summaryrefslogtreecommitdiffstats
path: root/net/base
Commit message (Collapse)AuthorAgeFilesLines
* ...agl@chromium.org2013-03-142-0/+2
| | | | | | | | ter ZZrge branch 'master' into hsts net: add kiwiirc.com to HSTS preloaded. git-svn-id: svn://svn.chromium.org/chrome/trunk/src@188102 0039d316-1c4b-4281-b951-d872f2087c98
* Remove unused ServerBoundCertStore::FlushStore.mattm@chromium.org2013-03-133-25/+0
| | | | | | | | | BUG=169644 Review URL: https://chromiumcodereview.appspot.com/12755023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@187718 0039d316-1c4b-4281-b951-d872f2087c98
* Enable EV for D-TRUST Root Class 3 CA 2 2009rsleevi@chromium.org2013-03-091-0/+6
| | | | | | | | | | BUG=167061 TEST=https://certdemo-ev-valid.ssl.d-trust.net shows as EV Review URL: https://chromiumcodereview.appspot.com/12569002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@187092 0039d316-1c4b-4281-b951-d872f2087c98
* Allow mapping hostnames to ERR_NAME_NOT_RESOLVED with the ↵eroman@chromium.org2013-03-073-15/+62
| | | | | | | | | | | | | | | | --host-resolver-rules switch. The "MAP" directive can now be given the special substitution "~NOTFOUND". For instance to remap all *.google.com domains to ERR_NAME_NOT_RESOLVED: MAP *.google.com ~NOTFOUND BUG=180426 Review URL: https://chromiumcodereview.appspot.com/12481010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186548 0039d316-1c4b-4281-b951-d872f2087c98
* Assert that FileStream::OpenSync() is called only for file streams in sync mode.paivanof@gmail.com2013-03-062-49/+56
| | | | | | | | | | | It is safe to do that now when there's no more clients (except the own unit tests) using OpenSync() with ASYNC flag. BUG=114783 Review URL: https://chromiumcodereview.appspot.com/12526004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186530 0039d316-1c4b-4281-b951-d872f2087c98
* src/: Update the remaining include paths of string_split.h to its new location.tfarina@chromium.org2013-03-0610-10/+10
| | | | | | | | | | BUG=175186 TBR=brettw@chromium.org Review URL: https://chromiumcodereview.appspot.com/12473004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186462 0039d316-1c4b-4281-b951-d872f2087c98
* Added ERR_BLOCKED_BY_ADMINISTRATOR and a custom error page.joaodasilva@chromium.org2013-03-061-0/+4
| | | | | | | | | | | | | This distinguishes navigations blocked by administrator policy from other ERR_NETWORK_ACCESS_DENIED sources. The custom error page can then inform the user that a policy configured by the administrator prevents access to the site. BUG=88702 Review URL: https://chromiumcodereview.appspot.com/12226113 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186455 0039d316-1c4b-4281-b951-d872f2087c98
* net: add ssl.panoramio.com and "members.nearlyfreespeech.net to HSTS preloaded.agl@chromium.org2013-03-052-0/+4
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@186208 0039d316-1c4b-4281-b951-d872f2087c98
* Wire up SSL client authentication for OpenSSL/Android through the net/ stackdigit@chromium.org2013-03-0210-113/+530
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Because OpenSSL/Android do not have the ability to discover if a private key exists for a given certificate/public key, net::OpenSSLClientKeyStore is used instead to store that information. OpenSSLClientKeyStore is fed information by higher layers, which are expected to use JNI and the Android KeyChain APIs to discover the associated private key/alias for a given certificate. Other work in this CL: - Moved generate-client-certificates.sh to net/data/ssl/scripts/ from net/data/ssl/scripts/client_authentication/ Also removed the run-test-server.sh script which is only used to perform manual local testing. Updated the client certificates under net/data/ssl/certificates/ and list then properly in the README file. - Added new unit test to check OpenSSL-based client authentication against the TestServer. Details are in net/socket/ssl_client_socket_openssl_unittests.cc - Modified generate-client-certificates.sh script to use a password for the client certificates it generates. This is to work around a platform bug in Android 4.0.3 and older, where the CertInstaller cannot install password-less PKCS#12 files. The password is 'chrome'. - Added GetTestClientCertsDirectory() to net/base/test_data_directory.h to deal with the fact that remote and local test servers don't accept the same kind of paths when reading the |client_authorities| field of an SSLConfig object. BUG=166642, 172902, 134418 Review URL: https://chromiumcodereview.appspot.com/12220104 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185785 0039d316-1c4b-4281-b951-d872f2087c98
* Add AddHSTS() and AddHPKP() to replace EnableHost(DomainState), asunsafe@trevp.net2013-03-023-98/+184
| | | | | | | | | | | | DomainStates are being turned into "results" objects only. Rename the Delete functions to make clear they operate on Dynamic Data. Also, move some TransportSecurityStates functions into private. BUG=156152 Review URL: https://chromiumcodereview.appspot.com/12093038 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185757 0039d316-1c4b-4281-b951-d872f2087c98
* [SPDY] Implement per-session flow controlakalin@chromium.org2013-03-011-6/+23
| | | | | | | | | | | | | Basically, we treat a WINDOW_UPDATE frame with stream_id 0 as an update for the session window. Convert the flow_control boolean into a tri-state FlowControlState enum. Add a kProtoSPDY31 constant in next_proto.h and turn on per-session flow control only if SPDY 3.1 is negotiated. BUG=176592 Review URL: https://codereview.chromium.org/12277015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185603 0039d316-1c4b-4281-b951-d872f2087c98
* Allow 0 length IOBufferjschuh@chromium.org2013-02-281-1/+1
| | | | | | | | | | This is an overflow check, but 0 isn't dangerous and crashes Mac. BUG=178837 Review URL: https://chromiumcodereview.appspot.com/12375005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185162 0039d316-1c4b-4281-b951-d872f2087c98
* Fix net::FileStream to handle all errors correctly.sergeyu@chromium.org2013-02-276-151/+221
| | | | | | | | | | | | | | | | | | | | | | | | | | This CL adds FileStream::Context::IOResult struct that's used to pass results of IO operations inside FileStream::Context. Following bugs are fixes: 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would return a positive result in case of an error. This happens because POSIX errors are positive integers and FileStream was written with assumption that they are negative. 2. On Windows Seek() and Flush() errors were not handled correctly. This is because CheckForIOError() was assuming that all error codes are negative, but RecordAndMapError() was mapping positive errors. 3. On Windows OVERLAPPED struct wasn't set to zeros as necessary. Also added unittests to check that error codes are handled correctly now. Reviewed at: https://codereview.chromium.org/12320003 TBR=mmenke@chromium.org Review URL: https://codereview.chromium.org/12333004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185015 0039d316-1c4b-4281-b951-d872f2087c98
* Experimental Revert of 184577mpearson@chromium.org2013-02-266-221/+151
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ASAN bots started timing out consistently last night at the time this was submitted. It's a possible culprit. It doesn't involve extensions, but it does things with streams and I assume those are connected to the feeds in this test somehow. browser_tests browser_tests failed 4 ( 12 mins, 52 secs ) stdio ParseFeedInvalidFeed1 ParseFeedInvalidFeed2 ParseFeedValidFeed3 ParseFeedValidFeed4 http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%281%29/builds/3019 http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%282%29/builds/3186 http://build.chromium.org/p/chromium.memory/builders/Linux%20Chromium%20OS%20ASAN%20Tests%20%283%29/builds/2716 > Fix net::FileStream to handle all errors correctly. > > This CL adds FileStream::Context::IOResult struct that's used to pass > results of IO operations inside FileStream::Context. Following bugs are > fixes: > > 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would > return a positive result in case of an error. This happens because > POSIX errors are positive integers and FileStream was written with > assumption that they are negative. > 2. On Windows Seek() and Flush() errors were not handled correctly. > This is because CheckForIOError() was assuming that all error codes > are negative, but RecordAndMapError() was mapping positive errors. > 3. On Windows results of asynchronous ReadFile() and WriteFile() were > not handled correctly - ERR_IO_PENDING would be returned even when > operation completes synchronously. > 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary. > > Also added unittests to check that error codes are handled correctly > now. > > TBR=mmenke@chromium.org > > Review URL: https://codereview.chromium.org/12326107 TBR=sergeyu@chromium.org Review URL: https://codereview.chromium.org/12330144 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184672 0039d316-1c4b-4281-b951-d872f2087c98
* Fix net::FileStream to handle all errors correctly.sergeyu@chromium.org2013-02-266-151/+221
| | | | | | | | | | | | | | | | | | | | | | | | | | | This CL adds FileStream::Context::IOResult struct that's used to pass results of IO operations inside FileStream::Context. Following bugs are fixes: 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would return a positive result in case of an error. This happens because POSIX errors are positive integers and FileStream was written with assumption that they are negative. 2. On Windows Seek() and Flush() errors were not handled correctly. This is because CheckForIOError() was assuming that all error codes are negative, but RecordAndMapError() was mapping positive errors. 3. On Windows results of asynchronous ReadFile() and WriteFile() were not handled correctly - ERR_IO_PENDING would be returned even when operation completes synchronously. 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary. Also added unittests to check that error codes are handled correctly now. TBR=mmenke@chromium.org Review URL: https://codereview.chromium.org/12326107 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184577 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 184453sergeyu@chromium.org2013-02-256-219/+151
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | > Fix net::FileStream to handle all errors correctly. > > This CL adds FileStream::Context::IOResult struct that's used to pass > results of IO operations inside FileStream::Context. Following bugs are > fixes: > > 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would > return a positive result in case of an error. This happens because > POSIX errors are positive integers and FileStream was written with > assumption that they are negative. > 2. On Windows Seek() and Flush() errors were not handled correctly. > This is because CheckForIOError() was assuming that all error codes > are negative, but RecordAndMapError() was mapping positive errors. > 3. On Windows results of asynchronous ReadFile() and WriteFile() were > not handled correctly - ERR_IO_PENDING would be returned even when > operation completes synchronously. > 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary. > > Also added unittests to check that error codes are handled correctly > now. > > Review URL: https://codereview.chromium.org/12321100 TBR=sergeyu@chromium.org Review URL: https://codereview.chromium.org/12310110 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184461 0039d316-1c4b-4281-b951-d872f2087c98
* Fix net::FileStream to handle all errors correctly.sergeyu@chromium.org2013-02-256-151/+219
| | | | | | | | | | | | | | | | | | | | | | | | | This CL adds FileStream::Context::IOResult struct that's used to pass results of IO operations inside FileStream::Context. Following bugs are fixes: 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would return a positive result in case of an error. This happens because POSIX errors are positive integers and FileStream was written with assumption that they are negative. 2. On Windows Seek() and Flush() errors were not handled correctly. This is because CheckForIOError() was assuming that all error codes are negative, but RecordAndMapError() was mapping positive errors. 3. On Windows results of asynchronous ReadFile() and WriteFile() were not handled correctly - ERR_IO_PENDING would be returned even when operation completes synchronously. 4. On Windows OVERLAPPED struct wasn't set to zeros as necessary. Also added unittests to check that error codes are handled correctly now. Review URL: https://codereview.chromium.org/12321100 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184453 0039d316-1c4b-4281-b951-d872f2087c98
* Land recent QUIC changes.rch@chromium.org2013-02-251-0/+210
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Reviving entropy flag of missing packet. Merge internal change: 42912121 Fix bug in QuicConnection::OnCanWrite in which the packet generator never flushed the packets when the visitor did not write all bytes. Merge internal change: 42919513 Clarify the SendAlarm behavior of the TestHelper in QuicConnectionTests. In particular, it is important that if we set a send alarm for a delay of Zero, that IsSendAlarmSet() returns true. Merge internal change: 42908913 Fix bug in SimpleQuicFramerVisitor which did not make a copy of StreamFrame data. Merge internal change: 42880797 Use the QuicPacketGenerator in QuicConnection. Merge internal change: 42861764 Add new files Create a new QuicPacketGenerator class to encapsulate the write side operation of a QuicConnection. It provides methods for enqueing control frames, consuming stream data, and sending acks and feedback. It does just-in-time serialization. Also adds a new test-only simple framer which provides an easy mechanism for parsing packets to verify they contain correct contents. Merge internal change: 42813986 Add missing files Implementing logic for checking entropy of received packets and setting entropy on outgoing packets. Merge internal change: 42715914 Fixing a bug where when QuicPacketCreator queues a stream frame, the underlying string is not immediately owned, which can cause issues if SendStreamData doesn't always flush packets before exiting. Merge internal change: 42649091 Add the SetKey, SetNoncePrefix, GetKeySize, and GetNoncePrefixSize methods to the QuicEncrypter and QuicDecrypter interfaces. Specify the format of the nonce for AEAD algorithms. Add a |packet_sequence_number| argument to QuicEncrypter::Encrypt and QuicDecrypter::Decrypt. This requires passing the packet sequence number to QuicFramer::EncryptPacket and QuicFramer::DecryptPayload. Merge internal change: 42641062 Move all logic out of ReceivedInfo. Now it is just a plain struct that is used to represent the state of the received packets info. Also, fixes the following bug: i) Packet 7 8 get lost, largest observed packet is 6. ii) Packet 9 arrives with an AckFrame which has least unacked as 9. iii) We clear 7 8 from missing packets. iv) While adding packet 9 we reinsert 7 and 8 as missing packets since largest observed is 6. Merge internal change: 42556974 Make framer return SerializedPacket instead of QuicPacket. Merge internal change: 42551314 Add SendConnectionClosePacket method to QuicConnection Merge internal change: 42474257 Removing offset from the reset stream frame. Merge internal change: 42436913 Fix for when the end of a frame leave too few bytes for the next header Merge internal change: 42435044 Bug fix for packet loss in inter arrival. Added min drift threshold for inter arrival. Merge internal change: 42391696 Add missing file. Use linked_hash_map to store UnackedPackets: simplifies and optimizes the code. Merge internal change: 42381785 Bugfix "Flaky tests due to QuicTime not initialized" Removed DCHECK that due to timing was invalid Merge internal change: 42374053 Fix TSAN test failure. Merge internal change: 42371302 A simple tcp tail drop like implementation. Merge internal change: 42314912 Adding the GoAway Frame. Merge internal change: 42291652 Chromium review fixes. Merge internal change: 42290161 Implement framing for entropy in AckFrame. Merge internal change: 42286308 Make QuicPacketCreator return SerializedPacket struct. Merge internal change: 42240179 Fix for incoming duplicate packet. Avoids NACKing a duplicate. Merge internal change: 42150291 Remove QuicConnectionVisitorInterface::AckedPackets and use the existing SequenceSet typedef instead. Renamed SequenceSet to SequenceNumberSet to be more readable. Merge internal change: 42147690 Made ramp up bitrate in inter arrival aware of the current send rate. Merge internal change: 42118607 Style fix of full_packet. Merge internal change: 42057032 Packing multiple streams together in a single packet from OnCanWrite. Merge internal change: 42054845 Change the representation of public and private flags to explicts bools. Using enums turns out to be problematic because ENUM1 | ENUM2 can not be assigned to EnumType. I discovered this problem in attempting to implement version negotiation. Merge internal change: 42042022 Various small QUIC cleanups after merging to Chrome. Merge internal change: 42041347 Start using QuicClock Now where needed and sending it around instead of querying it multiple times. This CL also fixes the reports of incoming lost packets which had been lost. Merge internal change: 41944659 Fix mock clock. Adding Now function back to QuicClock but now as a more accurate now Merge internal change: 41909929 Rename of function Now to ApproximateNow to allow us to differentiate between the two in the future. Merge internal change: 41909178 TBR=jar@chromium.org R=jar@chromium.org BUG= Review URL: https://chromiumcodereview.appspot.com/12334063 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184374 0039d316-1c4b-4281-b951-d872f2087c98
* Move file_path.h to base/files.brettw@chromium.org2013-02-2425-30/+30
| | | | | | TBR=sky git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184344 0039d316-1c4b-4281-b951-d872f2087c98
* Enable EV for TAIWAN-CA (TWCA)rsleevi@chromium.org2013-02-231-0/+6
| | | | | | | | | | BUG=123566 TEST=https://evssldemo.twca.com.tw/index.html loads with EV Review URL: https://chromiumcodereview.appspot.com/12310055 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184294 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 184257rtenneti@chromium.org2013-02-236-217/+151
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | > Fix net::FileStream to handle all errors correctly. > > This CL adds FileStream::Context::IOResult struct that's used to pass > results of IO operations inside FileStream::Context. Following bugs are > fixes: > > 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would > return a positive result in case of an error. This happens because > POSIX errors are positive integers and FileStream was written with > assumption that they are negative. > 2. On Windows Seek() and Flush() errors were not handled correctly. > This is because CheckForIOError() was assuming that all error codes > are negative, but RecordAndMapError() was mapping positive errors. > 3. On Windows results of asynchronous ReadFile() and WriteFile() were > not handled correctly - ERR_IO_PENDING would be returned even when > operation completes synchronously. > > Also added unittests to check that error codes are handled correctly > now. > > Review URL: https://chromiumcodereview.appspot.com/12320003 TBR=sergeyu@chromium.org Review URL: https://codereview.chromium.org/12328071 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184278 0039d316-1c4b-4281-b951-d872f2087c98
* Fix net::FileStream to handle all errors correctly.sergeyu@chromium.org2013-02-236-151/+217
| | | | | | | | | | | | | | | | | | | | | | | | This CL adds FileStream::Context::IOResult struct that's used to pass results of IO operations inside FileStream::Context. Following bugs are fixes: 1. On POSIX net::FileStream::Read() and net::FileStream::Write() would return a positive result in case of an error. This happens because POSIX errors are positive integers and FileStream was written with assumption that they are negative. 2. On Windows Seek() and Flush() errors were not handled correctly. This is because CheckForIOError() was assuming that all error codes are negative, but RecordAndMapError() was mapping positive errors. 3. On Windows results of asynchronous ReadFile() and WriteFile() were not handled correctly - ERR_IO_PENDING would be returned even when operation completes synchronously. Also added unittests to check that error codes are handled correctly now. Review URL: https://chromiumcodereview.appspot.com/12320003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184257 0039d316-1c4b-4281-b951-d872f2087c98
* net: add bugzilla.mozilla.org to HSTS preloaded.agl@chromium.org2013-02-222-0/+2
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184152 0039d316-1c4b-4281-b951-d872f2087c98
* net: Add missing "image/vnd.microsoft.icon" MIME typehashimoto@chromium.org2013-02-221-0/+3
| | | | | | | | | | BUG=70360 TEST=icon is displayed instead of downloaded when accessing an icon resource with "image/vnd.microsoft.icon" MIME type Review URL: https://chromiumcodereview.appspot.com/12303021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@184050 0039d316-1c4b-4281-b951-d872f2087c98
* net: Remove UploadDataStream::merge_chunks_hashimoto@chromium.org2013-02-222-30/+0
| | | | | | | | | | | | Unmerged chunk read is tested by SpdyHttpStreamSpdy2(3)Test.DelayedSendChunkedPost already. BUG=None TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/12207174 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183994 0039d316-1c4b-4281-b951-d872f2087c98
* [net] Ignore Teredo addresses when determining IPv6 support.szym@chromium.org2013-02-211-0/+3
| | | | | | | | | | | | | | | | | On systems with only Teredo IPv6 addresses, Windows resolver does not make queries for AAAA DNS records. Therefore, we can safely resort to AF_INET-only lookups instead of AF_UNSPEC. This will make no difference when using the system resolver (getaddrinfo), but should reduce penalty on AsyncDNS which currently performs A/AAAA queries in series. BUG=171549 Review URL: https://chromiumcodereview.appspot.com/12296028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183818 0039d316-1c4b-4281-b951-d872f2087c98
* net: duplicate EV OIDs for new Symantec roots.agl@chromium.org2013-02-211-0/+30
| | | | | | | | | | | | | | This change adds EV entries for six, new Symantec roots. These roots use the same EV OIDs as the previous roots. (See bug for details.) BUG=171532 Review URL: https://chromiumcodereview.appspot.com/12088076 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183688 0039d316-1c4b-4281-b951-d872f2087c98
* net: remove compression reporting util functions.agl@chromium.org2013-02-203-23/+0
| | | | | | | | | | | | Since we don't report the compression state of an SSL connection any longer (r182743), these utility functions are now unused. BUG=none Review URL: https://chromiumcodereview.appspot.com/12280006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183615 0039d316-1c4b-4281-b951-d872f2087c98
* net: add writeapp.me to HSTS preloadedagl@chromium.org2013-02-202-0/+2
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183579 0039d316-1c4b-4281-b951-d872f2087c98
* Log useful events for QUIC sessions in the net-log.rch@chromium.org2013-02-201-1/+82
| | | | | | Review URL: https://chromiumcodereview.appspot.com/12230027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183558 0039d316-1c4b-4281-b951-d872f2087c98
* net: add (*.)paymill.de to HSTS preloaded.agl@chromium.org2013-02-192-0/+2
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183221 0039d316-1c4b-4281-b951-d872f2087c98
* Enhance net internals/net log output for QUIC.rch@chromium.org2013-02-142-0/+33
| | | | | | | | | | | | Fix use after free bug in initial implementation. Initially landed: 182331 Reverted: 182335 Review URL: https://chromiumcodereview.appspot.com/12253020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182471 0039d316-1c4b-4281-b951-d872f2087c98
* net: Fix DCHECK failure on large file uploadhashimoto@chromium.org2013-02-141-2/+2
| | | | | | | | | BUG=None TEST=No DCHECK failure on uploading 2GB+ files with Debug build Review URL: https://codereview.chromium.org/12217165 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182394 0039d316-1c4b-4281-b951-d872f2087c98
* Create a new disk_cache type, SHADER_CACHE.dsinclair@chromium.org2013-02-131-1/+2
| | | | | | | | | | | | | | | Create a new type of disk_cache to be used by the GL Shader cache. This cache acts similar to the regular DISK_CACHE except the rank of the entry is not updated if the entry is not modified. This means we can read entries as we iterate and the iterators do not get shuffled around. BUG=166763 Review URL: https://chromiumcodereview.appspot.com/12224017 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182343 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 182331rch@chromium.org2013-02-132-33/+0
| | | | | | | | | | | | > Enhance net internals/net log output for QUIC. > > > Review URL: https://chromiumcodereview.appspot.com/12207020 TBR=rch@chromium.org Review URL: https://codereview.chromium.org/12252024 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182335 0039d316-1c4b-4281-b951-d872f2087c98
* Enhance net internals/net log output for QUIC.rch@chromium.org2013-02-132-0/+33
| | | | | | Review URL: https://chromiumcodereview.appspot.com/12207020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182331 0039d316-1c4b-4281-b951-d872f2087c98
* Return specific cert verification errors on Androidppi@chromium.org2013-02-132-7/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | To implement CertVerifyProc on Android we refer to the Java side to query the platform trust managers. Currently the information we get from the platform is binary - each certificate chain is either identified as trusted or not, in which case we assume that this is due to not-trusted root. This patch provides better granularity distinguishing the following cases: expired, not yet valid, incorrect (could not be parsed), not trusted root. This allowed to reenable two net unittests: - CertVerifyProcTest.ExtraneousMD5RootCert - CertVerifyProcTest.IntermediateCARequireExplicitPolicy The following net unittest had to be disabled as it joins the club of CertVerifyProc tests failing on bots with incorrect time/date settings: - CertVerifyProcTest.InvalidKeyUsage BUG=169762 Review URL: https://chromiumcodereview.appspot.com/12212135 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182280 0039d316-1c4b-4281-b951-d872f2087c98
* Add WifiPHYLayerProtocol to SystemProfile.szym@chromium.org2013-02-133-0/+164
| | | | | | | | | | | | | | WifiPHYLayerProtocol characterizes the physical layer (PHY) protocol of the current association with an 802.11 access point. It uses the common nomenclature of referring to the IEEE 802.11 standard amendment which introduced the protocol, i.e. a/b/g/n. TBR=sky BUG=174414 Review URL: https://codereview.chromium.org/12082090 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182231 0039d316-1c4b-4281-b951-d872f2087c98
* Add CLIENT_CERT_TYPE_DSS_SIGN to net::SSLClientCertTypedigit@chromium.org2013-02-131-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This patch adds a new value to the net::SSLClientCertType that matches DSA-based client certificates. This will be used by Android's client certificate support code. For an example, see https://chromiumcodereview.appspot.com/12220104/ More specifically: - It modifies <net/base/ssl_client_cert_type.h> to add the new enum value. - It adds a corresponding non-translatable string ID to chrome/app/generated_resources.grd, and ensures that the ClientCertTypeToString() function in cookies_tree_model_util.cc returns it appropriately. - It adds SpdyCredentialBuilderTest.MAYBE_FailedWithDSACert unit test, similar to the MAYBE_FailedWithRSACert. This is based on the assumption that SPDY uses ECDSA certificates exclusively (no code supporting RSA-based ones was found under net/spdy). Note that server-bound certificate unit tests have not been modified (some of them handle both RSA and ECDSA certificates), given that none of the production support code for this feature seems to care about the certificate type, and that DSA-based certificates are extremely rare in practice, and disappearing. BUG=165668 Review URL: https://chromiumcodereview.appspot.com/12221136 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182119 0039d316-1c4b-4281-b951-d872f2087c98
* Opus extension to mimetype map so files with .opus play instead of download, ↵fbarchard@chromium.org2013-02-121-1/+1
| | | | | | | | | | if enabled with --enable-opus-playback. BUG=174280 TESTED=try bots Review URL: https://codereview.chromium.org/12221108 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@182061 0039d316-1c4b-4281-b951-d872f2087c98
* Cleanup: Remove deprecated base::Value methods from net. Use base::Value too.thestig@chromium.org2013-02-122-6/+6
| | | | | | Review URL: https://chromiumcodereview.appspot.com/12209080 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181979 0039d316-1c4b-4281-b951-d872f2087c98
* This patch adds some Android-support code to allow the networkdigit@chromium.org2013-02-111-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | stack to use platform-specific private key objects to perform signing in the context of SSL handshakes which require a client certificate. More specifically: - Add net/android/keystore.h, which provides native functions to operate on JNI references pointing to java.security.PrivateKey objects provided by the platform. I.e.: net::android::GetPrivateKeyType() net::android::SignWithPrivateKey() Also provide a function that can get the system's own EVP_PKEY* handle corresponding to a given PrivateKey object. This uses reflection and should *only* be used for RSA private keys when running on Android 4.0 and 4.1, in order to route around a platform bug that was only fixed in 4.2. net::android::GetOpenSSLSytstemHandleForPrivateKey() See the comments in this source file for mode details: net/android/java/org/chromium/net/AndroidKeyStore.java - Add net/android/keystore_openssl.h, which provides a function that can wrap an existing PrivateKey JNI reference around an OpenSSL EVP_PKEY object which uses custom DSA/RSA/ECDSA methods to perform signing as expected to handle client certificates. net::android::GetOpenSSLPrivateKeyWrapper() - Add relevant unit tests for the new functions. Note that the unit test comes with its own Java helper function, which is used to create a platform PrivateKey object from encoded PKCS#8 private key data. This is called from the native unit test, but does not constitute a new Java test (AndroidKeyStoreTestUtil.java). - Add corresponding new test key files under net/data/ssl/certificates/, and their generation script in net/data/ssl/scripts/. - Add net/android/private_key_type_list.h which is used both from C++ and Java to define the list of supported private key types used by this code. - Minor improvements: Add a "release()" method to crypto::ScopedOpenSSL, add missing BASE_EXPORT to one base/android/jni_array.h function declaration. BUG=166642 Review URL: https://chromiumcodereview.appspot.com/11571059 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181741 0039d316-1c4b-4281-b951-d872f2087c98
* net: add (*.)lockify.com to HSTS preloaded.agl@chromium.org2013-02-112-0/+2
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181732 0039d316-1c4b-4281-b951-d872f2087c98
* Replace FilePath with base::FilePath in net.brettw@chromium.org2013-02-0836-190/+197
| | | | | | Review URL: https://codereview.chromium.org/12218081 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181543 0039d316-1c4b-4281-b951-d872f2087c98
* net: add mega.co.nz and (*.)api.mega.co.nz to HSTSagl@chromium.org2013-02-072-1/+4
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181316 0039d316-1c4b-4281-b951-d872f2087c98
* net: remove rhcloud.net from HSTS list.agl@chromium.org2013-02-071-1/+0
| | | | | | (At the request of RedHat.) git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181312 0039d316-1c4b-4281-b951-d872f2087c98
* Move utf_offset_string_conversions and utf_string_conversion_utils to strings.brettw@chromium.org2013-02-072-16/+18
| | | | | | Review URL: https://codereview.chromium.org/12087115 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181183 0039d316-1c4b-4281-b951-d872f2087c98
* Move client certificates retrieval logic out of the SSL sockets.ppi@chromium.org2013-02-073-175/+0
| | | | | | | | | | | | | CL 11879048 introduces ClientCertStore API providing client certificate lookup/filtering logic currently being done at the SSL socket level. This patch removes this logic from the sockets, plugging the new API in the upper layers instead. BUG=170374 Review URL: https://chromiumcodereview.appspot.com/12035105 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181104 0039d316-1c4b-4281-b951-d872f2087c98
* Linux/ChromeOS Chromium style checker cleanup, net/ edition.rsleevi@chromium.org2013-02-063-4/+5
| | | | | | | | | | | Automated clean up of style checker errors that were missed due to the plugin not being executed on implementation files. BUG=115047 Review URL: https://chromiumcodereview.appspot.com/12223022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180944 0039d316-1c4b-4281-b951-d872f2087c98
* Fix ServerBoundCertService::RequestHandle::OnRequestComplete possible use ↵mattm@chromium.org2013-02-051-2/+4
| | | | | | | | | | | after free. BUG=173465 Review URL: https://chromiumcodereview.appspot.com/12092104 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@180603 0039d316-1c4b-4281-b951-d872f2087c98