Lines Matching refs:url
52 HttpUtil::SpecForRequest(request_info->url) :
53 HttpUtil::PathForRequest(request_info->url);
57 GetHostAndOptionalPort(request_info->url).c_str());
83 // support sending a HEAD request to an URL that only expects to be sent a
116 GetHostAndPort(request_info->url).c_str(),
117 GetHostAndOptionalPort(request_info->url).c_str());
201 session_->ssl_client_auth_cache()->Add(GetHostAndPort(request_->url),
425 TRACE_EVENT_BEGIN("http.resolve_proxy", request_, request_->url.spec());
430 TRACE_EVENT_END("http.resolve_proxy", request_, request_->url.spec());
434 TRACE_EVENT_BEGIN("http.init_conn", request_, request_->url.spec());
439 TRACE_EVENT_END("http.init_conn", request_, request_->url.spec());
443 TRACE_EVENT_BEGIN("http.socks_connect", request_, request_->url.spec());
448 TRACE_EVENT_END("http.socks_connect", request_, request_->url.spec());
452 TRACE_EVENT_BEGIN("http.ssl_connect", request_, request_->url.spec());
457 TRACE_EVENT_END("http.ssl_connect", request_, request_->url.spec());
461 TRACE_EVENT_BEGIN("http.send_request", request_, request_->url.spec());
468 url.spec());
474 TRACE_EVENT_BEGIN("http.read_headers", request_, request_->url.spec());
481 TRACE_EVENT_END("http.read_headers", request_, request_->url.spec());
487 TRACE_EVENT_BEGIN("http.read_body", request_, request_->url.spec());
494 TRACE_EVENT_END("http.read_body", request_, request_->url.spec());
501 request_, request_->url.spec());
510 request_, request_->url.spec());
517 TRACE_EVENT_BEGIN("http.send_request", request_, request_->url.spec());
524 TRACE_EVENT_END("http.send_request", request_, request_->url.spec());
530 TRACE_EVENT_BEGIN("http.read_headers", request_, request_->url.spec());
537 TRACE_EVENT_END("http.read_headers", request_, request_->url.spec());
543 TRACE_EVENT_BEGIN("http.read_body", request_, request_->url.spec());
550 TRACE_EVENT_END("http.read_body", request_, request_->url.spec());
575 request_->url, &proxy_info_, &io_callback_, &pac_request_, load_log_);
636 using_ssl_ = request_->url.SchemeIs("https");
658 host = request_->url.HostNoBrackets();
659 port = request_->url.EffectiveIntPort();
673 // url endpoint. Hence we append the url data into the connection_group.
675 connection_group.append(request_->url.GetOrigin().spec());
752 HostResolver::RequestInfo req_info(request_->url.HostNoBrackets(),
753 request_->url.EffectiveIntPort());
791 s, request_->url.HostNoBrackets(), ssl_config_);
1137 HostResolver::RequestInfo req_info(request_->url.HostNoBrackets(),
1138 request_->url.EffectiveIntPort());
1397 << GetHostAndPort(request_->url) << ".";
1465 Lookup(GetHostAndPort(request_->url));
1488 session_->ssl_client_auth_cache()->Remove(GetHostAndPort(request_->url));
1576 // now exists that corresponds to a proxy server that could load the URL.
1598 request_->url, &proxy_info_, &io_callback_, &pac_request_, load_log_);
1644 request_->url.GetOrigin();
1652 std::string() : request_->url.path();
1685 // Don't do preemptive authorization if the URL contains a username/password,
1686 // since we must first be challenged in order to use the URL's identity.
1687 if (request_->url.has_username())
1718 // Try to use the username/password encoded into the URL first.
1719 if (target == HttpAuth::AUTH_SERVER && request_->url.has_username() &&
1723 // Extract the username:password from the URL.
1724 GetIdentityFromURL(request_->url,
1850 // Pick a new auth identity to try, by looking to the URL and auth cache.