| Index: net/socket/client_socket_pool_manager.cc
|
| diff --git a/net/socket/client_socket_pool_manager.cc b/net/socket/client_socket_pool_manager.cc
|
| deleted file mode 100644
|
| index cd3633661ff92bdcb508f9777bcda43bae08fc71..0000000000000000000000000000000000000000
|
| --- a/net/socket/client_socket_pool_manager.cc
|
| +++ /dev/null
|
| @@ -1,515 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "net/socket/client_socket_pool_manager.h"
|
| -
|
| -#include <string>
|
| -
|
| -#include "base/basictypes.h"
|
| -#include "base/logging.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "net/base/load_flags.h"
|
| -#include "net/http/http_proxy_client_socket_pool.h"
|
| -#include "net/http/http_request_info.h"
|
| -#include "net/http/http_stream_factory.h"
|
| -#include "net/proxy/proxy_info.h"
|
| -#include "net/socket/client_socket_handle.h"
|
| -#include "net/socket/socks_client_socket_pool.h"
|
| -#include "net/socket/ssl_client_socket_pool.h"
|
| -#include "net/socket/transport_client_socket_pool.h"
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -// Limit of sockets of each socket pool.
|
| -int g_max_sockets_per_pool[] = {
|
| - 256, // NORMAL_SOCKET_POOL
|
| - 256 // WEBSOCKET_SOCKET_POOL
|
| -};
|
| -
|
| -static_assert(arraysize(g_max_sockets_per_pool) ==
|
| - HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
|
| - "max sockets per pool length mismatch");
|
| -
|
| -// Default to allow up to 6 connections per host. Experiment and tuning may
|
| -// try other values (greater than 0). Too large may cause many problems, such
|
| -// as home routers blocking the connections!?!? See http://crbug.com/12066.
|
| -//
|
| -// WebSocket connections are long-lived, and should be treated differently
|
| -// than normal other connections. 6 connections per group sounded too small
|
| -// for such use, thus we use a larger limit which was determined somewhat
|
| -// arbitrarily.
|
| -// TODO(yutak): Look at the usage and determine the right value after
|
| -// WebSocket protocol stack starts to work.
|
| -int g_max_sockets_per_group[] = {
|
| - 6, // NORMAL_SOCKET_POOL
|
| - 30 // WEBSOCKET_SOCKET_POOL
|
| -};
|
| -
|
| -static_assert(arraysize(g_max_sockets_per_group) ==
|
| - HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
|
| - "max sockets per group length mismatch");
|
| -
|
| -// The max number of sockets to allow per proxy server. This applies both to
|
| -// http and SOCKS proxies. See http://crbug.com/12066 and
|
| -// http://crbug.com/44501 for details about proxy server connection limits.
|
| -int g_max_sockets_per_proxy_server[] = {
|
| - kDefaultMaxSocketsPerProxyServer, // NORMAL_SOCKET_POOL
|
| - kDefaultMaxSocketsPerProxyServer // WEBSOCKET_SOCKET_POOL
|
| -};
|
| -
|
| -static_assert(arraysize(g_max_sockets_per_proxy_server) ==
|
| - HttpNetworkSession::NUM_SOCKET_POOL_TYPES,
|
| - "max sockets per proxy server length mismatch");
|
| -
|
| -// The meat of the implementation for the InitSocketHandleForHttpRequest,
|
| -// InitSocketHandleForRawConnect and PreconnectSocketsForHttpRequest methods.
|
| -int InitSocketPoolHelper(const GURL& request_url,
|
| - const HttpRequestHeaders& request_extra_headers,
|
| - int request_load_flags,
|
| - RequestPriority request_priority,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - bool force_spdy_over_ssl,
|
| - bool want_spdy_over_npn,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - bool force_tunnel,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - int num_preconnect_streams,
|
| - ClientSocketHandle* socket_handle,
|
| - HttpNetworkSession::SocketPoolType socket_pool_type,
|
| - const OnHostResolutionCallback& resolution_callback,
|
| - const CompletionCallback& callback) {
|
| - scoped_refptr<HttpProxySocketParams> http_proxy_params;
|
| - scoped_refptr<SOCKSSocketParams> socks_params;
|
| - scoped_ptr<HostPortPair> proxy_host_port;
|
| -
|
| - bool using_ssl = request_url.SchemeIs("https") ||
|
| - request_url.SchemeIs("wss") || force_spdy_over_ssl;
|
| -
|
| - HostPortPair origin_host_port = HostPortPair::FromURL(request_url);
|
| -
|
| - if (!using_ssl && session->params().testing_fixed_http_port != 0) {
|
| - origin_host_port.set_port(session->params().testing_fixed_http_port);
|
| - } else if (using_ssl && session->params().testing_fixed_https_port != 0) {
|
| - origin_host_port.set_port(session->params().testing_fixed_https_port);
|
| - }
|
| -
|
| - bool disable_resolver_cache =
|
| - request_load_flags & LOAD_BYPASS_CACHE ||
|
| - request_load_flags & LOAD_VALIDATE_CACHE ||
|
| - request_load_flags & LOAD_DISABLE_CACHE;
|
| -
|
| - int load_flags = request_load_flags;
|
| - if (session->params().ignore_certificate_errors)
|
| - load_flags |= LOAD_IGNORE_ALL_CERT_ERRORS;
|
| -
|
| - // Build the string used to uniquely identify connections of this type.
|
| - // Determine the host and port to connect to.
|
| - std::string connection_group = origin_host_port.ToString();
|
| - DCHECK(!connection_group.empty());
|
| - if (request_url.SchemeIs("ftp")) {
|
| - // Combining FTP with forced SPDY over SSL would be a "path to madness".
|
| - // Make sure we never do that.
|
| - DCHECK(!using_ssl);
|
| - connection_group = "ftp/" + connection_group;
|
| - }
|
| - if (using_ssl) {
|
| - // All connections in a group should use the same SSLConfig settings.
|
| - // Encode version_max in the connection group's name, unless it's the
|
| - // default version_max. (We want the common case to use the shortest
|
| - // encoding). A version_max of TLS 1.1 is encoded as "ssl(max:3.2)/"
|
| - // rather than "tlsv1.1/" because the actual protocol version, which
|
| - // is selected by the server, may not be TLS 1.1. Do not encode
|
| - // version_min in the connection group's name because version_min
|
| - // should be the same for all connections, whereas version_max may
|
| - // change for version fallbacks.
|
| - std::string prefix = "ssl/";
|
| - if (ssl_config_for_origin.version_max !=
|
| - SSLClientSocket::GetMaxSupportedSSLVersion()) {
|
| - switch (ssl_config_for_origin.version_max) {
|
| - case SSL_PROTOCOL_VERSION_TLS1_2:
|
| - prefix = "ssl(max:3.3)/";
|
| - break;
|
| - case SSL_PROTOCOL_VERSION_TLS1_1:
|
| - prefix = "ssl(max:3.2)/";
|
| - break;
|
| - case SSL_PROTOCOL_VERSION_TLS1:
|
| - prefix = "ssl(max:3.1)/";
|
| - break;
|
| - case SSL_PROTOCOL_VERSION_SSL3:
|
| - prefix = "sslv3/";
|
| - break;
|
| - default:
|
| - CHECK(false);
|
| - break;
|
| - }
|
| - }
|
| - connection_group = prefix + connection_group;
|
| - }
|
| -
|
| - bool ignore_limits = (request_load_flags & LOAD_IGNORE_LIMITS) != 0;
|
| - if (!proxy_info.is_direct()) {
|
| - ProxyServer proxy_server = proxy_info.proxy_server();
|
| - proxy_host_port.reset(new HostPortPair(proxy_server.host_port_pair()));
|
| - scoped_refptr<TransportSocketParams> proxy_tcp_params(
|
| - new TransportSocketParams(
|
| - *proxy_host_port,
|
| - disable_resolver_cache,
|
| - ignore_limits,
|
| - resolution_callback,
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT));
|
| -
|
| - if (proxy_info.is_http() || proxy_info.is_https()) {
|
| - std::string user_agent;
|
| - request_extra_headers.GetHeader(HttpRequestHeaders::kUserAgent,
|
| - &user_agent);
|
| - scoped_refptr<SSLSocketParams> ssl_params;
|
| - if (proxy_info.is_https()) {
|
| - // Combine connect and write for SSL sockets in TCP FastOpen
|
| - // field trial.
|
| - TransportSocketParams::CombineConnectAndWritePolicy
|
| - combine_connect_and_write =
|
| - session->params().enable_tcp_fast_open_for_ssl ?
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DESIRED :
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT;
|
| - proxy_tcp_params = new TransportSocketParams(*proxy_host_port,
|
| - disable_resolver_cache,
|
| - ignore_limits,
|
| - resolution_callback,
|
| - combine_connect_and_write);
|
| - // Set ssl_params, and unset proxy_tcp_params
|
| - ssl_params = new SSLSocketParams(proxy_tcp_params,
|
| - NULL,
|
| - NULL,
|
| - *proxy_host_port.get(),
|
| - ssl_config_for_proxy,
|
| - PRIVACY_MODE_DISABLED,
|
| - load_flags,
|
| - force_spdy_over_ssl,
|
| - want_spdy_over_npn);
|
| - proxy_tcp_params = NULL;
|
| - }
|
| -
|
| - http_proxy_params =
|
| - new HttpProxySocketParams(proxy_tcp_params,
|
| - ssl_params,
|
| - request_url,
|
| - user_agent,
|
| - origin_host_port,
|
| - session->http_auth_cache(),
|
| - session->http_auth_handler_factory(),
|
| - session->spdy_session_pool(),
|
| - force_tunnel || using_ssl,
|
| - session->params().proxy_delegate);
|
| - } else {
|
| - DCHECK(proxy_info.is_socks());
|
| - char socks_version;
|
| - if (proxy_server.scheme() == ProxyServer::SCHEME_SOCKS5)
|
| - socks_version = '5';
|
| - else
|
| - socks_version = '4';
|
| - connection_group = base::StringPrintf(
|
| - "socks%c/%s", socks_version, connection_group.c_str());
|
| -
|
| - socks_params = new SOCKSSocketParams(proxy_tcp_params,
|
| - socks_version == '5',
|
| - origin_host_port);
|
| - }
|
| - }
|
| -
|
| - // Change group name if privacy mode is enabled.
|
| - if (privacy_mode == PRIVACY_MODE_ENABLED)
|
| - connection_group = "pm/" + connection_group;
|
| -
|
| - // Deal with SSL - which layers on top of any given proxy.
|
| - if (using_ssl) {
|
| - scoped_refptr<TransportSocketParams> ssl_tcp_params;
|
| - if (proxy_info.is_direct()) {
|
| - // Setup TCP params if non-proxied SSL connection.
|
| - // Combine connect and write for SSL sockets in TCP FastOpen field trial.
|
| - TransportSocketParams::CombineConnectAndWritePolicy
|
| - combine_connect_and_write =
|
| - session->params().enable_tcp_fast_open_for_ssl ?
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DESIRED :
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT;
|
| - ssl_tcp_params = new TransportSocketParams(origin_host_port,
|
| - disable_resolver_cache,
|
| - ignore_limits,
|
| - resolution_callback,
|
| - combine_connect_and_write);
|
| - }
|
| - scoped_refptr<SSLSocketParams> ssl_params =
|
| - new SSLSocketParams(ssl_tcp_params,
|
| - socks_params,
|
| - http_proxy_params,
|
| - origin_host_port,
|
| - ssl_config_for_origin,
|
| - privacy_mode,
|
| - load_flags,
|
| - force_spdy_over_ssl,
|
| - want_spdy_over_npn);
|
| - SSLClientSocketPool* ssl_pool = NULL;
|
| - if (proxy_info.is_direct()) {
|
| - ssl_pool = session->GetSSLSocketPool(socket_pool_type);
|
| - } else {
|
| - ssl_pool = session->GetSocketPoolForSSLWithProxy(socket_pool_type,
|
| - *proxy_host_port);
|
| - }
|
| -
|
| - if (num_preconnect_streams) {
|
| - RequestSocketsForPool(ssl_pool, connection_group, ssl_params,
|
| - num_preconnect_streams, net_log);
|
| - return OK;
|
| - }
|
| -
|
| - return socket_handle->Init(connection_group, ssl_params,
|
| - request_priority, callback, ssl_pool,
|
| - net_log);
|
| - }
|
| -
|
| - // Finally, get the connection started.
|
| -
|
| - if (proxy_info.is_http() || proxy_info.is_https()) {
|
| - HttpProxyClientSocketPool* pool =
|
| - session->GetSocketPoolForHTTPProxy(socket_pool_type, *proxy_host_port);
|
| - if (num_preconnect_streams) {
|
| - RequestSocketsForPool(pool, connection_group, http_proxy_params,
|
| - num_preconnect_streams, net_log);
|
| - return OK;
|
| - }
|
| -
|
| - return socket_handle->Init(connection_group, http_proxy_params,
|
| - request_priority, callback,
|
| - pool, net_log);
|
| - }
|
| -
|
| - if (proxy_info.is_socks()) {
|
| - SOCKSClientSocketPool* pool =
|
| - session->GetSocketPoolForSOCKSProxy(socket_pool_type, *proxy_host_port);
|
| - if (num_preconnect_streams) {
|
| - RequestSocketsForPool(pool, connection_group, socks_params,
|
| - num_preconnect_streams, net_log);
|
| - return OK;
|
| - }
|
| -
|
| - return socket_handle->Init(connection_group, socks_params,
|
| - request_priority, callback, pool,
|
| - net_log);
|
| - }
|
| -
|
| - DCHECK(proxy_info.is_direct());
|
| - scoped_refptr<TransportSocketParams> tcp_params =
|
| - new TransportSocketParams(
|
| - origin_host_port,
|
| - disable_resolver_cache,
|
| - ignore_limits,
|
| - resolution_callback,
|
| - TransportSocketParams::COMBINE_CONNECT_AND_WRITE_DEFAULT);
|
| - TransportClientSocketPool* pool =
|
| - session->GetTransportSocketPool(socket_pool_type);
|
| - if (num_preconnect_streams) {
|
| - RequestSocketsForPool(pool, connection_group, tcp_params,
|
| - num_preconnect_streams, net_log);
|
| - return OK;
|
| - }
|
| -
|
| - return socket_handle->Init(connection_group, tcp_params,
|
| - request_priority, callback,
|
| - pool, net_log);
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -ClientSocketPoolManager::ClientSocketPoolManager() {}
|
| -ClientSocketPoolManager::~ClientSocketPoolManager() {}
|
| -
|
| -// static
|
| -int ClientSocketPoolManager::max_sockets_per_pool(
|
| - HttpNetworkSession::SocketPoolType pool_type) {
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - return g_max_sockets_per_pool[pool_type];
|
| -}
|
| -
|
| -// static
|
| -void ClientSocketPoolManager::set_max_sockets_per_pool(
|
| - HttpNetworkSession::SocketPoolType pool_type,
|
| - int socket_count) {
|
| - DCHECK_LT(0, socket_count);
|
| - DCHECK_GT(1000, socket_count); // Sanity check.
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - g_max_sockets_per_pool[pool_type] = socket_count;
|
| - DCHECK_GE(g_max_sockets_per_pool[pool_type],
|
| - g_max_sockets_per_group[pool_type]);
|
| -}
|
| -
|
| -// static
|
| -int ClientSocketPoolManager::max_sockets_per_group(
|
| - HttpNetworkSession::SocketPoolType pool_type) {
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - return g_max_sockets_per_group[pool_type];
|
| -}
|
| -
|
| -// static
|
| -void ClientSocketPoolManager::set_max_sockets_per_group(
|
| - HttpNetworkSession::SocketPoolType pool_type,
|
| - int socket_count) {
|
| - DCHECK_LT(0, socket_count);
|
| - // The following is a sanity check... but we should NEVER be near this value.
|
| - DCHECK_GT(100, socket_count);
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - g_max_sockets_per_group[pool_type] = socket_count;
|
| -
|
| - DCHECK_GE(g_max_sockets_per_pool[pool_type],
|
| - g_max_sockets_per_group[pool_type]);
|
| - DCHECK_GE(g_max_sockets_per_proxy_server[pool_type],
|
| - g_max_sockets_per_group[pool_type]);
|
| -}
|
| -
|
| -// static
|
| -int ClientSocketPoolManager::max_sockets_per_proxy_server(
|
| - HttpNetworkSession::SocketPoolType pool_type) {
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - return g_max_sockets_per_proxy_server[pool_type];
|
| -}
|
| -
|
| -// static
|
| -void ClientSocketPoolManager::set_max_sockets_per_proxy_server(
|
| - HttpNetworkSession::SocketPoolType pool_type,
|
| - int socket_count) {
|
| - DCHECK_LT(0, socket_count);
|
| - DCHECK_GT(100, socket_count); // Sanity check.
|
| - DCHECK_LT(pool_type, HttpNetworkSession::NUM_SOCKET_POOL_TYPES);
|
| - // Assert this case early on. The max number of sockets per group cannot
|
| - // exceed the max number of sockets per proxy server.
|
| - DCHECK_LE(g_max_sockets_per_group[pool_type], socket_count);
|
| - g_max_sockets_per_proxy_server[pool_type] = socket_count;
|
| -}
|
| -
|
| -int InitSocketHandleForHttpRequest(
|
| - const GURL& request_url,
|
| - const HttpRequestHeaders& request_extra_headers,
|
| - int request_load_flags,
|
| - RequestPriority request_priority,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - bool force_spdy_over_ssl,
|
| - bool want_spdy_over_npn,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - ClientSocketHandle* socket_handle,
|
| - const OnHostResolutionCallback& resolution_callback,
|
| - const CompletionCallback& callback) {
|
| - DCHECK(socket_handle);
|
| - return InitSocketPoolHelper(
|
| - request_url, request_extra_headers, request_load_flags, request_priority,
|
| - session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn,
|
| - ssl_config_for_origin, ssl_config_for_proxy, false, privacy_mode, net_log,
|
| - 0, socket_handle, HttpNetworkSession::NORMAL_SOCKET_POOL,
|
| - resolution_callback, callback);
|
| -}
|
| -
|
| -int InitSocketHandleForWebSocketRequest(
|
| - const GURL& request_url,
|
| - const HttpRequestHeaders& request_extra_headers,
|
| - int request_load_flags,
|
| - RequestPriority request_priority,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - bool force_spdy_over_ssl,
|
| - bool want_spdy_over_npn,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - ClientSocketHandle* socket_handle,
|
| - const OnHostResolutionCallback& resolution_callback,
|
| - const CompletionCallback& callback) {
|
| - DCHECK(socket_handle);
|
| - return InitSocketPoolHelper(
|
| - request_url, request_extra_headers, request_load_flags, request_priority,
|
| - session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn,
|
| - ssl_config_for_origin, ssl_config_for_proxy, true, privacy_mode, net_log,
|
| - 0, socket_handle, HttpNetworkSession::WEBSOCKET_SOCKET_POOL,
|
| - resolution_callback, callback);
|
| -}
|
| -
|
| -int InitSocketHandleForRawConnect(
|
| - const HostPortPair& host_port_pair,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - ClientSocketHandle* socket_handle,
|
| - const CompletionCallback& callback) {
|
| - DCHECK(socket_handle);
|
| - // Synthesize an HttpRequestInfo.
|
| - GURL request_url = GURL("http://" + host_port_pair.ToString());
|
| - HttpRequestHeaders request_extra_headers;
|
| - int request_load_flags = 0;
|
| - RequestPriority request_priority = MEDIUM;
|
| -
|
| - return InitSocketPoolHelper(
|
| - request_url, request_extra_headers, request_load_flags, request_priority,
|
| - session, proxy_info, false, false, ssl_config_for_origin,
|
| - ssl_config_for_proxy, true, privacy_mode, net_log, 0, socket_handle,
|
| - HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(),
|
| - callback);
|
| -}
|
| -
|
| -int InitSocketHandleForTlsConnect(
|
| - const HostPortPair& host_port_pair,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - ClientSocketHandle* socket_handle,
|
| - const CompletionCallback& callback) {
|
| - DCHECK(socket_handle);
|
| - // Synthesize an HttpRequestInfo.
|
| - GURL request_url = GURL("https://" + host_port_pair.ToString());
|
| - HttpRequestHeaders request_extra_headers;
|
| - int request_load_flags = 0;
|
| - RequestPriority request_priority = MEDIUM;
|
| -
|
| - return InitSocketPoolHelper(
|
| - request_url, request_extra_headers, request_load_flags, request_priority,
|
| - session, proxy_info, false, false, ssl_config_for_origin,
|
| - ssl_config_for_proxy, true, privacy_mode, net_log, 0, socket_handle,
|
| - HttpNetworkSession::NORMAL_SOCKET_POOL, OnHostResolutionCallback(),
|
| - callback);
|
| -}
|
| -
|
| -int PreconnectSocketsForHttpRequest(
|
| - const GURL& request_url,
|
| - const HttpRequestHeaders& request_extra_headers,
|
| - int request_load_flags,
|
| - RequestPriority request_priority,
|
| - HttpNetworkSession* session,
|
| - const ProxyInfo& proxy_info,
|
| - bool force_spdy_over_ssl,
|
| - bool want_spdy_over_npn,
|
| - const SSLConfig& ssl_config_for_origin,
|
| - const SSLConfig& ssl_config_for_proxy,
|
| - PrivacyMode privacy_mode,
|
| - const BoundNetLog& net_log,
|
| - int num_preconnect_streams) {
|
| - return InitSocketPoolHelper(
|
| - request_url, request_extra_headers, request_load_flags, request_priority,
|
| - session, proxy_info, force_spdy_over_ssl, want_spdy_over_npn,
|
| - ssl_config_for_origin, ssl_config_for_proxy, false, privacy_mode, net_log,
|
| - num_preconnect_streams, NULL, HttpNetworkSession::NORMAL_SOCKET_POOL,
|
| - OnHostResolutionCallback(), CompletionCallback());
|
| -}
|
| -
|
| -} // namespace net
|
|
|