Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/common/resource_messages.h" | 5 #include "content/common/resource_messages.h" |
| 6 | 6 |
| 7 #include "net/base/load_timing_info.h" | 7 #include "net/base/load_timing_info.h" |
| 8 #include "net/http/http_response_headers.h" | 8 #include "net/http/http_response_headers.h" |
| 9 | 9 |
| 10 namespace IPC { | 10 namespace IPC { |
| (...skipping 28 matching lines...) Expand all Loading... | |
| 39 if (has_object) | 39 if (has_object) |
| 40 *r = new net::HttpResponseHeaders(iter); | 40 *r = new net::HttpResponseHeaders(iter); |
| 41 return true; | 41 return true; |
| 42 } | 42 } |
| 43 | 43 |
| 44 void ParamTraits<scoped_refptr<net::HttpResponseHeaders> >::Log( | 44 void ParamTraits<scoped_refptr<net::HttpResponseHeaders> >::Log( |
| 45 const param_type& p, std::string* l) { | 45 const param_type& p, std::string* l) { |
| 46 l->append("<HttpResponseHeaders>"); | 46 l->append("<HttpResponseHeaders>"); |
| 47 } | 47 } |
| 48 | 48 |
| 49 namespace { | |
| 50 void GetCertSize(base::PickleSizer* s, net::X509Certificate* cert) { | |
| 51 GetParamSize(s, !!cert); | |
|
dcheng
2017/04/14 01:11:09
Do we still need to handle nullptr here now that t
| |
| 52 if (cert) { | |
| 53 base::Pickle temp; | |
| 54 cert->Persist(&temp); | |
| 55 s->AddBytes(temp.payload_size()); | |
| 56 } | |
| 57 } | |
| 58 | |
| 59 void WriteCert(base::Pickle* m, net::X509Certificate* cert) { | |
| 60 WriteParam(m, !!cert); | |
| 61 if (cert) | |
| 62 cert->Persist(m); | |
| 63 } | |
| 64 | |
| 65 bool ReadCert(base::PickleIterator* iter, | |
| 66 scoped_refptr<net::X509Certificate>* cert) { | |
| 67 bool has_cert = false; | |
| 68 if (!iter->ReadBool(&has_cert)) | |
| 69 return false; | |
| 70 if (!has_cert) | |
| 71 return true; | |
| 72 | |
| 73 *cert = net::X509Certificate::CreateFromPickle( | |
| 74 iter, net::X509Certificate::PICKLETYPE_CERTIFICATE_CHAIN_V3); | |
| 75 return !!cert->get(); | |
| 76 } | |
| 77 | |
| 78 } // namespace | |
| 79 | |
| 80 void ParamTraits<net::SSLInfo>::GetSize(base::PickleSizer* s, | |
| 81 const param_type& p) { | |
| 82 GetParamSize(s, p.is_valid()); | |
| 83 if (!p.is_valid()) | |
| 84 return; | |
| 85 GetCertSize(s, p.cert.get()); | |
| 86 GetCertSize(s, p.unverified_cert.get()); | |
| 87 GetParamSize(s, p.cert_status); | |
| 88 GetParamSize(s, p.security_bits); | |
| 89 GetParamSize(s, p.key_exchange_group); | |
| 90 GetParamSize(s, p.connection_status); | |
| 91 GetParamSize(s, p.is_issued_by_known_root); | |
| 92 GetParamSize(s, p.pkp_bypassed); | |
| 93 GetParamSize(s, p.client_cert_sent); | |
| 94 GetParamSize(s, p.channel_id_sent); | |
| 95 GetParamSize(s, p.token_binding_negotiated); | |
| 96 GetParamSize(s, p.token_binding_key_param); | |
| 97 GetParamSize(s, p.handshake_type); | |
| 98 GetParamSize(s, p.public_key_hashes); | |
| 99 GetParamSize(s, p.pinning_failure_log); | |
| 100 GetParamSize(s, p.signed_certificate_timestamps); | |
| 101 GetParamSize(s, p.ct_compliance_details_available); | |
| 102 GetParamSize(s, p.ct_ev_policy_compliance); | |
| 103 GetParamSize(s, p.ct_cert_policy_compliance); | |
| 104 GetParamSize(s, p.ocsp_result.response_status); | |
| 105 GetParamSize(s, p.ocsp_result.revocation_status); | |
| 106 } | |
| 107 | |
| 108 void ParamTraits<net::SSLInfo>::Write(base::Pickle* m, const param_type& p) { | |
| 109 WriteParam(m, p.is_valid()); | |
| 110 if (!p.is_valid()) | |
| 111 return; | |
| 112 WriteCert(m, p.cert.get()); | |
| 113 WriteCert(m, p.unverified_cert.get()); | |
| 114 WriteParam(m, p.cert_status); | |
| 115 WriteParam(m, p.security_bits); | |
| 116 WriteParam(m, p.key_exchange_group); | |
| 117 WriteParam(m, p.connection_status); | |
| 118 WriteParam(m, p.is_issued_by_known_root); | |
| 119 WriteParam(m, p.pkp_bypassed); | |
| 120 WriteParam(m, p.client_cert_sent); | |
| 121 WriteParam(m, p.channel_id_sent); | |
| 122 WriteParam(m, p.token_binding_negotiated); | |
| 123 WriteParam(m, p.token_binding_key_param); | |
| 124 WriteParam(m, p.handshake_type); | |
| 125 WriteParam(m, p.public_key_hashes); | |
| 126 WriteParam(m, p.pinning_failure_log); | |
| 127 WriteParam(m, p.signed_certificate_timestamps); | |
| 128 WriteParam(m, p.ct_compliance_details_available); | |
| 129 WriteParam(m, p.ct_ev_policy_compliance); | |
| 130 WriteParam(m, p.ct_cert_policy_compliance); | |
| 131 WriteParam(m, p.ocsp_result.response_status); | |
| 132 WriteParam(m, p.ocsp_result.revocation_status); | |
| 133 } | |
| 134 | |
| 135 bool ParamTraits<net::SSLInfo>::Read(const base::Pickle* m, | |
| 136 base::PickleIterator* iter, | |
| 137 param_type* r) { | |
| 138 bool is_valid = false; | |
| 139 if (!ReadParam(m, iter, &is_valid)) | |
| 140 return false; | |
| 141 if (!is_valid) | |
| 142 return true; | |
| 143 return ReadCert(iter, &r->cert) && | |
| 144 ReadCert(iter, &r->unverified_cert) && | |
| 145 ReadParam(m, iter, &r->cert_status) && | |
| 146 ReadParam(m, iter, &r->security_bits) && | |
| 147 ReadParam(m, iter, &r->key_exchange_group) && | |
| 148 ReadParam(m, iter, &r->connection_status) && | |
| 149 ReadParam(m, iter, &r->is_issued_by_known_root) && | |
| 150 ReadParam(m, iter, &r->pkp_bypassed) && | |
| 151 ReadParam(m, iter, &r->client_cert_sent) && | |
| 152 ReadParam(m, iter, &r->channel_id_sent) && | |
| 153 ReadParam(m, iter, &r->token_binding_negotiated) && | |
| 154 ReadParam(m, iter, &r->token_binding_key_param) && | |
| 155 ReadParam(m, iter, &r->handshake_type) && | |
| 156 ReadParam(m, iter, &r->public_key_hashes) && | |
| 157 ReadParam(m, iter, &r->signed_certificate_timestamps) && | |
| 158 ReadParam(m, iter, &r->ct_compliance_details_available) && | |
| 159 ReadParam(m, iter, &r->ct_ev_policy_compliance) && | |
| 160 ReadParam(m, iter, &r->ct_cert_policy_compliance) && | |
| 161 ReadParam(m, iter, &r->ocsp_result.response_status) && | |
| 162 ReadParam(m, iter, &r->ocsp_result.revocation_status); | |
| 163 } | |
| 164 | |
| 165 void ParamTraits<net::SSLInfo>::Log(const param_type& p, std::string* l) { | |
| 166 l->append("<SSLInfo>"); | |
| 167 } | |
| 168 | |
| 169 void ParamTraits<net::HashValue>::GetSize(base::PickleSizer* s, | |
| 170 const param_type& p) { | |
| 171 GetParamSize(s, p.ToString()); | |
| 172 } | |
| 173 | |
| 174 void ParamTraits<net::HashValue>::Write(base::Pickle* m, const param_type& p) { | |
| 175 WriteParam(m, p.ToString()); | |
| 176 } | |
| 177 | |
| 178 bool ParamTraits<net::HashValue>::Read(const base::Pickle* m, | |
| 179 base::PickleIterator* iter, | |
| 180 param_type* r) { | |
| 181 std::string str; | |
| 182 return ReadParam(m, iter, &str) && r->FromString(str); | |
| 183 } | |
| 184 | |
| 185 void ParamTraits<net::HashValue>::Log(const param_type& p, std::string* l) { | |
| 186 l->append("<HashValue>"); | |
| 187 } | |
| 188 | |
| 49 void ParamTraits<storage::DataElement>::GetSize(base::PickleSizer* s, | 189 void ParamTraits<storage::DataElement>::GetSize(base::PickleSizer* s, |
| 50 const param_type& p) { | 190 const param_type& p) { |
| 51 GetParamSize(s, static_cast<int>(p.type())); | 191 GetParamSize(s, static_cast<int>(p.type())); |
| 52 switch (p.type()) { | 192 switch (p.type()) { |
| 53 case storage::DataElement::TYPE_BYTES: { | 193 case storage::DataElement::TYPE_BYTES: { |
| 54 s->AddData(static_cast<int>(p.length())); | 194 s->AddData(static_cast<int>(p.length())); |
| 55 break; | 195 break; |
| 56 } | 196 } |
| 57 case storage::DataElement::TYPE_BYTES_DESCRIPTION: { | 197 case storage::DataElement::TYPE_BYTES_DESCRIPTION: { |
| 58 GetParamSize(s, p.length()); | 198 GetParamSize(s, p.length()); |
| (...skipping 421 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 480 return true; | 620 return true; |
| 481 } | 621 } |
| 482 | 622 |
| 483 void ParamTraits<scoped_refptr<net::ct::SignedCertificateTimestamp>>::Log( | 623 void ParamTraits<scoped_refptr<net::ct::SignedCertificateTimestamp>>::Log( |
| 484 const param_type& p, | 624 const param_type& p, |
| 485 std::string* l) { | 625 std::string* l) { |
| 486 l->append("<SignedCertificateTimestamp>"); | 626 l->append("<SignedCertificateTimestamp>"); |
| 487 } | 627 } |
| 488 | 628 |
| 489 } // namespace IPC | 629 } // namespace IPC |
| OLD | NEW |