diff options
author | reillyg <reillyg@chromium.org> | 2015-03-13 12:41:44 -0700 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-03-13 19:43:02 +0000 |
commit | bed8fdc7a0995427e0af24e63693ad790920b612 (patch) | |
tree | d5371fd6a4aa2f7cf1a33bc18a6e1eaea34bda41 /win8 | |
parent | fee295ea8f4d8bac532eae149029362dccfb4800 (diff) | |
download | chromium_src-bed8fdc7a0995427e0af24e63693ad790920b612.zip chromium_src-bed8fdc7a0995427e0af24e63693ad790920b612.tar.gz chromium_src-bed8fdc7a0995427e0af24e63693ad790920b612.tar.bz2 |
Open a firewall hole when a TCP server or UDP socket is bound.
This patch implements firewall hole punching when a Chrome App uses
the chrome.socket, chrome.sockets.tcpServer or chrome.sockets.udp APIs
to open a socket to receive packets from the network. Sockets that only
listen on the local loopback device do not open a port.
A primitive FirewallHole class is added that could be reused by the
Pepper sockets API as well.
BUG=435404
Review URL: https://codereview.chromium.org/965613002
Cr-Commit-Position: refs/heads/master@{#320552}
Diffstat (limited to 'win8')
0 files changed, 0 insertions, 0 deletions