| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
The Bad test removed here was first introduced in https://codereview.chromium.org/3327025 . It turns out we just need to accept more time formats.
BUG=312080
R=wtc@chromium.org
Review URL: https://codereview.chromium.org/56663002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@232770 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
data.info.GetName() returns a new FilePath object, and .value() thus
returns a reference to the string within that FilePath object.
This means that the FilePath object can vanish before the reference
to its contents is actually used - meaning whatever happens to be
on the stack will be accessed.
Fix by keeping a copy of the FilePath object in scope across call to
GetDirectoryListingEntry.
Introduced by r205019.
Review URL: https://codereview.chromium.org/48113006
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@231821 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
If a redirect is deferred in the warm cache case, the HTTP transaction
currently doesn't release the cache entry until after the redirect continues.
This prevents other requests from accessing the cache entry.
Reuse the DoneReading() signal for the URLRequestJob to notify the transaction
that the response body is to be discarded. This matches the redirect-specific
logic in HttpCache::Transaction which does not cache redirect bodies.
In addition, now that this signal exists at a higher level, remove that logic
in HttpCache::Transaction. It is now the caller's job to decide which response
bodies are and aren't truncated away.
Fixup and add new tests for this behavior.
BUG=292879
TEST=HttpCache.CachedRedirect,
HttpCache.DoneReading,
URLRequestJob.RedirectTransactionNotifiedWhenDone
Review URL: https://chromiumcodereview.appspot.com/23710059
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224161 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This brings Linux/ChromeOS, iOS, and Windows in line with the Android/OS X
implementations by using Chromium's internal RFC 6125 name validation
routines, rather than the platform-specific routines.
In particular, this adds support for iPAddress subjectAltName matching
on Windows, ignores trailing dots for dNSNames, and on Windows, removes
support for matching against non-IDNA commonNames when no subjectAltName
is present.
BUG=72726, 91072
R=wtc@chromium.org
Review URL: https://chromiumcodereview.appspot.com/22893021
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@218121 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
| |
BUG=272072
Review URL: https://chromiumcodereview.appspot.com/22794009
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@217875 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Add a script and update the certificates used for testing a certificate
chain that requires an explicit policy, but where verification is
attempted with no policy specified.
BUG=111742
R=wtc
Review URL: https://chromiumcodereview.appspot.com/18223006
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@213781 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
The certse.pem certificate was revoked by Symantec and the tests depending on
it were disabled in r211396. I've found the longest-lived certificates that I
can to replace them.
(And, this time, it's not EV so hopefully revocation checks don't kick in
anyway.)
BUG=259723
TBR=rsleevi
Review URL: https://codereview.chromium.org/18323023
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@212058 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
| |
Review URL: https://chromiumcodereview.appspot.com/18655004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210314 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
Implemented comments from wtc in CL https://chromiumcodereview.appspot.com/17385010/#ps170001 (Patch Set 12).
R=wtc@chromium.org
Review URL: https://chromiumcodereview.appspot.com/18033005
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@210095 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
Changes to make ProofVerifier asynchronous. Each QuicSession's ProofVerifier is used to verify the signature and cert chain.
Implemented generation counter in QuicCryptoClientConfig's CachedState in case certs change when we are verifying the Proof.
Review URL: https://chromiumcodereview.appspot.com/17385010
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209946 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
NSS is internally caching verification results. Generate new test
certificates with distinct issuer names, to avoid issuer/serial
confusion.
BUG=111742, 256421
R=wtc@chromium.org
Review URL: https://codereview.chromium.org/18408002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209535 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
Includes script to generate suitable test certs for
http://crbug.com/111742
BUG=111742,252971
R=wtc
Review URL: https://chromiumcodereview.appspot.com/18054012
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209315 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Fix state management bugs that the tests exposed:
* HPKP and HSTS include_subdomains should be distinct
* HSTS processing should not clobber HPKP data
* Multiple HPKP headers should ignore all but the first
BUG=248678, 156152
TBR=ananta
Review URL: https://chromiumcodereview.appspot.com/16912003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@209290 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When adding response to the cache, it removes "http://",
but when getting response from the cache, it does not.
As a result, no content is fetched out from the cache
even for urls in the cache.
BUG=
Review URL: https://chromiumcodereview.appspot.com/16354006
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@207807 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
tests in net_unittests, now that Windows can temporarily trust certificates for the duration of tests.
In addition, add unittests for net::TestRootCerts, which depend on the certs being tested not being trusted by the system beforehand.
BUG=8470, 5552
TEST=TestRootCertsTest.*
TBR=zelidrag
Review URL: https://chromiumcodereview.appspot.com/5535006
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@207443 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
whose Subject field doesn't have a common name (but has an email
address).
This was previously https://codereview.chromium.org/10341005/
R=rsleevi@chromium.org
BUG=126023
TEST=new unit test X509CertificateTest.GetDefaultNickname, only if
USE_NSS is defined.
Review URL: https://chromiumcodereview.appspot.com/17093010
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@206844 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
OS X's lack of robust support for cross-signed certificates, combined with the
impending removal of the legacy GTE CyberTrust 1024-bit root in favour of
the 2048-bit Baltimore CyberTrust Root, will soon cause issues for sites that
need to use the cross-signed intermediate. Fix up the chain on the fly when
dealing with such sites.
BUG=236112
TEST=net_unittests
Review URL: https://chromiumcodereview.appspot.com/14492003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@206274 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
This was originally reviewed at https://codereview.chromium.org/15080007/ and
is being landed separately because it contains binary data.
BUG=176541
TBR=wtc
Review URL: https://codereview.chromium.org/15747020
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201916 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When importing certificates on Linux/CrOS where the user has a pre-existing
cert, generate a unique certificate nickname if the DER-encoded subjects do
not match, as required by NSS.
This updates the template from being:
<subject common name>'s <issuer common name> ID
to:
<subject display name>'s <issuer display name> ID [#d]
Where #d will be appended with an incrementing number until a unique nickname
is found. Note that "display name" represents a gradiation that starts with
common name, then organization name, than organizational unit name.
Note: This does not address PKCS#12 importing - only importing CA certificates
(root and intermediate) and server certificates via the UI, or the handling
of application/x-x509-user-cert (via download).
BUG=237870
TEST=net_unittests added. Additionally, test that server & CA certificates can
still be imported fine through the UI.
Review URL: https://chromiumcodereview.appspot.com/15315003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201748 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
This eliminates a whole class of problems with SpawnedTestServer
failing to start.
BUG=96594, 230200
R=avi@chromium.org, satorux@chromium.org
Review URL: https://codereview.chromium.org/14914010
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@201099 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
When requesting client authentication, the SSL server may send a list of
acceptable CAs. When discovering matching client certificates, the Mac and
Linux implementations were not fully considering all intermediate certificates
when attempting to discover client certificates.
For example, if the client certficate chain was CC -> Intermediate -> Root, and
the server sent a list of acceptable CAs as Root, then on Mac and Linux, CC
would not be considered, whereas on Windows it would. Further, if the server
listed Intermediate as an acceptable CA, then it would work on all platforms.
BUG=224280, 224897
TEST=See https://docs.google.com/a/chromium.org/document/d/19V5_PBSm7OaFLXzTXdiCdSpt1r1yFYJhuH9X41O2oOs/edit?usp=sharing
R=wtc@chromium.org
Review URL: https://chromiumcodereview.appspot.com/13866049
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@196535 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Leave that to the default value, or whatever value an HSTS header set.
TEST=net_unittests; after visiting https://www.mv-rechberghausen.de, query
that domain in chrome://net-internal/#hsts and expect pins AND mode STRICT.
BUG=226068
Review URL: https://chromiumcodereview.appspot.com/13483007
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@193443 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
The equivalent patch in Android is pending, but we would like to patch Chrome as well since Chrome updates faster than the base Android system.
BUG=167607
Review URL: https://chromiumcodereview.appspot.com/11778008
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@191962 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Because OpenSSL/Android do not have the ability to discover
if a private key exists for a given certificate/public key,
net::OpenSSLClientKeyStore is used instead to store that
information. OpenSSLClientKeyStore is fed information by
higher layers, which are expected to use JNI and the Android
KeyChain APIs to discover the associated private key/alias
for a given certificate.
Other work in this CL:
- Moved generate-client-certificates.sh to net/data/ssl/scripts/
from net/data/ssl/scripts/client_authentication/
Also removed the run-test-server.sh script which is
only used to perform manual local testing.
Updated the client certificates under net/data/ssl/certificates/
and list then properly in the README file.
- Added new unit test to check OpenSSL-based client
authentication against the TestServer. Details are in
net/socket/ssl_client_socket_openssl_unittests.cc
- Modified generate-client-certificates.sh script to use
a password for the client certificates it generates.
This is to work around a platform bug in Android 4.0.3
and older, where the CertInstaller cannot install
password-less PKCS#12 files. The password is 'chrome'.
- Added GetTestClientCertsDirectory() to
net/base/test_data_directory.h to deal with the fact
that remote and local test servers don't accept the
same kind of paths when reading the |client_authorities|
field of an SSLConfig object.
BUG=166642, 172902, 134418
Review URL: https://chromiumcodereview.appspot.com/12220104
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185785 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
Tries to terminate the script V8 execution when the run is abandoned for DNS tracing.
BUG=119151
Review URL: https://chromiumcodereview.appspot.com/12289019
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@183743 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
stack to use platform-specific private key objects to perform
signing in the context of SSL handshakes which require a client
certificate.
More specifically:
- Add net/android/keystore.h, which provides native
functions to operate on JNI references pointing to
java.security.PrivateKey objects provided by the
platform. I.e.:
net::android::GetPrivateKeyType()
net::android::SignWithPrivateKey()
Also provide a function that can get the system's own
EVP_PKEY* handle corresponding to a given PrivateKey
object. This uses reflection and should *only* be used
for RSA private keys when running on Android 4.0 and
4.1, in order to route around a platform bug that was
only fixed in 4.2.
net::android::GetOpenSSLSytstemHandleForPrivateKey()
See the comments in this source file for mode details:
net/android/java/org/chromium/net/AndroidKeyStore.java
- Add net/android/keystore_openssl.h, which provides
a function that can wrap an existing PrivateKey
JNI reference around an OpenSSL EVP_PKEY object
which uses custom DSA/RSA/ECDSA methods to perform
signing as expected to handle client certificates.
net::android::GetOpenSSLPrivateKeyWrapper()
- Add relevant unit tests for the new functions.
Note that the unit test comes with its own Java helper
function, which is used to create a platform PrivateKey
object from encoded PKCS#8 private key data.
This is called from the native unit test, but does not
constitute a new Java test (AndroidKeyStoreTestUtil.java).
- Add corresponding new test key files under
net/data/ssl/certificates/, and their generation
script in net/data/ssl/scripts/.
- Add net/android/private_key_type_list.h which is
used both from C++ and Java to define the list of
supported private key types used by this code.
- Minor improvements: Add a "release()" method to
crypto::ScopedOpenSSL, add missing BASE_EXPORT
to one base/android/jni_array.h function declaration.
BUG=166642
Review URL: https://chromiumcodereview.appspot.com/11571059
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181741 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CL 11879048 introduces ClientCertStore API providing client certificate
lookup/filtering logic currently being done at the SSL socket level. This patch
removes this logic from the sockets, plugging the new API in the upper layers instead.
BUG=170374
Review URL: https://chromiumcodereview.appspot.com/12035105
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@181104 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This replaces the multi-threaded V8 proxy resolver implementation, with a faster single-threaded one. The single-threaded version uses some magic to avoid blocking on DNS dependencies, so it is able to handle more parallel requests than the multi-threaded one.
Design document: https://docs.google.com/a/chromium.org/document/d/16Ij5OcVnR3s0MH4Z5XkhI9VTPoMJdaBn9rKreAmGOdE/edit
This has the benefit of reducing the number of threads that Chrome uses for PAC evaluation, while at the same time speeding up proxy resolving for PAC scripts that do DNS resolving (due to better parallelism).
I ran a benchmark to evaluate the effectiveness of this new approach. The benchmark simulates loading the http://www.newyorktimes.com webpage with slow DNS (where each DNS resolve takes 2 seconds), and a maximum DNS resolver parallelism of 10 requests. This webpage resolves the proxy for 221 URLs, across 40 unique hostnames.
- Proxy resolving using the old multithreaded code took 24.076 seconds [*]
- Proxy resolving using the new code took 8.011 seconds [*]
- Without a PAC script, resolving the DNS took 8.003 seconds
The new proxy resolving times (8.011s) are much closer to the theoretical best (8.003s)!
[*] The PAC script I used for the test was a fairly complex script 20kb (a version of google's corp PAC script modified to always call dnsResolve(host)).
I will be adding histograms in a follow-up CL, to measure how often requests need to be restarted, or fall-back to synchronous mode.
BUG=119151
Review URL: https://codereview.chromium.org/11885009
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@179714 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SSLClientSocket::IsConnected() and SSLClientSocket::IsConnectedAndIdle()
may return false though it has buffered data. They should care for internally
processing buffer.
There are various implementation, for NSS, OpenSSL, and platform dependent
system libraries. This CL fix the issue on NSS. Fix for others will follow.
BUG=160033
TEST=browser_tests, net_unittests
Review URL: https://codereview.chromium.org/11366155
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178775 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
| |
BUG=170374
Review URL: https://chromiumcodereview.appspot.com/11879048
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@178732 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- weird mix of UNIX emulation and VMS output;
switch completely to VMS-speak
- recognize more errors correctly
- recognize "unknown" file sizes (all asterisks)
BUG=none
Review URL: https://codereview.chromium.org/11570034
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@173511 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
This converts all .expected test files to CRLF line endings.
BUG=164724
Review URL: https://codereview.chromium.org/11470035
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@172656 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- "total ..." lines can have values bigger than 32-bit
- some servers use "l" as a flag in permission listing
- some servers prepend garbage to the month column
- NetWare directory listings can have spaces in file names
- one additional variant of VMS error message
BUG=none
Review URL: https://codereview.chromium.org/11418296
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@170996 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- add GetWebSocketTestDataDirectory() to provide test data directory
- use GetTestCertsDirectory() to specify certificates path
- use echo-with-no-extension_wsh.py instead of echo_wsh.py
BUG=157531
TBR=wtc@chromium.org
Review URL: https://chromiumcodereview.appspot.com/11270011
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@166078 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
In accordance with the specification.
BUG=156147
Review URL: https://chromiumcodereview.appspot.com/11192045
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@165013 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
| |
A file for testing was broken, but not used yet.
TBR=wtc@chromium.org
BUG=136950
Review URL: https://codereview.chromium.org/11186021
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162344 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is a part of migration change for PPAPI tests.
BUG=137639
TEST=browser_tests --gtest_filter='*.WebSocket_*'
Review URL: https://chromiumcodereview.appspot.com/11048050
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162330 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WorkerWebSocketHttpLayoutTest was disable.
Actually, shared-worker-simple.html is the only test which is useful to run now.
Also, providing fixed port for WebSocket test server is not so easy.
So, I decided to remove existing WorkerWebSocketHttpLayoutTest, then introduce
WorkerTest.WebSocketSharedWorker as a compatible test with shared-worker-simple.html.
BUG=155014, 137639
TEST=content_browsertests --gtest_filter='WorkerTest.WebSocketSharedWorker'
Review URL: https://chromiumcodereview.appspot.com/11028111
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162326 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
| |
TBR=wtc@chromium.org
BUG=136950
Review URL: https://codereview.chromium.org/11192028
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162320 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
| |
BUG=136950
TBR=rsleevi@chromium.org
Review URL: https://chromiumcodereview.appspot.com/11154032
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@162097 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_tests --gtest_filter='ExtensionApiTest.WebSocket'
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161572
Review URL: https://chromiumcodereview.appspot.com/11087027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161773 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ExtensionApiTest.WebSocket (third trial)
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542
Review URL: https://chromiumcodereview.appspot.com/11087027
TBR=toyoshim@chromium.org
Review URL: https://codereview.chromium.org/11115011
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161575 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161542
Review URL: https://chromiumcodereview.appspot.com/11087027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161572 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
ExtensionApiTest.WebSocket (retry)
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304
Review URL: https://chromiumcodereview.appspot.com/11087027
TBR=toyoshim@chromium.org
Review URL: https://codereview.chromium.org/11114015
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161549 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=161304
Review URL: https://chromiumcodereview.appspot.com/11087027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161542 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Review URL: https://chromiumcodereview.appspot.com/11087027
TBR=toyoshim@chromium.org
Review URL: https://codereview.chromium.org/11091059
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161308 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
WebSocket test server migration from content::TestWebSocketServer to
net::TestServer.
This is the first change to use net::TestServer as a WebSocket test server.
Other changes will follow to obsoelte content::TestWebSocketServer.
BUG=137639
TEST=browser_test --gtest_filter='ExtensionApiTest.WebSocket'
Review URL: https://chromiumcodereview.appspot.com/11087027
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@161304 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
permit connection pooling of hosts with the same etld when TLS channel ID is used.
* Add tests for SpdySession::VerifyDomainAuthentication
* Add a new certificate for testing SpdySession::VerifyDomainAuthentication
BUG=
Review URL: https://chromiumcodereview.appspot.com/10916275
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@156461 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
| |
BUG=111893
TEST=net_unittests
Review URL: https://chromiumcodereview.appspot.com/10790129
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@148192 0039d316-1c4b-4281-b951-d872f2087c98
|
|
|
|
|
|
|
|
|
|
|
|
| |
value is v1(0).
R=mattm@chromium.org
BUG=110132
TEST=unit_tests --gtest_filter=X509CertificateModelTest.GetVersionOmitted
Review URL: https://chromiumcodereview.appspot.com/10391197
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138005 0039d316-1c4b-4281-b951-d872f2087c98
|