summaryrefslogtreecommitdiffstats
path: root/net/socket
Commit message (Collapse)AuthorAgeFilesLines
* net: add caching and inflight merging to DnsRRResolveragl@chromium.org2010-09-302-81/+2
| | | | | | | | | | (This also removes support for DNSSEC lookups. This is a temporary measure while I work on refactoring it.) BUG=none TEST=net_unittests git-svn-id: svn://svn.chromium.org/chrome/trunk/src@61071 0039d316-1c4b-4281-b951-d872f2087c98
* Adds the ability for a link to set the filter in the eventsmmenke@chromium.org2010-09-302-2/+20
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | tab. Added two new filter types: "type" and "id". "Type" specifies source type, and "id" specifies source ID. Both only allow exact matches, and multiple values of both can be specified ("id:5 id:6" will match source IDs 5 and 6). Added links to the #dns/#sockets tabs to link to filters to display all outstanding DNS requests/live sockets. The idle and connecting socket counts also now link to source id filters, using ids which are now passed to Javascript along with the rest of the socket pool information. As socket pools do not seem to maintain a list of active sockets, the same is not yet done for active sockets. Also fixes a bug that resulted in handed out/connecting socket counts being reversed in the primary socket pool table. BUG=56437 TEST=manual Review URL: http://codereview.chromium.org/3436033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@61069 0039d316-1c4b-4281-b951-d872f2087c98
* Stop refcounting ClientSocketPool.willchan@chromium.org2010-09-2921-729/+1505
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Establishes that HttpNetworkSession owns all the socket pools. Move out all the socket pools into a ClientSocketPoolManager. This is because of the dependency tree amongst socket pools, which dictates the order in which they must be constructed and destructed. In order to better establish it, I moved them out to their own class. HttpNetworkSession owns the ClientSocketPoolManager which owns the pools. We pass the pools as raw pointers everywhere. Note that ClientSocketPoolManager owns more pools than are publicly accessible via its interface. That's because some of them are wrapped by publicly exposed pools. Also, ClientSocketPoolHistograms used to be reference counted. That's because it can be shared by multiple ClientSocketPools. But it's effectively a global as well, so I make their lifetimes persist for the length of ClientSocketPoolManager too. I also removed internal refcounting in ClientSocketPoolBase. I had refcounted it before I knew about ScopedRunnableMethodFactory back when I first started. I cleaned up the unit tests a lot. Back when I was a young padawan, I didn't really know what I was doing, so I copy/pasted a metric asston of code. Turns out most of it was stupid, so I fixed it. I also stopped the use of implementation inheritance with ClientSocketPoolTest because it's discouraged by the style guide and more importantly because it caused the ClientSocketHandles within the TestSocketRequest vector to be destroyed _after_ the pools themselves were destroyed, which is bad since the handles will call pool_->Release() which blows up. BUG=56215,56215 TEST=Existing unit tests Review URL: http://codereview.chromium.org/3389020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60983 0039d316-1c4b-4281-b951-d872f2087c98
* HttpAuthHandlerFactory::CreateDefault requires a HostResolver argument.cbentzel@chromium.org2010-09-291-2/+5
| | | | | | | | | | | | | Previously the default registry factory would crash if it saw a Negotiate header when trying to do a CNAME lookup because of a NULL resolver. Since then I've changed HttpAuthHandlerNegotiate to skip the CNAME lookup step when the resolver_ is NULL. So, one option is to make CreateDefault accept an optional HostResolver argument. My concern is that since passing in NULL is the easier choice, people will do it and encounter user problems when going through a Negotiate proxy. Hence, I force the correct behavior. BUG=56819 TEST=net_unittests, try fetch client through a Negotiate authenticating proxy. Review URL: http://codereview.chromium.org/3518001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60942 0039d316-1c4b-4281-b951-d872f2087c98
* First step at OpenSSL client socket implementation.joth@chromium.org2010-09-293-0/+753
| | | | | | | | | | | | | This is early in-progress implementation, no cert handling supported. So only available under a build-time flag. (GYP_DEFINES="'use_openssl=1'") Adds a new build dependency for system OpenSSL libraries, and a new USE_OPENSSL define. Eventually this will disable USE_NSS but for now the two coexist. BUG=none TEST=build with use_openssl=1. Goto some https:// pages. Review URL: http://codereview.chromium.org/3495005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60936 0039d316-1c4b-4281-b951-d872f2087c98
* Add more LOG(ERROR) messages to track down bug 55678,wtc@chromium.org2010-09-281-4/+8
| | | | | | | | | | | | identifying the SChannel function that fails with SEC_E_INVALID_HANDLE. R=eroman BUG=55678 TEST=none Review URL: http://codereview.chromium.org/3418036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60841 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 60791 - HttpAuthHandlerFactory::CreateDefault requires a HostResolver ↵cbentzel@chromium.org2010-09-281-5/+2
| | | | | | | | | | | | | | | | | | argument. Previously the default registry factory would crash if it saw a Negotiate header when trying to do a CNAME lookup because of a NULL resolver. Since then I've changed HttpAuthHandlerNegotiate to skip the CNAME lookup step when the resolver_ is NULL. So, one option is to make CreateDefault accept an optional HostResolver argument. My concern is that since passing in NULL is the easier choice, people will do it and encounter user problems when going through a Negotiate proxy. Hence, I force the correct behavior. BUG=56819 TEST=net_unittests, try fetch client through a Negotiate authenticating proxy. Review URL: http://codereview.chromium.org/3447027 TBR=cbentzel@chromium.org Review URL: http://codereview.chromium.org/3413039 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60795 0039d316-1c4b-4281-b951-d872f2087c98
* HttpAuthHandlerFactory::CreateDefault requires a HostResolver argument.cbentzel@chromium.org2010-09-281-2/+5
| | | | | | | | | | | | | Previously the default registry factory would crash if it saw a Negotiate header when trying to do a CNAME lookup because of a NULL resolver. Since then I've changed HttpAuthHandlerNegotiate to skip the CNAME lookup step when the resolver_ is NULL. So, one option is to make CreateDefault accept an optional HostResolver argument. My concern is that since passing in NULL is the easier choice, people will do it and encounter user problems when going through a Negotiate proxy. Hence, I force the correct behavior. BUG=56819 TEST=net_unittests, try fetch client through a Negotiate authenticating proxy. Review URL: http://codereview.chromium.org/3447027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60791 0039d316-1c4b-4281-b951-d872f2087c98
* Clean up socket backup job when there are no requests.willchan@chromium.org2010-09-273-16/+39
| | | | | | | | | BUG=56532 TEST=ClientSocketPoolBaseTest.CancelBackupSocketAfterFinishingAllRequests Review URL: http://codereview.chromium.org/3441034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60693 0039d316-1c4b-4281-b951-d872f2087c98
* Update ClientSocket::GetPeerAddress() to specify therch@chromium.org2010-09-253-3/+4
| | | | | | | | | | | | | behavior when the socket is not connected. Modified all implementations (that do not simply delegate to another socket) to conform to this specification. BUG=56426 TEST=none Review URL: http://codereview.chromium.org/3464011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60561 0039d316-1c4b-4281-b951-d872f2087c98
* Clarify the semantics of Socket::Read() and Socket::Write(), rch@chromium.org2010-09-252-14/+18
| | | | | | | | | | particularly as they related to closed sockets. BUG=56423 TEST=none Review URL: http://codereview.chromium.org/3421028 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60560 0039d316-1c4b-4281-b951-d872f2087c98
* net: Append base:: in the StringPrintf calls.tfarina@chromium.org2010-09-252-8/+9
| | | | | | | | | | | (Note: This is a TODO in string_util.h) BUG=None TEST=trybots Review URL: http://codereview.chromium.org/3390026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60555 0039d316-1c4b-4281-b951-d872f2087c98
* Wait on a pipe for the test server to start updavidben@chromium.org2010-09-222-240/+0
| | | | | | | | | | | | | This should speed up testserver-based unit tests considerably and make them less flakey. R=agl,cpu,phajdan,wtc BUG=49680 TEST=net_unittests Review URL: http://codereview.chromium.org/3368012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60199 0039d316-1c4b-4281-b951-d872f2087c98
* net: Fix incorrect style used in some enumerations.tfarina@chromium.org2010-09-224-40/+40
| | | | | | | | | | | | | | | | | | | Reason: They are using kConstantNaming, however the Chromium style is to use UPPER_CASE_FOR_ENUMS. Also convert some truly constants, like the following: http/http_proxy_client_socket_pool.h: enum { kDrainBodyBufferSize = 1024 }; To: static const int kDrainBodyBufferSize = 1024; BUG=55668 TEST=compiles locally. Review URL: http://codereview.chromium.org/3421026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60155 0039d316-1c4b-4281-b951-d872f2087c98
* Add log messages to the places where we set the ERR_UNEXPECTEDwtc@chromium.org2010-09-223-14/+24
| | | | | | | | | | | | | error code in net/socket to help track down bug 55678. Fix cpplint nits. R=eroman BUG=55678 TEST=none Review URL: http://codereview.chromium.org/3461013 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60138 0039d316-1c4b-4281-b951-d872f2087c98
* Revert "net: add test for False Start corking."agl@chromium.org2010-09-211-32/+6
| | | | | | This reverts commit r60056. The test failed on Windows. git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60059 0039d316-1c4b-4281-b951-d872f2087c98
* net: add test for False Start corking.agl@chromium.org2010-09-211-6/+32
| | | | | | | | | | | See r58838 for details of why we do False Start corking. BUG=none TEST=net_unittests http://codereview.chromium.org/3427014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@60056 0039d316-1c4b-4281-b951-d872f2087c98
* Break reference cycle from HttpProxyClientSocket=>HttpNetworkSession=>...willchan@chromium.org2010-09-173-15/+6
| | | | | | | | | | | | Note that this undoes the fix for http://crbug.com/49387 which is now unnecessary without the cycle. Some other miscellaneous cleanup is thrown in here. BUG=55175 TEST=none Review URL: http://codereview.chromium.org/3418018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59873 0039d316-1c4b-4281-b951-d872f2087c98
* Flush all nested pools.willchan@chromium.org2010-09-162-0/+7
| | | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3434006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59751 0039d316-1c4b-4281-b951-d872f2087c98
* Add a new net error code for when the load failure was due to connecting to ↵eroman@chromium.org2010-09-163-5/+5
| | | | | | | | | | | | | | | | | | | | | a bad proxy server. Prior to this change, users would likely have seen one of these errors on failure to connect through a proxy server: ERR_NAME_NOT_RESOLVED ERR_ADDRESS_UNREACHABLE ERR_CONNECTION_REFUSED ERR_CONNECTION_TIMED_OUT ERR_CONNECTION_FAILED Whereas now any host resolve or tcp connect error will map to: ERR_PROXY_UNREACHABLE This error code will allow selecting a more suitable error page. BUG=53477 Review URL: http://codereview.chromium.org/3360025 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59710 0039d316-1c4b-4281-b951-d872f2087c98
* Show "DNS" as the authority for DNSSEC validated certficiates.agl@chromium.org2010-09-161-1/+4
| | | | | | | | | | | | | | | | | | | At the moment, if we validate a certificate using DNSSEC the Page Info dialog will show whatever Issuer the site chose as the issuing authority. That's confusing because the site could choose a string like 'US Dept of Homeland Security' (for example) which is misleading. This patch forces the authority string to always be "DNSSEC" in the case that we used DNSSEC to validate the certificate. (The string "DNSSEC" isn't translated as it's an acronym.) BUG=none TEST=none http://codereview.chromium.org/3304016/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59686 0039d316-1c4b-4281-b951-d872f2087c98
* Change HostResolver::RequestInfo to take a HostPortPair rather than naked ↵eroman@chromium.org2010-09-156-12/+12
| | | | | | | | host string + port. Review URL: http://codereview.chromium.org/3420001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59577 0039d316-1c4b-4281-b951-d872f2087c98
* Reland 59362 - net: Rename ProxyService::CreateNull to ↵tfarina@chromium.org2010-09-151-1/+1
| | | | | | | | | | | | | | | | | | | | | ProxyService::CreateDirect. (Note: This was a TODO for eroman). BUG=None TEST=trybots Review URL: http://codereview.chromium.org/3336021 Revert Review URL: http://codereview.chromium.org/3444001/show TBR=eroman@chromium.org Fix the bad git svn rebase (that caused a bad merge, that integrates other files in the original cl, now this should be fixed). Review URL: http://codereview.chromium.org/3413008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59481 0039d316-1c4b-4281-b951-d872f2087c98
* Trying to green up the tree, lots of mac and win red around this cl.thomasvl@chromium.org2010-09-141-1/+1
| | | | | | | | | | | | | | | | Revert 59362 - net: Rename ProxyService::CreateNull to ProxyService::CreateDirect. (Note: This was a TODO for eroman). BUG=None TEST=trybots Review URL: http://codereview.chromium.org/3336021 TBR=tfarina@chromium.org Review URL: http://codereview.chromium.org/3444001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59373 0039d316-1c4b-4281-b951-d872f2087c98
* net: Rename ProxyService::CreateNull to ProxyService::CreateDirect.tfarina@chromium.org2010-09-141-1/+1
| | | | | | | | | | | (Note: This was a TODO for eroman). BUG=None TEST=trybots Review URL: http://codereview.chromium.org/3336021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59362 0039d316-1c4b-4281-b951-d872f2087c98
* net: disable renegotiation checks.agl@chromium.org2010-09-131-1/+3
| | | | | | | | | | | | | | | | | | | Although we have a handle on the problems of corporate MITM proxies, users are now reporting the anti-virus programs are choosing to implement their virus scanning by MITM attacking local SSL/TLS connections. It only appears to be some anti-virus programs in some configurations, but we don't really have a good idea of the scope of the issue so this patch disables the renegotiation checks (for merging to the stable branch) while we work on a better solution. BUG=55410 TEST=none http://codereview.chromium.org/3340024/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59241 0039d316-1c4b-4281-b951-d872f2087c98
* Give a more specific error code when connect() fails synchronously with ↵eroman@chromium.org2010-09-101-1/+2
| | | | | | | | | | | | EHOSTDOWN on posix systems. Before it would give ERR_FAILED, now it fails with ERR_ADDRESS_UNREACHABLE. Moreover, any unmapped error from connect() will map to ERR_CONNECTION_FAILED rather than ERR_FAILED. BUG=55009 Review URL: http://codereview.chromium.org/3303022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@59053 0039d316-1c4b-4281-b951-d872f2087c98
* net: add DNSSEC tool and CNAME support.agl@chromium.org2010-09-091-5/+5
| | | | | | | | | | | | | | | This change adds support for DNSSEC chains with CNAMEs. I.e. it's not possible to prove records about $domain where $domain is a CNAME. It also adds a tiny, standalone tool to run the verification code from the command line. BUG=none TEST=net_unittests http://codereview.chromium.org/3301015/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58986 0039d316-1c4b-4281-b951-d872f2087c98
* net: When using False Start merge Finished and Application Data records.agl@chromium.org2010-09-082-23/+42
| | | | | | | | | | | | | | | | | When using False Start, this patch causes NSS to perform a single write which contains the ClientKeyExchange, ChangeCipherSpec, Finished and first application data record. This removes a source of non-determinism when dealing with False Start intolerant servers. Previously, Chrome may, or may not work depending on network timing. BUG=none TEST=none http://codereview.chromium.org/3331005/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58838 0039d316-1c4b-4281-b951-d872f2087c98
* Add missing nested socket pools to socket pool info page. Each socket pool ↵mmenke@chromium.org2010-09-089-23/+79
| | | | | | | | | | | should be displayed once and only once. Also, if more than one proxy is in use, socket pools with the same proxy will appear adjacent to each other. BUG=39756 TEST=manual Review URL: http://codereview.chromium.org/3328009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58826 0039d316-1c4b-4281-b951-d872f2087c98
* Fix SetOmniboxSpeculation in TcpClientSocket*cbentzel@chromium.org2010-09-082-2/+2
| | | | | | | | BUG=None TEST=None Review URL: http://codereview.chromium.org/3292011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58821 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 58684 - Fix SetOmniboxSpeculation in TcpClientSocket*cbentzel@chromium.org2010-09-072-2/+2
| | | | | | | | | | | BUG=None TEST=None Review URL: http://codereview.chromium.org/3344010 TBR=cbentzel@chromium.org Review URL: http://codereview.chromium.org/3297014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58688 0039d316-1c4b-4281-b951-d872f2087c98
* Fix SetOmniboxSpeculation in TcpClientSocket*cbentzel@chromium.org2010-09-072-2/+2
| | | | | | | | BUG=None TEST=None Review URL: http://codereview.chromium.org/3344010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58684 0039d316-1c4b-4281-b951-d872f2087c98
* Flush SSL pools after SSL config changes.csilv@chromium.org2010-09-044-5/+27
| | | | | | | | BUG=46043 TEST=Verify that SSL pools are flushed after user makes SSL change. Review URL: http://codereview.chromium.org/3274004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58567 0039d316-1c4b-4281-b951-d872f2087c98
* Mark test flakinessgavinp@chromium.org2010-09-031-1/+1
| | | | | | | | | | | | This test flaking out closed the tree earlier today. TBR=phajdan.jr BUG=54445 TEST=net_unittests ... ConnectClientAuthCertRequested Review URL: http://codereview.chromium.org/3332005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58543 0039d316-1c4b-4281-b951-d872f2087c98
* Fix ClientSocketHandle reuse_type(). Correctly track socket use.willchan@chromium.org2010-09-0222-30/+133
| | | | | | | | | | | | | In particular, we used to consider that a socket had been used whenever it got returned to the ClientSocketPool. But, with preconnect, that is no longer true. Luckily, we now have UseHistory in the transport sockets. So, I create a WasEverUsed() method in ClientSocket, plumb this into all sockets, and use that in ClientSocketPoolBaseHelper instead of tracking whether or not the socket had been returned to the client or not. This ultimately will have two implications. We will record the correct values in Net.HttpSocketType histograms and we will use the correct timeout for preconnect sockets in ClientSocketPoolBaseHelper::CleanupIdleSockets(). BUG=none TEST=none Review URL: http://codereview.chromium.org/3353004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58363 0039d316-1c4b-4281-b951-d872f2087c98
* Don't break on auth if we are about to do client auth.wtc@chromium.org2010-09-021-28/+13
| | | | | | | | | | | | Don't call SSL_SetSessionOption after the initial handshake is done because it'll fail with the badReqErr (-909) error. R=rsleevi BUG=45576,52152 TEST=Visit any site that requests SSL client auth over renegotiation. Review URL: http://codereview.chromium.org/3208003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58299 0039d316-1c4b-4281-b951-d872f2087c98
* FBTF: Move more ctors/dtors from headers to implementation.erg@google.com2010-09-012-0/+4
| | | | | | | | | | | | | | | | | - Adding/Moving dtors of objects that have CancelableRequestConsumers shaves three megs off browser.a. - Adding/Moving dtors of objects that have ScopedRunnableMethodFactories only shaved 100k off browser.a/renderer.a. - Adding/Moving dtors of objects that used some form of base::*Timer<> was negligible; there were only a few classes that had a Timer but had a ctor/dtor in the header after the previous cleanups. BUG=none TEST=compiles Review URL: http://codereview.chromium.org/3278006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58192 0039d316-1c4b-4281-b951-d872f2087c98
* Stop leaking requests on abort.willchan@chromium.org2010-09-011-0/+1
| | | | | | | | | Remove heapcheck/valgrind suppressions. BUG=53995,50665 Review URL: http://codereview.chromium.org/3284010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58170 0039d316-1c4b-4281-b951-d872f2087c98
* Fix a regression whereby full-granularity network events were being captured ↵eroman@chromium.org2010-08-311-1/+1
| | | | | | | | | | by PassiveLogCollector. BUG=53883 TEST=Load a webpage. Now open about:net-internals and verify that the log for that URL does NOT contain the HTTP request/response headers. Review URL: http://codereview.chromium.org/3274016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58070 0039d316-1c4b-4281-b951-d872f2087c98
* Abort ConnectJobs with ERR_ABORTED when network changes.willchan@chromium.org2010-08-313-3/+95
| | | | | | | | | BUG=50665 TEST=ClientSocketPoolBaseTest.AbortAllRequestsOnFlush Review URL: http://codereview.chromium.org/3255005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58042 0039d316-1c4b-4281-b951-d872f2087c98
* FBTF: A giant cleanup to net/erg@google.com2010-08-312-0/+2
| | | | | | | | | | | | This moves all sorts of code from h files to cc files and reduces header dependencies. BUG=none TEST=compiles Review URL: http://codereview.chromium.org/3212008 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@58020 0039d316-1c4b-4281-b951-d872f2087c98
* ClientSocketPoolBaseHelper can try to read an invalid iterator. Fix that.willchan@chromium.org2010-08-312-2/+35
| | | | | | | | | | | | | | If we hit the backup socket timer and there is no pending request, then the code still tries to create a backup socket using pending_requests.begin(). We change the code to cancel the backup socket timer when the pending_requests hit zero. We also check before reading pending_requests.begin(). BUG=53860 TEST=ClientsocketPoolBaseTest.CancelBackupSocketWhenThereAreNoRequests Review URL: http://codereview.chromium.org/3247007 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57993 0039d316-1c4b-4281-b951-d872f2087c98
* Sockets page on net-internals now displays some information about the ↵mmenke@chromium.org2010-08-307-0/+77
| | | | | | | | | | current socket pool state. Table padding slightly increased for legibility. TEST=manual BUG=39756 Review URL: http://codereview.chromium.org/3267002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57869 0039d316-1c4b-4281-b951-d872f2087c98
* Rename ERR_SSL_WEAK_SERVER_KEY to ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEYwtc@chromium.org2010-08-301-1/+1
| | | | | | | | | | | so that it's clear what kind of key it is referring to. R=agl BUG=51694 TEST=none Review URL: http://codereview.chromium.org/3279004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57868 0039d316-1c4b-4281-b951-d872f2087c98
* https: add support for DNS exclusion and switch to TXT records.agl@chromium.org2010-08-285-40/+299
| | | | | | | | | | | | | | | | | | | | | | | | | | | | (This code has no effect unless --enable-dnssec-certs is given.) The existing DNSSEC code will process embeded chains in certificates and validate CERT records there in. The format of the CERT record was just something made up as a proof of concept. This change switches that code to using TXT records which are at least used by some other code. Additionally, when --enable-dnssec-certs is given. TXT record lookups are triggered for each HTTPS connection. If DNSSEC secure, these lookups can validate a HTTPS certificate. Even without DNSSEC, they can by used for exclusion: if TLS fingerprints are given, but the certificate doesn't match any of them, then the certificate is rejected. The next step in this series will be to perform the TXT lookup for some percentage of dev channel users in order to measure the latency impact. For this experiment, all behavioural changes will be disabled. BUG=none TEST=net_unittests http://codereview.chromium.org/3148037/show git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57787 0039d316-1c4b-4281-b951-d872f2087c98
* Rename the following SSLClientSocket methods to match the style guide:rch@chromium.org2010-08-275-14/+14
| | | | | | | | | | | | | | wasNpnNegotiated() -> was_npn_negotiated() setWasNpnNegotiated() -> set_was_npn_negotiated() wasSpdyNegotiated() -> was_spdy_negotiated() setWasSpdyNegotiated() -> set_was_spdy_negotiated() BUG=none TEST=none Review URL: http://codereview.chromium.org/3229004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57741 0039d316-1c4b-4281-b951-d872f2087c98
* FBTF: Remove unneeded headers from base/ (part 7)thestig@chromium.org2010-08-272-2/+2
| | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3176026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57737 0039d316-1c4b-4281-b951-d872f2087c98
* Add a new SSLClientSocket::wasSpdyNegotiated method,rch@chromium.org2010-08-272-4/+13
| | | | | | | | | | | | and modify HttpStreamRequest::DoInitConnectionComplete to call it. BUG=none TEST=none Review URL: http://codereview.chromium.org/3173053 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57633 0039d316-1c4b-4281-b951-d872f2087c98
* ClientSocketPoolBaseHelper crash fix: add a self-reference.willchan@chromium.org2010-08-261-0/+6
| | | | | | | | BUG=49254 Review URL: http://codereview.chromium.org/3127035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57529 0039d316-1c4b-4281-b951-d872f2087c98