| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
| |
ter ZZrge branch 'master' into hsts
net: add kiwiirc.com to HSTS preloaded.
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@188102 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
| |
BUG=169644
Review URL: https://chromiumcodereview.appspot.com/12755023
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@187718 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
BUG=167061
TEST=https://certdemo-ev-valid.ssl.d-trust.net shows as EV
Review URL: https://chromiumcodereview.appspot.com/12569002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@187092 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
--host-resolver-rules switch.
The "MAP" directive can now be given the special substitution "~NOTFOUND".
For instance to remap all *.google.com domains to ERR_NAME_NOT_RESOLVED:
MAP *.google.com ~NOTFOUND
BUG=180426
Review URL: https://chromiumcodereview.appspot.com/12481010
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186548 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
It is safe to do that now when there's no more clients (except the own unit tests) using OpenSync() with ASYNC flag.
BUG=114783
Review URL: https://chromiumcodereview.appspot.com/12526004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186530 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
BUG=175186
TBR=brettw@chromium.org
Review URL: https://chromiumcodereview.appspot.com/12473004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186462 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This distinguishes navigations blocked by administrator policy from other
ERR_NETWORK_ACCESS_DENIED sources. The custom error page can then inform the
user that a policy configured by the administrator prevents access to the site.
BUG=88702
Review URL: https://chromiumcodereview.appspot.com/12226113
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186455 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186208 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Because OpenSSL/Android do not have the ability to discover
if a private key exists for a given certificate/public key,
net::OpenSSLClientKeyStore is used instead to store that
information. OpenSSLClientKeyStore is fed information by
higher layers, which are expected to use JNI and the Android
KeyChain APIs to discover the associated private key/alias
for a given certificate.
Other work in this CL:
- Moved generate-client-certificates.sh to net/data/ssl/scripts/
from net/data/ssl/scripts/client_authentication/
Also removed the run-test-server.sh script which is
only used to perform manual local testing.
Updated the client certificates under net/data/ssl/certificates/
and list then properly in the README file.
- Added new unit test to check OpenSSL-based client
authentication against the TestServer. Details are in
net/socket/ssl_client_socket_openssl_unittests.cc
- Modified generate-client-certificates.sh script to use
a password for the client certificates it generates.
This is to work around a platform bug in Android 4.0.3
and older, where the CertInstaller cannot install
password-less PKCS#12 files. The password is 'chrome'.
- Added GetTestClientCertsDirectory() to
net/base/test_data_directory.h to deal with the fact
that remote and local test servers don't accept the
same kind of paths when reading the |client_authorities|
field of an SSLConfig object.
BUG=166642, 172902, 134418
Review URL: https://chromiumcodereview.appspot.com/12220104
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185785 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
DomainStates are being turned into "results" objects only. Rename the Delete
functions to make clear they operate on Dynamic Data. Also, move some
TransportSecurityStates functions into private.
BUG=156152
Review URL: https://chromiumcodereview.appspot.com/12093038
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185757 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Basically, we treat a WINDOW_UPDATE frame with stream_id 0
as an update for the session window.
Convert the flow_control boolean into a tri-state FlowControlState enum. Add a kProtoSPDY31 constant in next_proto.h and turn on per-session flow control only if SPDY 3.1 is negotiated.
BUG=176592
Review URL: https://codereview.chromium.org/12277015
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185603 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
This is an overflow check, but 0 isn't dangerous and crashes Mac.
BUG=178837
Review URL: https://chromiumcodereview.appspot.com/12375005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185162 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds FileStream::Context::IOResult struct that's used to pass
results of IO operations inside FileStream::Context. Following bugs are
fixes:
1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
return a positive result in case of an error. This happens because
POSIX errors are positive integers and FileStream was written with
assumption that they are negative.
2. On Windows Seek() and Flush() errors were not handled correctly.
This is because CheckForIOError() was assuming that all error codes
are negative, but RecordAndMapError() was mapping positive errors.
3. On Windows OVERLAPPED struct wasn't set to zeros as necessary.
Also added unittests to check that error codes are handled correctly
now.
Reviewed at: https://codereview.chromium.org/12320003
TBR=mmenke@chromium.org
Review URL: https://codereview.chromium.org/12333004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185015 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ASAN bots started timing out consistently last night at the time
this was submitted. It's a possible culprit. It doesn't involve
extensions, but it does things with streams and I assume those
are connected to the feeds in this test somehow.
browser_tests browser_tests failed 4 ( 12 mins, 52 secs )
stdio
ParseFeedInvalidFeed1
ParseFeedInvalidFeed2
ParseFeedValidFeed3
ParseFeedValidFeed4
http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%281%29/builds/3019
http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%282%29/builds/3186
http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%283%29/builds/2716
> Fix net::FileStream to handle all errors correctly.
>
> This CL adds FileStream::Context::IOResult struct that's used to pass
> results of IO operations inside FileStream::Context. Following bugs are
> fixes:
>
> 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
> return a positive result in case of an error. This happens because
> POSIX errors are positive integers and FileStream was written with
> assumption that they are negative.
> 2. On Windows Seek() and Flush() errors were not handled correctly.
> This is because CheckForIOError() was assuming that all error codes
> are negative, but RecordAndMapError() was mapping positive errors.
> 3. On Windows results of asynchronous ReadFile() and WriteFile() were
> not handled correctly - ERR_IO_PENDING would be returned even when
> operation completes synchronously.
> 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary.
>
> Also added unittests to check that error codes are handled correctly
> now.
>
> TBR=mmenke@chromium.org
>
> Review URL: https://codereview.chromium.org/12326107
TBR=sergeyu@chromium.org
Review URL: https://codereview.chromium.org/12330144
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184672 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds FileStream::Context::IOResult struct that's used to pass
results of IO operations inside FileStream::Context. Following bugs are
fixes:
1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
return a positive result in case of an error. This happens because
POSIX errors are positive integers and FileStream was written with
assumption that they are negative.
2. On Windows Seek() and Flush() errors were not handled correctly.
This is because CheckForIOError() was assuming that all error codes
are negative, but RecordAndMapError() was mapping positive errors.
3. On Windows results of asynchronous ReadFile() and WriteFile() were
not handled correctly - ERR_IO_PENDING would be returned even when
operation completes synchronously.
4. On Windows OVERLAPPED struct wasn't set to zeros as necessary.
Also added unittests to check that error codes are handled correctly
now.
TBR=mmenke@chromium.org
Review URL: https://codereview.chromium.org/12326107
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184577 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
> Fix net::FileStream to handle all errors correctly.
>
> This CL adds FileStream::Context::IOResult struct that's used to pass
> results of IO operations inside FileStream::Context. Following bugs are
> fixes:
>
> 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
> return a positive result in case of an error. This happens because
> POSIX errors are positive integers and FileStream was written with
> assumption that they are negative.
> 2. On Windows Seek() and Flush() errors were not handled correctly.
> This is because CheckForIOError() was assuming that all error codes
> are negative, but RecordAndMapError() was mapping positive errors.
> 3. On Windows results of asynchronous ReadFile() and WriteFile() were
> not handled correctly - ERR_IO_PENDING would be returned even when
> operation completes synchronously.
> 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary.
>
> Also added unittests to check that error codes are handled correctly
> now.
>
> Review URL: https://codereview.chromium.org/12321100
TBR=sergeyu@chromium.org
Review URL: https://codereview.chromium.org/12310110
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184461 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds FileStream::Context::IOResult struct that's used to pass
results of IO operations inside FileStream::Context. Following bugs are
fixes:
1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
return a positive result in case of an error. This happens because
POSIX errors are positive integers and FileStream was written with
assumption that they are negative.
2. On Windows Seek() and Flush() errors were not handled correctly.
This is because CheckForIOError() was assuming that all error codes
are negative, but RecordAndMapError() was mapping positive errors.
3. On Windows results of asynchronous ReadFile() and WriteFile() were
not handled correctly - ERR_IO_PENDING would be returned even when
operation completes synchronously.
4. On Windows OVERLAPPED struct wasn't set to zeros as necessary.
Also added unittests to check that error codes are handled correctly
now.
Review URL: https://codereview.chromium.org/12321100
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184453 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Reviving entropy flag of missing packet.
Merge internal change: 42912121
Fix bug in QuicConnection::OnCanWrite in which the packet generator never flushed the packets when the visitor did not write all bytes.
Merge internal change: 42919513
Clarify the SendAlarm behavior of the TestHelper in QuicConnectionTests. In particular, it is important that if we set a send alarm for a delay of Zero, that IsSendAlarmSet() returns true.
Merge internal change: 42908913
Fix bug in SimpleQuicFramerVisitor which did not make a copy of StreamFrame data.
Merge internal change: 42880797
Use the QuicPacketGenerator in QuicConnection.
Merge internal change: 42861764
Add new files
Create a new QuicPacketGenerator class to encapsulate the write side operation of a QuicConnection. It provides methods for enqueing control frames, consuming stream data, and sending acks and feedback. It does just-in-time serialization.
Also adds a new test-only simple framer which provides an easy
mechanism for parsing packets to verify they contain correct
contents.
Merge internal change: 42813986
Add missing files
Implementing logic for checking entropy of received packets and setting entropy on outgoing packets.
Merge internal change: 42715914
Fixing a bug where when QuicPacketCreator queues a stream frame, the underlying string is not immediately owned, which can cause issues if SendStreamData doesn't always flush packets before exiting.
Merge internal change: 42649091
Add the SetKey, SetNoncePrefix, GetKeySize, and GetNoncePrefixSize methods to the QuicEncrypter and QuicDecrypter interfaces. Specify the format of the nonce for AEAD algorithms.
Add a |packet_sequence_number| argument to QuicEncrypter::Encrypt
and QuicDecrypter::Decrypt. This requires passing the packet
sequence number to QuicFramer::EncryptPacket and
QuicFramer::DecryptPayload.
Merge internal change: 42641062
Move all logic out of ReceivedInfo. Now it is just a plain struct that is used to represent the state of the received packets info.
Also, fixes the following bug:
i) Packet 7 8 get lost, largest observed packet is 6.
ii) Packet 9 arrives with an AckFrame which has least unacked as 9.
iii) We clear 7 8 from missing packets.
iv) While adding packet 9 we reinsert 7 and 8 as missing packets since largest observed is 6.
Merge internal change: 42556974
Make framer return SerializedPacket instead of QuicPacket.
Merge internal change: 42551314
Add SendConnectionClosePacket method to QuicConnection
Merge internal change: 42474257
Removing offset from the reset stream frame.
Merge internal change: 42436913
Fix for when the end of a frame leave too few bytes for the next header
Merge internal change: 42435044
Bug fix for packet loss in inter arrival. Added min drift threshold for inter arrival.
Merge internal change: 42391696
Add missing file.
Use linked_hash_map to store UnackedPackets: simplifies and optimizes the code.
Merge internal change: 42381785
Bugfix "Flaky tests due to QuicTime not initialized"
Removed DCHECK that due to timing was invalid
Merge internal change: 42374053
Fix TSAN test failure.
Merge internal change: 42371302
A simple tcp tail drop like implementation.
Merge internal change: 42314912
Adding the GoAway Frame.
Merge internal change: 42291652
Chromium review fixes.
Merge internal change: 42290161
Implement framing for entropy in AckFrame.
Merge internal change: 42286308
Make QuicPacketCreator return SerializedPacket struct.
Merge internal change: 42240179
Fix for incoming duplicate packet. Avoids NACKing a duplicate.
Merge internal change: 42150291
Remove QuicConnectionVisitorInterface::AckedPackets and use the existing SequenceSet typedef instead. Renamed SequenceSet to SequenceNumberSet to be more readable.
Merge internal change: 42147690
Made ramp up bitrate in inter arrival aware of the current send rate.
Merge internal change: 42118607
Style fix of full_packet.
Merge internal change: 42057032
Packing multiple streams together in a single packet from OnCanWrite.
Merge internal change: 42054845
Change the representation of public and private flags to explicts bools. Using enums turns out to be problematic because ENUM1 | ENUM2 can not be assigned to EnumType. I discovered this problem in attempting to implement version negotiation.
Merge internal change: 42042022
Various small QUIC cleanups after merging to Chrome.
Merge internal change: 42041347
Start using QuicClock Now where needed and sending it around instead of querying it multiple times. This CL also fixes the reports of incoming lost packets which had been lost.
Merge internal change: 41944659
Fix mock clock.
Adding Now function back to QuicClock but now as a more accurate now
Merge internal change: 41909929
Rename of function Now to ApproximateNow to allow us to differentiate between the two in the future.
Merge internal change: 41909178
TBR=jar@chromium.org
R=jar@chromium.org
BUG=
Review URL: https://chromiumcodereview.appspot.com/12334063
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184374 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
TBR=sky
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184344 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
BUG=123566
TEST=https://evssldemo.twca.com.tw/index.html loads with EV
Review URL: https://chromiumcodereview.appspot.com/12310055
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184294 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
> Fix net::FileStream to handle all errors correctly.
>
> This CL adds FileStream::Context::IOResult struct that's used to pass
> results of IO operations inside FileStream::Context. Following bugs are
> fixes:
>
> 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
> return a positive result in case of an error. This happens because
> POSIX errors are positive integers and FileStream was written with
> assumption that they are negative.
> 2. On Windows Seek() and Flush() errors were not handled correctly.
> This is because CheckForIOError() was assuming that all error codes
> are negative, but RecordAndMapError() was mapping positive errors.
> 3. On Windows results of asynchronous ReadFile() and WriteFile() were
> not handled correctly - ERR_IO_PENDING would be returned even when
> operation completes synchronously.
>
> Also added unittests to check that error codes are handled correctly
> now.
>
> Review URL: https://chromiumcodereview.appspot.com/12320003
TBR=sergeyu@chromium.org
Review URL: https://codereview.chromium.org/12328071
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184278 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This CL adds FileStream::Context::IOResult struct that's used to pass
results of IO operations inside FileStream::Context. Following bugs are
fixes:
1. On POSIX net::FileStream::Read() and net::FileStream::Write() would
return a positive result in case of an error. This happens because
POSIX errors are positive integers and FileStream was written with
assumption that they are negative.
2. On Windows Seek() and Flush() errors were not handled correctly.
This is because CheckForIOError() was assuming that all error codes
are negative, but RecordAndMapError() was mapping positive errors.
3. On Windows results of asynchronous ReadFile() and WriteFile() were
not handled correctly - ERR_IO_PENDING would be returned even when
operation completes synchronously.
Also added unittests to check that error codes are handled correctly
now.
Review URL: https://chromiumcodereview.appspot.com/12320003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184257 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184152 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
BUG=70360
TEST=icon is displayed instead of downloaded when accessing an icon resource with "image/vnd.microsoft.icon" MIME type
Review URL: https://chromiumcodereview.appspot.com/12303021
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184050 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
Unmerged chunk read is tested by SpdyHttpStreamSpdy2(3)Test.DelayedSendChunkedPost already.
BUG=None
TEST=net_unittests
Review URL: https://chromiumcodereview.appspot.com/12207174
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183994 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
On systems with only Teredo IPv6 addresses, Windows resolver does not
make queries for AAAA DNS records. Therefore, we can safely resort to
AF_INET-only lookups instead of AF_UNSPEC.
This will make no difference when using the system resolver
(getaddrinfo), but should reduce penalty on AsyncDNS which currently
performs A/AAAA queries in series.
BUG=171549
Review URL: https://chromiumcodereview.appspot.com/12296028
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183818 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This change adds EV entries for six, new Symantec roots. These roots use the
same EV OIDs as the previous roots.
(See bug for details.)
BUG=171532
Review URL: https://chromiumcodereview.appspot.com/12088076
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183688 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
Since we don't report the compression state of an SSL connection any longer
(r182743), these utility functions are now unused.
BUG=none
Review URL: https://chromiumcodereview.appspot.com/12280006
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183615 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183579 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://chromiumcodereview.appspot.com/12230027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183558 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183221 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix use after free bug in initial implementation.
Initially landed: 182331
Reverted: 182335
Review URL: https://chromiumcodereview.appspot.com/12253020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182471 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
| |
BUG=None
TEST=No DCHECK failure on uploading 2GB+ files with Debug build
Review URL: https://codereview.chromium.org/12217165
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182394 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Create a new type of disk_cache to be used by the GL Shader
cache. This cache acts similar to the regular DISK_CACHE
except the rank of the entry is not updated if the entry
is not modified. This means we can read entries as we
iterate and the iterators do not get shuffled around.
BUG=166763
Review URL: https://chromiumcodereview.appspot.com/12224017
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182343 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
> Enhance net internals/net log output for QUIC.
>
>
> Review URL: https://chromiumcodereview.appspot.com/12207020
TBR=rch@chromium.org
Review URL: https://codereview.chromium.org/12252024
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182335 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://chromiumcodereview.appspot.com/12207020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182331 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
To implement CertVerifyProc on Android we refer to the Java
side to query the platform trust managers. Currently the
information we get from the platform is binary - each
certificate chain is either identified as trusted or not, in
which case we assume that this is due to not-trusted root.
This patch provides better granularity distinguishing the
following cases: expired, not yet valid, incorrect (could not
be parsed), not trusted root.
This allowed to reenable two net unittests:
- CertVerifyProcTest.ExtraneousMD5RootCert
- CertVerifyProcTest.IntermediateCARequireExplicitPolicy
The following net unittest had to be disabled as it joins
the club of CertVerifyProc tests failing on bots with
incorrect time/date settings:
- CertVerifyProcTest.InvalidKeyUsage
BUG=169762
Review URL: https://chromiumcodereview.appspot.com/12212135
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182280 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WifiPHYLayerProtocol characterizes the physical layer (PHY) protocol
of the current association with an 802.11 access point. It uses
the common nomenclature of referring to the IEEE 802.11 standard
amendment which introduced the protocol, i.e. a/b/g/n.
TBR=sky
BUG=174414
Review URL: https://codereview.chromium.org/12082090
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182231 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This patch adds a new value to the net::SSLClientCertType that matches
DSA-based client certificates. This will be used by Android's client
certificate support code.
For an example, see https://chromiumcodereview.appspot.com/12220104/
More specifically:
- It modifies <net/base/ssl_client_cert_type.h> to add the new
enum value.
- It adds a corresponding non-translatable string ID to
chrome/app/generated_resources.grd, and ensures that the
ClientCertTypeToString() function in cookies_tree_model_util.cc
returns it appropriately.
- It adds SpdyCredentialBuilderTest.MAYBE_FailedWithDSACert
unit test, similar to the MAYBE_FailedWithRSACert. This is
based on the assumption that SPDY uses ECDSA certificates
exclusively (no code supporting RSA-based ones was found
under net/spdy).
Note that server-bound certificate unit tests have not been
modified (some of them handle both RSA and ECDSA certificates),
given that none of the production support code for this feature
seems to care about the certificate type, and that DSA-based
certificates are extremely rare in practice, and disappearing.
BUG=165668
Review URL: https://chromiumcodereview.appspot.com/12221136
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182119 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
if enabled with --enable-opus-playback.
BUG=174280
TESTED=try bots
Review URL: https://codereview.chromium.org/12221108
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182061 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://chromiumcodereview.appspot.com/12209080
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181979 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
stack to use platform-specific private key objects to perform
signing in the context of SSL handshakes which require a client
certificate.
More specifically:
- Add net/android/keystore.h, which provides native
functions to operate on JNI references pointing to
java.security.PrivateKey objects provided by the
platform. I.e.:
net::android::GetPrivateKeyType()
net::android::SignWithPrivateKey()
Also provide a function that can get the system's own
EVP_PKEY* handle corresponding to a given PrivateKey
object. This uses reflection and should *only* be used
for RSA private keys when running on Android 4.0 and
4.1, in order to route around a platform bug that was
only fixed in 4.2.
net::android::GetOpenSSLSytstemHandleForPrivateKey()
See the comments in this source file for mode details:
net/android/java/org/chromium/net/AndroidKeyStore.java
- Add net/android/keystore_openssl.h, which provides
a function that can wrap an existing PrivateKey
JNI reference around an OpenSSL EVP_PKEY object
which uses custom DSA/RSA/ECDSA methods to perform
signing as expected to handle client certificates.
net::android::GetOpenSSLPrivateKeyWrapper()
- Add relevant unit tests for the new functions.
Note that the unit test comes with its own Java helper
function, which is used to create a platform PrivateKey
object from encoded PKCS#8 private key data.
This is called from the native unit test, but does not
constitute a new Java test (AndroidKeyStoreTestUtil.java).
- Add corresponding new test key files under
net/data/ssl/certificates/, and their generation
script in net/data/ssl/scripts/.
- Add net/android/private_key_type_list.h which is
used both from C++ and Java to define the list of
supported private key types used by this code.
- Minor improvements: Add a "release()" method to
crypto::ScopedOpenSSL, add missing BASE_EXPORT
to one base/android/jni_array.h function declaration.
BUG=166642
Review URL: https://chromiumcodereview.appspot.com/11571059
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181741 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181732 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://codereview.chromium.org/12218081
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181543 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
| |
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181316 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
(At the request of RedHat.)
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181312 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://codereview.chromium.org/12087115
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181183 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CL 11879048 introduces ClientCertStore API providing client certificate
lookup/filtering logic currently being done at the SSL socket level. This patch
removes this logic from the sockets, plugging the new API in the upper layers instead.
BUG=170374
Review URL: https://chromiumcodereview.appspot.com/12035105
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181104 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
Automated clean up of style checker errors that were missed due to the plugin
not being executed on implementation files.
BUG=115047
Review URL: https://chromiumcodereview.appspot.com/12223022
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180944 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
after free.
BUG=173465
Review URL: https://chromiumcodereview.appspot.com/12092104
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180603 0039d316-1c4b-4281-b951-d872f2087c98
|