summaryrefslogtreecommitdiffstats
path: root/net/net.gyp
Commit message (Collapse)AuthorAgeFilesLines
* Integration tests for HTTP pipelining.simonjam@chromium.org2011-11-101-0/+1
| | | | | | | | | | | | Added tests that exercise the code from HttpNetworkTransaction down to HttpStreamParser with pipelining enabled. BUG=None TEST=net_unittests Review URL: http://codereview.chromium.org/8457002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@109354 0039d316-1c4b-4281-b951-d872f2087c98
* Turn on -Wexit-time-destructors for net.thakis@chromium.org2011-11-091-0/+5
| | | | | | | | | BUG=101600 TEST=none Review URL: http://codereview.chromium.org/8497052 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@109327 0039d316-1c4b-4281-b951-d872f2087c98
* Remove HostResolverImpl from Mock*HostResolver. szym@chromium.org2011-11-081-0/+1
| | | | | | | | | | | | | | Original review: http://codereview.chromium.org/8267001/ TBR=rvargas BUG=99889 TEST=Green tree: ./net_unittests ; ./unit_tests --gtest_filter='PredictorTest.*' ; ./jingle_unittests Review URL: http://codereview.chromium.org/8491024 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@109030 0039d316-1c4b-4281-b951-d872f2087c98
* Log the (server, to-be-verified) certificate chains to the NetLog when ↵rsleevi@chromium.org2011-11-041-0/+2
| | | | | | | | | | | logging bytes. BUG=91464 Review URL: http://codereview.chromium.org/8413072 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108615 0039d316-1c4b-4281-b951-d872f2087c98
* Disk cache: Add stress_support.h to net.gyprvargas@google.com2011-11-011-0/+1
| | | | | | | | | | This was missing from r106538 BUG=none TEST=none Review URL: http://codereview.chromium.org/8437011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108171 0039d316-1c4b-4281-b951-d872f2087c98
* Ensure X509Certificate::OSCertHandles are safe to be used on both UI, IO, ↵rsleevi@chromium.org2011-11-011-1/+0
| | | | | | | | | | | | | | | and Worker threads on Win. Mirror the behaviour of SChannel by creating a new in-memory HCERTSTORE containing the certificate and its intermediate CA certificates whenever it is necessary to pass in a PCCERT_CONTEXT to a Windows API that may need to access the PCCERT_CONTEXT->hCertStore - such as certificate chain verification or display. This also paves the way for removing the GlobalCertStore on Windows, which was necessary in order to link certificates with their intermediates for these same APIs. BUG=47648 TEST=net_unittests:X509CertificateTest.* should cover this. Additionally, on a fresh profile, navigate to different HTTPS sites. From the Page Info Bubble, select Certificate Information, and in the Windows Certificate Viewer, click "Certification Path" and confirm the entire certificate chain is displayed. This is a variation of testing for http://crbug.com/45706, which should not regress. Review URL: http://codereview.chromium.org/7324039 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@108056 0039d316-1c4b-4281-b951-d872f2087c98
* Use AuthCredentials throughout the network stack instead of username/password.cbentzel@chromium.org2011-10-281-0/+2
| | | | | | | | This is a refactor only - no behavior change should happen. Review URL: http://codereview.chromium.org/8340026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@107766 0039d316-1c4b-4281-b951-d872f2087c98
* exclude the linux files that are not needed on openbsdrobert.nagy@gmail.com2011-10-251-6/+7
| | | | | | | | | | BUG= TEST= Review URL: http://codereview.chromium.org/8394002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@107185 0039d316-1c4b-4281-b951-d872f2087c98
* OpenBSD patches for net, split from CR #8275005robert.nagy@gmail.com2011-10-201-1/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | net/base/host_resolver_proc.cc: - define AI_ADDRCONFIG as 0 net/base/listen_socket.cc: - Shuffle and add missing headers since the order of including these matters. net/base/net_util.h: - Missing header for all POSIX platforms. Needed on OpenBSD and it won't hurt others. net/dns/dns_config_service_posix.h: - Missing header for OpenBSD. The order matters here too net/dns/dns_config_service_posix.cc: - Use res_init() on OpenBSD and disable RES_ROTATE if it is not defined net/net.gyp: - Do not use libresolv on OpenBSD since it's not there, the resolver is in libc. - Include base/platform_mime_util_linux.cc in the OpenBSD builds. BUG= TEST= Review URL: http://codereview.chromium.org/8336024 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@106604 0039d316-1c4b-4281-b951-d872f2087c98
* Basic HTTP pipelining support.simonjam@chromium.org2011-10-191-0/+11
| | | | | | | | | | | | | | | | | | | | | | | | This must be enabled in about:flags. It is naive and assumes all servers correctly implement pipelining. Proxies are not supported. Immediate future work: - Integration tests. - Additional NetLog logging. - Refactor HttpPipelinedConnectionImpl. Long term: - Detect broken transparent proxies. - Detect and/or mitigate broken servers. - Buffer HttpPipelinedStream. - Optimize number of pipelines and their depth. - Support proxies. BUG=8991 TEST=net_unittests Review URL: http://codereview.chromium.org/7289006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@106364 0039d316-1c4b-4281-b951-d872f2087c98
* Don't need to export an abstract interface.wtc@chromium.org2011-10-191-1/+0
| | | | | | | | | | R=rvargas@chromium.org BUG=99185 TEST=none Review URL: http://codereview.chromium.org/8342019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@106355 0039d316-1c4b-4281-b951-d872f2087c98
* Add NetLog support to UDP sockets.mmenke@chromium.org2011-10-181-0/+2
| | | | | | | | | | BUG=99508 TEST=UDPSocketTest.Connect Review URL: http://codereview.chromium.org/8200011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@106109 0039d316-1c4b-4281-b951-d872f2087c98
* Use NSS to generate Origin-Bound Certs on Win and Mac.mattm@chromium.org2011-10-181-0/+23
| | | | | | | | | | | | The platform RSAPrivateKey is used to generate the private key, which is then imported into NSS to generate the certificate. X509Certificate::CreateOriginBound is moved to x509_util::CreateOriginBoundCert so it can be shared by those platforms, and removes the unnecessary X509Certificate generation step. BUG=88782 TEST=X509UtilNSSTest.CreateOriginBoundCert & manual testing: try on win or mac, check if generated cert has the OBC extension. Review URL: http://codereview.chromium.org/8296014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105997 0039d316-1c4b-4281-b951-d872f2087c98
* Recommit fraudulent certificate reporting infrastructure.palmer@chromium.org2011-10-151-0/+2
| | | | | | | BUG=99185 Review URL: http://codereview.chromium.org/8302019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105643 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 105624 - Revert 105614.palmer@chromium.org2011-10-151-1/+0
| | | | | | | | | | BUG=99185 Review URL: http://codereview.chromium.org/8289023 TBR=palmer@chromium.org Review URL: http://codereview.chromium.org/8267018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105626 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 105614.palmer@chromium.org2011-10-151-0/+1
| | | | | | | BUG=99185 Review URL: http://codereview.chromium.org/8289023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105624 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 105595 - Initial infrastructure for the fraudulent certificate chain ↵apatrick@chromium.org2011-10-141-1/+0
| | | | | | | | | | | | | | | | reportingfeature. Phase Two of this feature ishttp://codereview.chromium.org/8055027/, and Phase Three ishttp://codereview.chromium.org/8120016/.This feature will be under heavy development, including additional,end-to-end unit testing, throughout Q4 2011. Manual testing shows thatthe basic SendReport functionality works, and that is all we need inthe immediate, pre-Stable short-term.BUG=99185Review URL: http://codereview.chromium.org/8037039 The build failure on windows shared library build: http://build.chromium.org/p/chromium/builders/Win%20Builder%20%28dbg%29%28shared%29/builds/15800/steps/compile/logs/stdio 56>browser.lib(chrome_fraudulent_certificate_reporter.obj) : error LNK2019: unresolved external symbol "__declspec(dllimport) public: virtual __thiscall net::FraudulentCertificateReporter::~FraudulentCertificateReporter(void)" (__imp_??1FraudulentCertificateReporter@net@@UAE@XZ) referenced in function __unwindfunclet$??0ChromeFraudulentCertificateReporter@chrome_browser_net@@QAE@PAVURLRequestContext@net@@@Z$0 56>browser.lib(chrome_fraudulent_certificate_reporter.obj) : error LNK2019: unresolved external symbol "__declspec(dllimport) public: __thiscall net::FraudulentCertificateReporter::FraudulentCertificateReporter(void)" (__imp_??0FraudulentCertificateReporter@net@@QAE@XZ) referenced in function "public: __thiscall chrome_browser_net::ChromeFraudulentCertificateReporter::ChromeFraudulentCertificateReporter(class net::URLRequestContext *)" (??0ChromeFraudulentCertificateReporter@chrome_browser_net@@QAE@PAVURLRequestContext@net@@@Z) TBR=palmer@chromium.org Review URL: http://codereview.chromium.org/8301018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105614 0039d316-1c4b-4281-b951-d872f2087c98
* Initial infrastructure for the fraudulent certificate chain reportingpalmer@chromium.org2011-10-141-0/+1
| | | | | | | | | | | | | | | | feature. Phase Two of this feature is http://codereview.chromium.org/8055027/, and Phase Three is http://codereview.chromium.org/8120016/. This feature will be under heavy development, including additional, end-to-end unit testing, throughout Q4 2011. Manual testing shows that the basic SendReport functionality works, and that is all we need in the immediate, pre-Stable short-term. BUG=99185 Review URL: http://codereview.chromium.org/8037039 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105595 0039d316-1c4b-4281-b951-d872f2087c98
* Persist Alternate-Protocol.willchan@chromium.org2011-10-121-0/+1
| | | | | | | | | | | | | Record Alternate-Protocol servers in spdy.alternate_protocol. Don't persist broken Alternate-Protocol so they will retry on next browser session. Also fix listening to notifications when we're the ones setting them. This was leading to unnecessary double updates, where we'd update the cache on the IO thread, and then propagate to the UI thread, where we'd set the prefs, and then observe that change and propagate back to the IO thread to update the cache. BUG=98472 TEST=Observe that spdy.alternate_protocol is empty in your Preferences file. Confirm that there is no alternate-protocol mapping in chrome://net-internals/#spdy. Browse to www.strangeloopnetworks.com. Check chrome://net-internals/#spdy again and notice that it populates with the mapping. Wait some seconds and then check the Preferences file again and note that it got persisted to disk. Restart Chrome and check chrome://net-internals/#spdy and note that the same alternate-protocol mappings reappear. Review URL: http://codereview.chromium.org/8221030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@105028 0039d316-1c4b-4281-b951-d872f2087c98
* Implementation of DnsConfigService for win (+ Bind migration).szym@chromium.org2011-10-101-0/+6
| | | | | | | | | | | | DnsConfigServiceWin watches Windows registry for changes and asks IPHelper for effective DNS server addresses. To support group policy, suffix search list is read directly from registry. (Alternative to use WMI is too cumbersome.) BUG=90881 TEST=./net_unittests --gtest_filter=DnsConfigService* Review URL: http://codereview.chromium.org/8142013 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104738 0039d316-1c4b-4281-b951-d872f2087c98
* Migrate HttpAlternateProtocols to HttpServerPropertiesImpl.willchan@chromium.org2011-10-101-3/+1
| | | | | | | | | | | | | Hooks in HttpServerPropertiesManager also. No persistence done yet. This is all plumbing. Also require HttpServerProperties in HttpNetworkSession::Params. BUG=98472 TEST=none Review URL: http://codereview.chromium.org/8211003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104696 0039d316-1c4b-4281-b951-d872f2087c98
* Introduce net::HttpServerPropertiesManager to manage server-specific properties.rtenneti@chromium.org2011-10-091-0/+4
| | | | | | | | | | | | | | Currently the only property we manage is whether or not a server supports SPDY, as indicated by NPN. Also introduce a chrome/ implementation of HttpServerPropertiesManager that persists the information to Prefererences. When we get a SpdySession for a SPDY server, record that that server supports SPDY in HttpServerPropertiesManager. When preconnecting, if we know that the server supports SPDY, only preconnect 1 socket. R=willchan BUG=66472 TEST=browser ui and unit tests,network unit tests Review URL: http://codereview.chromium.org/7827033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104666 0039d316-1c4b-4281-b951-d872f2087c98
* Experimental workaround for CHECK in NetworkChangeNotifierWin.mmenke@chromium.org2011-10-051-0/+1
| | | | | | | | | | | Also adds a related UMA histogram. BUG=69198 TEST=NetworkChangeNotifierWinTest.*, UMA metrics Review URL: http://codereview.chromium.org/7886036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104120 0039d316-1c4b-4281-b951-d872f2087c98
* Record UMA statistics for file_stream operations.ahendrickson@chromium.org2011-09-231-0/+4
| | | | | | | | | | | | Allows control over whether or not to record the statistics based on flags. BUG=None TEST=None Review URL: http://codereview.chromium.org/7583049 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@102560 0039d316-1c4b-4281-b951-d872f2087c98
* aura: Make 'net' buildable with gtk disabled.sadrul@chromium.org2011-09-211-7/+15
| | | | | | | | | | | Depends on http://codereview.chromium.org/7904034/ BUG=97131 TEST=none Review URL: http://codereview.chromium.org/7944011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@102080 0039d316-1c4b-4281-b951-d872f2087c98
* net: remove opportunistic HTTPS stuff.agl@chromium.org2011-09-191-2/+0
| | | | | | | | | | | | We never used it. BUG=none TEST=none Review URL: http://codereview.chromium.org/7917018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@101769 0039d316-1c4b-4281-b951-d872f2087c98
* Fourth attempt at the following. Unreviewed, this was originally reviewed ↵pkasting@chromium.org2011-09-151-4/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | in http://codereview.chromium.org/7550002 . Clean up SSL false start blacklist code. Numerous changes, including: * Handle trailing dots in LastTwoLabels() as in http://codereview.chromium.org/7518035/ . Rename this function to LastTwoComponents() to match the terminology used in the RegistryControlledDomainService and elsewhere in Chrome. * Since callers are using std::string anyway, make the functions in the header take const std::string& instead of char*. This also allows doing string operations on them. * Use string operations (like find_last_of()) in place of hand-written algorithms, for brevity, clarity, and safety. * Avoid "unsigned", which the style guide forbids, and use allowed types like size_t, uint32, or int (depending on the situation). * Avoid #define and "using". * Use standard algorithms for similar reasons as using string ops. * Use file_util functions to significantly abbreviate file reading/writing code. * Use wmain() (on Windows) in combination with FilePath to avoid issues if the provided pathname has extended characters that don't flatten losslessly to the default codepage (thanks Darin for pointing out this issue). * Avoid casting where possible. Avoid some casts for printf()-style calls by using a string stream, which also allows for slightly less boilerplate. * Convert non-error uses of stderr to the chrome-standard VLOG(1). * Correctly handle hostnames with trailing dots in the input file. * In general, shorten code where possible. Because this adds a dependency on base, and ssl_false_start_blacklist_process has the "#host" specifier in net.gyp, bradnelson tells me that base and its dependencies need an explicit "host, target" toolchain list for the Linux builds to work correctly. It would be nice if we could avoid this but I guess gyp would have to be smarter or something. BUG=none TEST=none Review URL: http://codereview.chromium.org/7903016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@101378 0039d316-1c4b-4281-b951-d872f2087c98
* Remove CHROME_V8 #define and related javascript_engine gyp variable.mihaip@chromium.org2011-09-121-5/+1
| | | | | | | | | | BUG=94282 R=tfarina@chromium.org Review URL: http://codereview.chromium.org/7864014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@100692 0039d316-1c4b-4281-b951-d872f2087c98
* Use precompiled headers for most large projects where the .gyp filejoi@chromium.org2011-09-071-0/+3
| | | | | | | | | | | | | | is not a third party file. On my machine, this speeds up a full recompile of the 'chrome' target in Debug mode by about 18%. BUG=none TEST=it builds, existing tests pass Review URL: http://codereview.chromium.org/7706011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99949 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 99677 (didn't help) - Revert 99666 (sync tests started failing on ↵thakis@chromium.org2011-09-061-35/+35
| | | | | | | | | | | | | | | | | | | | | mac10.6: http://build.chromium.org/p/chromium/builders/Mac10.6%20Sync/builds/9198 - Linux: Monitor resolv.conf for changes and use that to reload resolver. BUG=67734 TEST=manual testing by poking at resolv.conf Review URL: http://codereview.chromium.org/6903061 TBR=craig.schlenter@chromium.org Review URL: http://codereview.chromium.org/7833030 TBR=thakis@chromium.org Review URL: http://codereview.chromium.org/7737034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99693 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 99666 (sync tests started failing on mac10.6:thakis@chromium.org2011-09-051-35/+35
| | | | | | | | | | | | | | | | http://build.chromium.org/p/chromium/builders/Mac10.6%20Sync/builds/9198 - Linux: Monitor resolv.conf for changes and use that to reload resolver. BUG=67734 TEST=manual testing by poking at resolv.conf Review URL: http://codereview.chromium.org/6903061 TBR=craig.schlenter@chromium.org Review URL: http://codereview.chromium.org/7833030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99677 0039d316-1c4b-4281-b951-d872f2087c98
* Linux: Monitor resolv.conf for changes and use that to reload resolver.craig.schlenter@chromium.org2011-09-051-35/+35
| | | | | | | | | BUG=67734 TEST=manual testing by poking at resolv.conf Review URL: http://codereview.chromium.org/6903061 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99666 0039d316-1c4b-4281-b951-d872f2087c98
* Refactoring and further work on DnsConfigServiceszym@chromium.org2011-09-031-0/+7
| | | | | | | | | | | | | - Isolate WatchingFileReader for reusability and testability - DnsHosts and ParseHosts to parse /etc/hosts BUG=90881 TEST=./net_unittests --gtest_filter='DnsConfig*:DnsHosts*:WatchingFileReader*' Review URL: http://codereview.chromium.org/7826010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99484 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 99135 - Refactoring and remaining work on DnsConfigService: levin@chromium.org2011-09-011-7/+0
| | | | | | | | | | | | | | | | | - Isolate WatchingFileReader for reusability and testability - ParseHosts to parse /etc/hosts - tests BUG=90881 TEST=./net_unittests --gtest_filter='DnsConfig*:DnsHosts*:WatchingFileReader*' Review URL: http://codereview.chromium.org/7753027 TBR=szym@chromium.org Review URL: http://codereview.chromium.org/7829001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99138 0039d316-1c4b-4281-b951-d872f2087c98
* Refactoring and remaining work on DnsConfigService: szym@chromium.org2011-09-011-0/+7
| | | | | | | | | | | | | | - Isolate WatchingFileReader for reusability and testability - ParseHosts to parse /etc/hosts - tests BUG=90881 TEST=./net_unittests --gtest_filter='DnsConfig*:DnsHosts*:WatchingFileReader*' Review URL: http://codereview.chromium.org/7753027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@99135 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 98885 - Third attempt at the following. Unreviewed, this was ↵rsleevi@chromium.org2011-08-311-10/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | originally reviewed in http://codereview.chromium.org/7550002 . Clean up SSL false start blacklist code. Numerous changes, including: * Handle trailing dots in LastTwoLabels() as in http://codereview.chromium.org/7518035/ . Rename this function to LastTwoComponents() to match the terminology used in the RegistryControlledDomainService and elsewhere in Chrome. * Since callers are using std::string anyway, make the functions in the header take const std::string& instead of char*. This also allows doing string operations on them. * Use string operations (like find_last_of()) in place of hand-written algorithms, for brevity, clarity, and safety. * Avoid "unsigned", which the style guide forbids, and use allowed types like size_t, uint32, or int (depending on the situation). * Avoid #define and "using". * Use standard algorithms for similar reasons as using string ops. * Use file_util functions to significantly abbreviate file reading/writing code. * Use wmain() (on Windows) in combination with FilePath to avoid issues if the provided pathname has extended characters that don't flatten losslessly to the default codepage (thanks Darin for pointing out this issue). * Avoid casting where possible. Avoid some casts for printf()-style calls by using a string stream, which also allows for slightly less boilerplate. * Convert non-error uses of stderr to the chrome-standard VLOG(1). * Correctly handle hostnames with trailing dots in the input file. * In general, shorten code where possible. Because this adds a dependency on base, and ssl_false_start_blacklist_process has the "#host" specifier in net.gyp, bradnelson tells me that base and its dependencies need an explicit "host, target" toolchain list for the Linux builds to work correctly. It would be nice if we could avoid this but I guess gyp would have to be smarter or something. BUG=none TEST=none Review URL: http://codereview.chromium.org/7804001 TBR=pkasting@chromium.org Review URL: http://codereview.chromium.org/7778035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98917 0039d316-1c4b-4281-b951-d872f2087c98
* Third attempt at the following. Unreviewed, this was originally reviewed in ↵pkasting@chromium.org2011-08-301-4/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | http://codereview.chromium.org/7550002 . Clean up SSL false start blacklist code. Numerous changes, including: * Handle trailing dots in LastTwoLabels() as in http://codereview.chromium.org/7518035/ . Rename this function to LastTwoComponents() to match the terminology used in the RegistryControlledDomainService and elsewhere in Chrome. * Since callers are using std::string anyway, make the functions in the header take const std::string& instead of char*. This also allows doing string operations on them. * Use string operations (like find_last_of()) in place of hand-written algorithms, for brevity, clarity, and safety. * Avoid "unsigned", which the style guide forbids, and use allowed types like size_t, uint32, or int (depending on the situation). * Avoid #define and "using". * Use standard algorithms for similar reasons as using string ops. * Use file_util functions to significantly abbreviate file reading/writing code. * Use wmain() (on Windows) in combination with FilePath to avoid issues if the provided pathname has extended characters that don't flatten losslessly to the default codepage (thanks Darin for pointing out this issue). * Avoid casting where possible. Avoid some casts for printf()-style calls by using a string stream, which also allows for slightly less boilerplate. * Convert non-error uses of stderr to the chrome-standard VLOG(1). * Correctly handle hostnames with trailing dots in the input file. * In general, shorten code where possible. Because this adds a dependency on base, and ssl_false_start_blacklist_process has the "#host" specifier in net.gyp, bradnelson tells me that base and its dependencies need an explicit "host, target" toolchain list for the Linux builds to work correctly. It would be nice if we could avoid this but I guess gyp would have to be smarter or something. BUG=none TEST=none Review URL: http://codereview.chromium.org/7804001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98885 0039d316-1c4b-4281-b951-d872f2087c98
* Detect file system errors during downloads.ahendrickson@chromium.org2011-08-291-0/+2
| | | | | | | | | | | | | | Moving towards giving the user feedback when a file system error occurs during a download. Split from CL 7134019. BUG=85240 TEST=None Review URL: http://codereview.chromium.org/7646025 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98725 0039d316-1c4b-4281-b951-d872f2087c98
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-241-1/+23
| | | | | | | | | | | dlopen is still the default for Google Chrome. This option is intended for Linux distro packagers. BUG=92689 Review URL: http://codereview.chromium.org/7655046 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98116 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 97925 - Linux: allow linking directly with Kerberos instead of using ↵dpolukhin@chromium.org2011-08-241-14/+0
| | | | | | | | | | | | | | | | dlopen. dlopen is still the default for Google Chrome. This option is intended for Linux distro packagers. BUG=92689 Review URL: http://codereview.chromium.org/7655046 TBR=phajdan.jr@chromium.org Review URL: http://codereview.chromium.org/7719024 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@98028 0039d316-1c4b-4281-b951-d872f2087c98
* Linux: allow linking directly with Kerberos instead of using dlopen.phajdan.jr@chromium.org2011-08-231-0/+14
| | | | | | | | | | | dlopen is still the default for Google Chrome. This option is intended for Linux distro packagers. BUG=92689 Review URL: http://codereview.chromium.org/7655046 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97925 0039d316-1c4b-4281-b951-d872f2087c98
* net: change from CRL filters to CRL sets.agl@chromium.org2011-08-221-3/+3
| | | | | | | | | | | | | | | | CRL filters are probabalistic data structures. However, it doesn't appear that they are going to work given the size and number of CRLs in the world and the uptime of OCSP servers. CRL sets are not probabilistic and simply contain a compresses representation of a number of CRLs. BUG=none TEST=net_unittests Review URL: http://codereview.chromium.org/7461088 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97640 0039d316-1c4b-4281-b951-d872f2087c98
* Update sync protos to use the new shared protoc gyp rulesevan@chromium.org2011-08-191-0/+1
| | | | | | | | Just a refactoring. Review URL: http://codereview.chromium.org/7677034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97484 0039d316-1c4b-4281-b951-d872f2087c98
* DnsConfigService and a posix implementationszym@chromium.org2011-08-181-0/+6
| | | | | | | | | | | | | Contributed by: Szymon Jakubczak <szym@chromium.org> BUG=90881 TEST=./net_unittests --gtest_filter="DnsConfigServiceTest*" Review URL: http://codereview.chromium.org/7518028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@97282 0039d316-1c4b-4281-b951-d872f2087c98
* Linux: control usage of Kerberos via use_kerberos gyp flagphajdan.jr@chromium.org2011-08-151-0/+26
| | | | | | | | | | | | | (on by default) This allows Linux distro packagers to control usage of Kerberos explicitly instead of relying on auto-detection. BUG=92689 Review URL: http://codereview.chromium.org/7633006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96790 0039d316-1c4b-4281-b951-d872f2087c98
* net: Notify the http job and cache transaction about a filterrvargas@google.com2011-08-121-0/+1
| | | | | | | | | | completing the request (returning 0 bytes from a read). BUG=91898 TEST=net_unittests Review URL: http://codereview.chromium.org/7569027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96576 0039d316-1c4b-4281-b951-d872f2087c98
* Rename NET_API to NET_EXPORT, and rename NET_TEST to NET_EXPORT_PRIVATE.darin@chromium.org2011-08-121-1/+1
| | | | | | Review URL: http://codereview.chromium.org/7529043 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96560 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 95907 - Clean up SSL false start blacklist code. Numerous changes, ↵mnissler@chromium.org2011-08-111-10/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | including: * Handle trailing dots in LastTwoLabels() as in http://codereview.chromium.org/7518035/ . Rename this function to LastTwoComponents() to match the terminology used in the RegistryControlledDomainService and elsewhere in Chrome. * Since callers are using std::string anyway, make the functions in the header take const std::string& instead of char*. This also allows doing string operations on them. * Use string operations (like find_last_of()) in place of hand-written algorithms, for brevity, clarity, and safety. * Avoid "unsigned", which the style guide forbids, and use allowed types like size_t, uint32, or int (depending on the situation). * Avoid #define and "using". * Use standard algorithms for similar reasons as using string ops. * Use file_util functions to significantly abbreviate file reading/writing code. * Use wmain() (on Windows) in combination with FilePath to avoid issues if the provided pathname has extended characters that don't flatten losslessly to the default codepage (thanks Darin for pointing out this issue). * Avoid casting where possible. Avoid some casts for printf()-style calls by using a string stream, which also allows for slightly less boilerplate. * Convert non-error uses of stderr to the chrome-standard VLOG(1). * Correctly handle hostnames with trailing dots in the input file. * In general, shorten code where possible. Because this adds a dependency on base, and ssl_false_start_blacklist_process has the "#host" specifier in net.gyp, bradnelson tells me that base and its dependencies need an explicit "host, target" toolchain list for the Linux builds to work correctly. It would be nice if we could avoid this but I guess gyp would have to be smarter or something. BUG=none TEST=none Review URL: http://codereview.chromium.org/7550002 TBR=pkasting@chromium.org Review URL: http://codereview.chromium.org/7623015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96391 0039d316-1c4b-4281-b951-d872f2087c98
* FTP: add directory listing parser for OS/2 format.phajdan.jr@chromium.org2011-08-111-0/+3
| | | | | | | | | BUG=92154 TEST=navigate to ftp://ftp.os4.su/ - no errors should appear Review URL: http://codereview.chromium.org/7590011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96275 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 95910 - Revert 95907 - Clean up SSL false start blacklist code.pkasting@chromium.org2011-08-101-4/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Now that r96121 has landed, this should not cause compile failures when compiling base/ on the host. Original comments follow. Numerous changes, including: * Handle trailing dots in LastTwoLabels() as in http://codereview.chromium.org/7518035/ . Rename this function to LastTwoComponents() to match the terminology used in the RegistryControlledDomainService and elsewhere in Chrome. * Since callers are using std::string anyway, make the functions in the header take const std::string& instead of char*. This also allows doing string operations on them. * Use string operations (like find_last_of()) in place of hand-written algorithms, for brevity, clarity, and safety. * Avoid "unsigned", which the style guide forbids, and use allowed types like size_t, uint32, or int (depending on the situation). * Avoid #define and "using". * Use standard algorithms for similar reasons as using string ops. * Use file_util functions to significantly abbreviate file reading/writing code. * Use wmain() (on Windows) in combination with FilePath to avoid issues if the provided pathname has extended characters that don't flatten losslessly to the default codepage (thanks Darin for pointing out this issue). * Avoid casting where possible. Avoid some casts for printf()-style calls by using a string stream, which also allows for slightly less boilerplate. * Convert non-error uses of stderr to the chrome-standard VLOG(1). * Correctly handle hostnames with trailing dots in the input file. * In general, shorten code where possible. Because this adds a dependency on base, and ssl_false_start_blacklist_process has the "#host" specifier in net.gyp, bradnelson tells me that base and its dependencies need an explicit "host, target" toolchain list for the Linux builds to work correctly. It would be nice if we could avoid this but I guess gyp would have to be smarter or something. BUG=none TEST=none Review URL: http://codereview.chromium.org/7550002 TBR=pkasting@chromium.org Review URL: http://codereview.chromium.org/7529035 TBR=fischman@chromium.org Review URL: http://codereview.chromium.org/7587003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@96211 0039d316-1c4b-4281-b951-d872f2087c98