCKS5Version || buffer_[2] != kNullByte) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNEXPECTED_VERSION,
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_UNEXPECTED_VERSION,
|
| NetLog::IntCallback("version", buffer_[0]));
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
| if (buffer_[1] != 0x00) {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_SERVER_ERROR,
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_SERVER_ERROR,
|
| NetLog::IntCallback("error_code", buffer_[1]));
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
| @@ -469,7 +474,7 @@ int SOCKS5ClientSocket::DoHandshakeReadComplete(int result) {
|
| else if (address_type == kEndPointResolvedIPv6)
|
| read_header_size += sizeof(struct in6_addr) - 1;
|
| else {
|
| - net_log_.AddEvent(NetLog::TYPE_SOCKS_UNKNOWN_ADDRESS_TYPE,
|
| + net_log_.AddEvent(NetLogEventType::SOCKS_UNKNOWN_ADDRESS_TYPE,
|
| NetLog::IntCallback("address_type", buffer_[3]));
|
| return ERR_SOCKS_CONNECTION_FAILED;
|
| }
|
|
|