summaryrefslogtreecommitdiffstats
path: root/net/data
Commit message (Collapse)AuthorAgeFilesLines
* FTP: fix parsing of busybox-generated directory listingsphajdan.jr@chromium.org2013-11-042-0/+111
| | | | | | | | | | | The Bad test removed here was first introduced in https://codereview.chromium.org/3327025 . It turns out we just need to accept more time formats. BUG=312080 R=wtc@chromium.org Review URL: https://codereview.chromium.org/56663002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@232770 0039d316-1c4b-4281-b951-d872f2087c98
* Fix scoping of raw_bytes in URLRequestFileDirJob::OnListFilefs@opera.com2013-10-301-0/+1
| | | | | | | | | | | | | | | | data.info.GetName() returns a new FilePath object, and .value() thus returns a reference to the string within that FilePath object. This means that the FilePath object can vanish before the reference to its contents is actually used - meaning whatever happens to be on the stack will be accessed. Fix by keeping a copy of the FilePath object in scope across call to GetDirectoryListingEntry. Introduced by r205019. Review URL: https://codereview.chromium.org/48113006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@231821 0039d316-1c4b-4281-b951-d872f2087c98
* Release the cache entry on deferred redirect.davidben@chromium.org2013-09-191-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | If a redirect is deferred in the warm cache case, the HTTP transaction currently doesn't release the cache entry until after the redirect continues. This prevents other requests from accessing the cache entry. Reuse the DoneReading() signal for the URLRequestJob to notify the transaction that the response body is to be discarded. This matches the redirect-specific logic in HttpCache::Transaction which does not cache redirect bodies. In addition, now that this signal exists at a higher level, remove that logic in HttpCache::Transaction. It is now the caller's job to decide which response bodies are and aren't truncated away. Fixup and add new tests for this behavior. BUG=292879 TEST=HttpCache.CachedRedirect, HttpCache.DoneReading, URLRequestJob.RedirectTransactionNotifiedWhenDone Review URL: https://chromiumcodereview.appspot.com/23710059 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224161 0039d316-1c4b-4281-b951-d872f2087c98
* Normalize certificate name verification across all platformsrsleevi@chromium.org2013-08-162-37/+39
| | | | | | | | | | | | | | | | | | This brings Linux/ChromeOS, iOS, and Windows in line with the Android/OS X implementations by using Chromium's internal RFC 6125 name validation routines, rather than the platform-specific routines. In particular, this adds support for iPAddress subjectAltName matching on Windows, ignores trailing dots for dNSNames, and on Windows, removes support for matching against non-IDNA commonNames when no subjectAltName is present. BUG=72726, 91072 R=wtc@chromium.org Review URL: https://chromiumcodereview.appspot.com/22893021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@218121 0039d316-1c4b-4281-b951-d872f2087c98
* Fix regression: don't redirect to data: URLs.tsepez@chromium.org2013-08-162-0/+3
| | | | | | | | BUG=272072 Review URL: https://chromiumcodereview.appspot.com/22794009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217875 0039d316-1c4b-4281-b951-d872f2087c98
* Add script for generating certificates that require an explicit policyrsleevi@chromium.org2013-07-264-2/+393
| | | | | | | | | | | | | Add a script and update the certificates used for testing a certificate chain that requires an explicit policy, but where verification is attempted with no policy specified. BUG=111742 R=wtc Review URL: https://chromiumcodereview.appspot.com/18223006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@213781 0039d316-1c4b-4281-b951-d872f2087c98
* net: update certse.pem with new certs for tests.agl@chromium.org2013-07-172-315/+207
| | | | | | | | | | | | | | | | The certse.pem certificate was revoked by Symantec and the tests depending on it were disabled in r211396. I've found the longest-lived certificates that I can to replace them. (And, this time, it's not EV so hopefully revocation checks don't kick in anyway.) BUG=259723 TBR=rsleevi Review URL: https://codereview.chromium.org/18323023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@212058 0039d316-1c4b-4281-b951-d872f2087c98
* Add a quic_in_memory_cache_test data file.honghaiz@chromium.org2013-07-052-0/+14
| | | | | | Review URL: https://chromiumcodereview.appspot.com/18655004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210314 0039d316-1c4b-4281-b951-d872f2087c98
* Cleanup of OpenSSL/NSS implementation of ProofVerfifier release.rtenneti@chromium.org2013-07-042-1/+1
| | | | | | | | | | Implemented comments from wtc in CL https://chromiumcodereview.appspot.com/17385010/#ps170001 (Patch Set 12). R=wtc@chromium.org Review URL: https://chromiumcodereview.appspot.com/18033005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210095 0039d316-1c4b-4281-b951-d872f2087c98
* OpenSSL/NSS implementation of ProofVerfifier.rtenneti@chromium.org2013-07-035-0/+270
| | | | | | | | | | Changes to make ProofVerifier asynchronous. Each QuicSession's ProofVerifier is used to verify the signature and cert chain. Implemented generation counter in QuicCryptoClientConfig's CachedState in case certs change when we are verifying the Proof. Review URL: https://chromiumcodereview.appspot.com/17385010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209946 0039d316-1c4b-4281-b951-d872f2087c98
* Re-generate the MD5/SHA1 cross-signed certs with a distinct issuer namersleevi@chromium.org2013-07-014-174/+182
| | | | | | | | | | | | | NSS is internally caching verification results. Generate new test certificates with distinct issuer names, to avoid issuer/serial confusion. BUG=111742, 256421 R=wtc@chromium.org Review URL: https://codereview.chromium.org/18408002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209535 0039d316-1c4b-4281-b951-d872f2087c98
* Re-enable some tests disabled because of expired certsrsleevi@chromium.org2013-06-299-369/+422
| | | | | | | | | | | | Includes script to generate suitable test certs for http://crbug.com/111742 BUG=111742,252971 R=wtc Review URL: https://chromiumcodereview.appspot.com/18054012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209315 0039d316-1c4b-4281-b951-d872f2087c98
* More tests for handling HSTS and HPKP headers.palmer@chromium.org2013-06-294-0/+16
| | | | | | | | | | | | | | | Fix state management bugs that the tests exposed: * HPKP and HSTS include_subdomains should be distinct * HSTS processing should not clobber HPKP data * Multiple HPKP headers should ignore all but the first BUG=248678, 156152 TBR=ananta Review URL: https://chromiumcodereview.appspot.com/16912003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209290 0039d316-1c4b-4281-b951-d872f2087c98
* Fix a bug in quic_in_memory_cache.honghaiz@chromium.org2013-06-211-0/+0
| | | | | | | | | | | | | When adding response to the cache, it removes "http://", but when getting response from the cache, it does not. As a result, no content is fetched out from the cache even for urls in the cache. BUG= Review URL: https://chromiumcodereview.appspot.com/16354006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@207807 0039d316-1c4b-4281-b951-d872f2087c98
* Regenerate the root certificate and end-entity certificates used for various ↵rsleevi@chromium.org2013-06-209-123/+417
| | | | | | | | | | | | | | tests in net_unittests, now that Windows can temporarily trust certificates for the duration of tests. In addition, add unittests for net::TestRootCerts, which depend on the certs being tested not being trusted by the system beforehand. BUG=8470, 5552 TEST=TestRootCertsTest.* TBR=zelidrag Review URL: https://chromiumcodereview.appspot.com/5535006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@207443 0039d316-1c4b-4281-b951-d872f2087c98
* X509Certificate::GetDefaultNickname should handle a user certificatewtc@chromium.org2013-06-172-0/+113
| | | | | | | | | | | | | | | | whose Subject field doesn't have a common name (but has an email address). This was previously https://codereview.chromium.org/10341005/ R=rsleevi@chromium.org BUG=126023 TEST=new unit test X509CertificateTest.GetDefaultNickname, only if USE_NSS is defined. Review URL: https://chromiumcodereview.appspot.com/17093010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@206844 0039d316-1c4b-4281-b951-d872f2087c98
* Work around GTE CyberTrust/Baltimore CyberTrust cross-signing issuesrsleevi@chromium.org2013-06-146-0/+355
| | | | | | | | | | | | | | | OS X's lack of robust support for cross-signed certificates, combined with the impending removal of the legacy GTE CyberTrust 1024-bit root in favour of the 2048-bit Baltimore CyberTrust Root, will soon cause issues for sites that need to use the cross-signed intermediate. Fix up the chain on the fly when dealing with such sites. BUG=236112 TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/14492003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@206274 0039d316-1c4b-4281-b951-d872f2087c98
* Add certificate files for NSS AIA fetching unittestrsleevi@chromium.org2013-05-236-0/+304
| | | | | | | | | | | | This was originally reviewed at https://codereview.chromium.org/15080007/ and is being landed separately because it contains binary data. BUG=176541 TBR=wtc Review URL: https://codereview.chromium.org/15747020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201916 0039d316-1c4b-4281-b951-d872f2087c98
* Generate unique certificate nicknames on Linux/CrOS.rsleevi@chromium.org2013-05-237-2/+313
| | | | | | | | | | | | | | | | | | | | | | | | | | | When importing certificates on Linux/CrOS where the user has a pre-existing cert, generate a unique certificate nickname if the DER-encoded subjects do not match, as required by NSS. This updates the template from being: <subject common name>'s <issuer common name> ID to: <subject display name>'s <issuer display name> ID [#d] Where #d will be appended with an incrementing number until a unique nickname is found. Note that "display name" represents a gradiation that starts with common name, then organization name, than organizational unit name. Note: This does not address PKCS#12 importing - only importing CA certificates (root and intermediate) and server certificates via the UI, or the handling of application/x-x509-user-cert (via download). BUG=237870 TEST=net_unittests added. Additionally, test that server & CA certificates can still be imported fine through the UI. Review URL: https://chromiumcodereview.appspot.com/15315003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201748 0039d316-1c4b-4281-b951-d872f2087c98
* GTTF: Convert WebContentsImplBrowserTest to use EmbeddedTestServer.phajdan.jr@chromium.org2013-05-201-0/+1
| | | | | | | | | | | | This eliminates a whole class of problems with SpawnedTestServer failing to start. BUG=96594, 230200 R=avi@chromium.org, satorux@chromium.org Review URL: https://codereview.chromium.org/14914010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201099 0039d316-1c4b-4281-b951-d872f2087c98
* Fix client certificate authentication on Mac and Linux introduced in r178732rsleevi@chromium.org2013-04-2512-380/+501
| | | | | | | | | | | | | | | | | | | | When requesting client authentication, the SSL server may send a list of acceptable CAs. When discovering matching client certificates, the Mac and Linux implementations were not fully considering all intermediate certificates when attempting to discover client certificates. For example, if the client certficate chain was CC -> Intermediate -> Root, and the server sent a list of acceptable CAs as Root, then on Mac and Linux, CC would not be considered, whereas on Windows it would. Further, if the server listed Intermediate as an acceptable CA, then it would work on all platforms. BUG=224280, 224897 TEST=See https://docs.google.com/a/chromium.org/document/d/19V5_PBSm7OaFLXzTXdiCdSpt1r1yFYJhuH9X41O2oOs/edit?usp=sharing R=wtc@chromium.org Review URL: https://chromiumcodereview.appspot.com/13866049 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@196535 0039d316-1c4b-4281-b951-d872f2087c98
* Don't set MODE_DEFAULT when adding HPKP header.palmer@chromium.org2013-04-102-0/+9
| | | | | | | | | | | | | | Leave that to the default value, or whatever value an HSTS header set. TEST=net_unittests; after visiting https://www.mv-rechberghausen.de, query that domain in chrome://net-internal/#hsts and expect pins AND mode STRICT. BUG=226068 Review URL: https://chromiumcodereview.appspot.com/13483007 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@193443 0039d316-1c4b-4281-b951-d872f2087c98
* Handle extendedKeyUsage field in end-entity certs.palmer@chromium.org2013-04-036-0/+389
| | | | | | | | | | The equivalent patch in Android is pending, but we would like to patch Chrome as well since Chrome updates faster than the base Android system. BUG=167607 Review URL: https://chromiumcodereview.appspot.com/11778008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@191962 0039d316-1c4b-4281-b951-d872f2087c98
* Wire up SSL client authentication for OpenSSL/Android through the net/ stackdigit@chromium.org2013-03-0210-113/+300
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Because OpenSSL/Android do not have the ability to discover if a private key exists for a given certificate/public key, net::OpenSSLClientKeyStore is used instead to store that information. OpenSSLClientKeyStore is fed information by higher layers, which are expected to use JNI and the Android KeyChain APIs to discover the associated private key/alias for a given certificate. Other work in this CL: - Moved generate-client-certificates.sh to net/data/ssl/scripts/ from net/data/ssl/scripts/client_authentication/ Also removed the run-test-server.sh script which is only used to perform manual local testing. Updated the client certificates under net/data/ssl/certificates/ and list then properly in the README file. - Added new unit test to check OpenSSL-based client authentication against the TestServer. Details are in net/socket/ssl_client_socket_openssl_unittests.cc - Modified generate-client-certificates.sh script to use a password for the client certificates it generates. This is to work around a platform bug in Android 4.0.3 and older, where the CertInstaller cannot install password-less PKCS#12 files. The password is 'chrome'. - Added GetTestClientCertsDirectory() to net/base/test_data_directory.h to deal with the fact that remote and local test servers don't accept the same kind of paths when reading the |client_authorities| field of an SSLConfig object. BUG=166642, 172902, 134418 Review URL: https://chromiumcodereview.appspot.com/12220104 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185785 0039d316-1c4b-4281-b951-d872f2087c98
* Optimization for ProxyResolverV8Tracing: early termination.eroman@chromium.org2013-02-212-0/+46
| | | | | | | | | | | Tries to terminate the script V8 execution when the run is abandoned for DNS tracing. BUG=119151 Review URL: https://chromiumcodereview.appspot.com/12289019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183743 0039d316-1c4b-4281-b951-d872f2087c98
* This patch adds some Android-support code to allow the networkdigit@chromium.org2013-02-117-0/+144
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | stack to use platform-specific private key objects to perform signing in the context of SSL handshakes which require a client certificate. More specifically: - Add net/android/keystore.h, which provides native functions to operate on JNI references pointing to java.security.PrivateKey objects provided by the platform. I.e.: net::android::GetPrivateKeyType() net::android::SignWithPrivateKey() Also provide a function that can get the system's own EVP_PKEY* handle corresponding to a given PrivateKey object. This uses reflection and should *only* be used for RSA private keys when running on Android 4.0 and 4.1, in order to route around a platform bug that was only fixed in 4.2. net::android::GetOpenSSLSytstemHandleForPrivateKey() See the comments in this source file for mode details: net/android/java/org/chromium/net/AndroidKeyStore.java - Add net/android/keystore_openssl.h, which provides a function that can wrap an existing PrivateKey JNI reference around an OpenSSL EVP_PKEY object which uses custom DSA/RSA/ECDSA methods to perform signing as expected to handle client certificates. net::android::GetOpenSSLPrivateKeyWrapper() - Add relevant unit tests for the new functions. Note that the unit test comes with its own Java helper function, which is used to create a platform PrivateKey object from encoded PKCS#8 private key data. This is called from the native unit test, but does not constitute a new Java test (AndroidKeyStoreTestUtil.java). - Add corresponding new test key files under net/data/ssl/certificates/, and their generation script in net/data/ssl/scripts/. - Add net/android/private_key_type_list.h which is used both from C++ and Java to define the list of supported private key types used by this code. - Minor improvements: Add a "release()" method to crypto::ScopedOpenSSL, add missing BASE_EXPORT to one base/android/jni_array.h function declaration. BUG=166642 Review URL: https://chromiumcodereview.appspot.com/11571059 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181741 0039d316-1c4b-4281-b951-d872f2087c98
* Move client certificates retrieval logic out of the SSL sockets.ppi@chromium.org2013-02-072-0/+24
| | | | | | | | | | | | | CL 11879048 introduces ClientCertStore API providing client certificate lookup/filtering logic currently being done at the SSL socket level. This patch removes this logic from the sockets, plugging the new API in the upper layers instead. BUG=170374 Review URL: https://chromiumcodereview.appspot.com/12035105 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181104 0039d316-1c4b-4281-b951-d872f2087c98
* Improve performance of proxy resolver by tracing DNS dependencies.eroman@chromium.org2013-01-3011-0/+150
| | | | | | | | | | | | | | | | | | | | | | | | | | This replaces the multi-threaded V8 proxy resolver implementation, with a faster single-threaded one. The single-threaded version uses some magic to avoid blocking on DNS dependencies, so it is able to handle more parallel requests than the multi-threaded one. Design document: https://docs.google.com/a/chromium.org/document/d/16Ij5OcVnR3s0MH4Z5XkhI9VTPoMJdaBn9rKreAmGOdE/edit This has the benefit of reducing the number of threads that Chrome uses for PAC evaluation, while at the same time speeding up proxy resolving for PAC scripts that do DNS resolving (due to better parallelism). I ran a benchmark to evaluate the effectiveness of this new approach. The benchmark simulates loading the http://www.newyorktimes.com webpage with slow DNS (where each DNS resolve takes 2 seconds), and a maximum DNS resolver parallelism of 10 requests. This webpage resolves the proxy for 221 URLs, across 40 unique hostnames. - Proxy resolving using the old multithreaded code took 24.076 seconds [*] - Proxy resolving using the new code took 8.011 seconds [*] - Without a PAC script, resolving the DNS took 8.003 seconds The new proxy resolving times (8.011s) are much closer to the theoretical best (8.003s)! [*] The PAC script I used for the test was a fairly complex script 20kb (a version of google's corp PAC script modified to always call dnsResolve(host)). I will be adding histograms in a follow-up CL, to measure how often requests need to be restarted, or fall-back to synchronous mode. BUG=119151 Review URL: https://codereview.chromium.org/11885009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@179714 0039d316-1c4b-4281-b951-d872f2087c98
* SSLClientSocket::IsConnected should care for internal bufferstoyoshim@chromium.org2013-01-253-0/+80
| | | | | | | | | | | | | | | | SSLClientSocket::IsConnected() and SSLClientSocket::IsConnectedAndIdle() may return false though it has buffered data. They should care for internally processing buffer. There are various implementation, for NSS, OpenSSL, and platform dependent system libraries. This CL fix the issue on NSS. Fix for others will follow. BUG=160033 TEST=browser_tests, net_unittests Review URL: https://codereview.chromium.org/11366155 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178775 0039d316-1c4b-4281-b951-d872f2087c98
* Provide an API for client certificate lookup/filtering.ppi@chromium.org2013-01-254-0/+238
| | | | | | | | BUG=170374 Review URL: https://chromiumcodereview.appspot.com/11879048 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178732 0039d316-1c4b-4281-b951-d872f2087c98
* FTP: fix compatibility with VMS server kednos.comphajdan.jr@chromium.org2012-12-176-0/+340
| | | | | | | | | | | | | | | - weird mix of UNIX emulation and VMS output; switch completely to VMS-speak - recognize more errors correctly - recognize "unknown" file sizes (all asterisks) BUG=none Review URL: https://codereview.chromium.org/11570034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@173511 0039d316-1c4b-4281-b951-d872f2087c98
* FTP: correctly handle newlines in file namesphajdan.jr@chromium.org2012-12-1236-1966/+2097
| | | | | | | | | | This converts all .expected test files to CRLF line endings. BUG=164724 Review URL: https://codereview.chromium.org/11470035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@172656 0039d316-1c4b-4281-b951-d872f2087c98
* FTP: misc fixes resulting from my testing.phajdan.jr@chromium.org2012-12-044-0/+220
| | | | | | | | | | | | | | - "total ..." lines can have values bigger than 32-bit - some servers use "l" as a flag in permission listing - some servers prepend garbage to the month column - NetWare directory listings can have spaces in file names - one additional variant of VMS error message BUG=none Review URL: https://codereview.chromium.org/11418296 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@170996 0039d316-1c4b-4281-b951-d872f2087c98
* Add GetWebSocketTestDataDirectory() to test_data_directorytoyoshim@chromium.org2012-11-064-20/+38
| | | | | | | | | | | | | - add GetWebSocketTestDataDirectory() to provide test data directory - use GetTestCertsDirectory() to specify certificates path - use echo-with-no-extension_wsh.py instead of echo_wsh.py BUG=157531 TBR=wtc@chromium.org Review URL: https://chromiumcodereview.appspot.com/11270011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@166078 0039d316-1c4b-4281-b951-d872f2087c98
* Process only the first Strict-Transport-Security header.palmer@chromium.org2012-10-304-0/+15
| | | | | | | | | | In accordance with the specification. BUG=156147 Review URL: https://chromiumcodereview.appspot.com/11192045 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@165013 0039d316-1c4b-4281-b951-d872f2087c98
* websocket_client_cert.p12 was broken after r11192028toyoshim@chromium.org2012-10-171-0/+0
| | | | | | | | | | | A file for testing was broken, but not used yet. TBR=wtc@chromium.org BUG=136950 Review URL: https://codereview.chromium.org/11186021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162344 0039d316-1c4b-4281-b951-d872f2087c98
* WebSocket test server migration on PPAPI teststoyoshim@chromium.org2012-10-175-1/+93
| | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is a part of migration change for PPAPI tests. BUG=137639 TEST=browser_tests --gtest_filter='*.WebSocket_*' Review URL: https://chromiumcodereview.appspot.com/11048050 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162330 0039d316-1c4b-4281-b951-d872f2087c98
* Replace WorkerWebSocketHttpLayoutTest with WorkerTest.WebSocketSharedWorker.toyoshim@chromium.org2012-10-172-0/+77
| | | | | | | | | | | | | | | WorkerWebSocketHttpLayoutTest was disable. Actually, shared-worker-simple.html is the only test which is useful to run now. Also, providing fixed port for WebSocket test server is not so easy. So, I decided to remove existing WorkerWebSocketHttpLayoutTest, then introduce WorkerTest.WebSocketSharedWorker as a compatible test with shared-worker-simple.html. BUG=155014, 137639 TEST=content_browsertests --gtest_filter='WorkerTest.WebSocketSharedWorker' Review URL: https://chromiumcodereview.appspot.com/11028111 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162326 0039d316-1c4b-4281-b951-d872f2087c98
* Replace WebSocket client certificate resources into net/data/ssl/certificatestoyoshim@chromium.org2012-10-173-0/+9
| | | | | | | | | TBR=wtc@chromium.org BUG=136950 Review URL: https://codereview.chromium.org/11192028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162320 0039d316-1c4b-4281-b951-d872f2087c98
* Replace testing resources for WebSocket to net/data/websockettoyoshim@chromium.org2012-10-164-0/+99
| | | | | | | | | | BUG=136950 TBR=rsleevi@chromium.org Review URL: https://chromiumcodereview.appspot.com/11154032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162097 0039d316-1c4b-4281-b951-d872f2087c98
* WebSocket test server migration on ExtensionApiTest.WebSocket (fourth trial)toyoshim@chromium.org2012-10-131-0/+18
| | | | | | | | | | | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_tests --gtest_filter='ExtensionApiTest.WebSocket' Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304 Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542 Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161572 Review URL: https://chromiumcodereview.appspot.com/11087027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161773 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 161572 - WebSocket test server migration on ↵mrossetti@chromium.org2012-10-121-18/+0
| | | | | | | | | | | | | | | | | | | | | | | | | ExtensionApiTest.WebSocket (third trial) WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304 Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542 Review URL: https://chromiumcodereview.appspot.com/11087027 TBR=toyoshim@chromium.org Review URL: https://codereview.chromium.org/11115011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161575 0039d316-1c4b-4281-b951-d872f2087c98
* WebSocket test server migration on ExtensionApiTest.WebSocket (third trial)toyoshim@chromium.org2012-10-121-0/+18
| | | | | | | | | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304 Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542 Review URL: https://chromiumcodereview.appspot.com/11087027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161572 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 161542 - WebSocket test server migration on ↵kochi@chromium.org2012-10-121-18/+0
| | | | | | | | | | | | | | | | | | | | | | | ExtensionApiTest.WebSocket (retry) WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304 Review URL: https://chromiumcodereview.appspot.com/11087027 TBR=toyoshim@chromium.org Review URL: https://codereview.chromium.org/11114015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161549 0039d316-1c4b-4281-b951-d872f2087c98
* WebSocket test server migration on ExtensionApiTest.WebSocket (retry)toyoshim@chromium.org2012-10-121-0/+18
| | | | | | | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304 Review URL: https://chromiumcodereview.appspot.com/11087027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161542 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 161304 - WebSocket test server migration on ExtensionApiTest.WebSockettoyoshim@chromium.org2012-10-111-18/+0
| | | | | | | | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Review URL: https://chromiumcodereview.appspot.com/11087027 TBR=toyoshim@chromium.org Review URL: https://codereview.chromium.org/11091059 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161308 0039d316-1c4b-4281-b951-d872f2087c98
* WebSocket test server migration on ExtensionApiTest.WebSockettoyoshim@chromium.org2012-10-111-0/+18
| | | | | | | | | | | | | | | | WebSocket test server migration from content::TestWebSocketServer to net::TestServer. This is the first change to use net::TestServer as a WebSocket test server. Other changes will follow to obsoelte content::TestWebSocketServer. BUG=137639 TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket' Review URL: https://chromiumcodereview.appspot.com/11087027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161304 0039d316-1c4b-4281-b951-d872f2087c98
* * Change logic of SpdySession::VerifyDomainAuthentication to rch@chromium.org2012-09-133-0/+67
| | | | | | | | | | | | | | permit connection pooling of hosts with the same etld when TLS channel ID is used. * Add tests for SpdySession::VerifyDomainAuthentication * Add a new certificate for testing SpdySession::VerifyDomainAuthentication BUG= Review URL: https://chromiumcodereview.appspot.com/10916275 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@156461 0039d316-1c4b-4281-b951-d872f2087c98
* net: fix a couple of broken certificate tests.agl@chromium.org2012-07-242-0/+315
| | | | | | | | | BUG=111893 TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/10790129 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@148192 0039d316-1c4b-4281-b951-d872f2087c98
* If the version field is omitted from the certificate, the defaultwtc@chromium.org2012-05-192-0/+39
| | | | | | | | | | | | value is v1(0). R=mattm@chromium.org BUG=110132 TEST=unit_tests --gtest_filter=X509CertificateModelTest.GetVersionOmitted Review URL: https://chromiumcodereview.appspot.com/10391197 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138005 0039d316-1c4b-4281-b951-d872f2087c98