summaryrefslogtreecommitdiffstats
path: root/net
Commit message (Collapse)AuthorAgeFilesLines
* Merge 233879 "Stop leaking a CERTCertificate* during SSL renegot..."wtc@chromium.org2013-11-131-1/+1
| | | | | | | | | | | | | | | > Stop leaking a CERTCertificate* during SSL renegotiation > > BUG=316407 > R=agl > > Review URL: https://codereview.chromium.org/65853002 TBR=rsleevi@chromium.org Review URL: https://codereview.chromium.org/61743019 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@234954 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 229611 "Do not allow the server certificate to change in a..."rsleevi@chromium.org2013-11-043-0/+20
| | | | | | | | | | | | | | | | > Do not allow the server certificate to change in a renegotiation. > > R=agl@chromium.org,rsleevi@chromium.org > BUG=306959 > TEST=none > > Review URL: https://codereview.chromium.org/27266002 TBR=wtc@chromium.org Review URL: https://codereview.chromium.org/45753005 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@232792 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 232552 "Include a fix for NSS bug 934016"rsleevi@chromium.org2013-11-044-0/+27
| | | | | | | | | | | | | | | > Include a fix for NSS bug 934016 > > BUG=314225 > R=wtc@chromium.org, wtc > > Review URL: https://codereview.chromium.org/52713015 TBR=rsleevi@chromium.org Review URL: https://codereview.chromium.org/57943004 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@232754 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 230713 "Update to the new definitions of CKM_NSS_CHACHA20_..."wtc@chromium.org2013-10-251-11/+11
| | | | | | | | | | | | | | | | | | | | > Update to the new definitions of CKM_NSS_CHACHA20_POLY1305 and > struct CK_NSS_AEAD_PARAMS. > > This updates code added in https://codereview.chromium.org/23619044. > > R=agl@chromium.org > BUG=310768 > TEST=none > > Review URL: https://codereview.chromium.org/36073014 TBR=wtc@chromium.org BUG=311309 Review URL: https://codereview.chromium.org/45343002 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@231099 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 229478 "Remove HSTS preload for translate.google.com."palmer@chromium.org2013-10-212-2/+0
| | | | | | | | | | | | | | | | | > Remove HSTS preload for translate.google.com. > > Works around a server-side bug. > > BUG=309176 > TBR=rsleevi@chromium.org > > Review URL: https://codereview.chromium.org/28743003 TBR=palmer@chromium.org Review URL: https://codereview.chromium.org/33393002 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@229869 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 226539 "net: don't preserve 1xx responses in parser buffer."agl@chromium.org2013-10-213-50/+91
| | | | | | | | | | | | | | | | | > net: don't preserve 1xx responses in parser buffer. > > It's unclear why 1xx responses were kept in the parser's buffer previously so > this change aligns their processing with all other response types. > > BUG=299892 > > Review URL: https://codereview.chromium.org/25312002 TBR=agl@chromium.org Review URL: https://codereview.chromium.org/33053003 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@229861 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 229661 "Fix for proxy-bypass support on iOS."bengr@chromium.org2013-10-212-119/+211
| | | | | | | | | | | | | | > Fix for proxy-bypass support on iOS. > > BUG=300178 > > Review URL: https://codereview.chromium.org/25776002 TBR=marq@chromium.org Review URL: https://codereview.chromium.org/33133002 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@229847 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 226126 "Change SSL_PeerCertificateChain to return a CERTCe..."wtc@chromium.org2013-10-176-43/+151
| | | | | | | | | | | | | | | | | > Change SSL_PeerCertificateChain to return a CERTCertList. > > R=agl@chromium.org,rsleevi@chromium.org > BUG=none > TEST=none > > Review URL: https://codereview.chromium.org/25107004 TBR=wtc@chromium.org BUG=308270 Review URL: https://codereview.chromium.org/26688005 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@229011 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 228087 "Permit NTLM token on cross-domain images."tsepez@chromium.org2013-10-145-2/+99
| | | | | | | | | | | | | | | | | | > Permit NTLM token on cross-domain images. > > The change in http://crrev.com/209100 is too general; this makes > the effects specific to embedded identities. > > BUG=303046 > R=cbentzel@chromium.org > > Review URL: https://codereview.chromium.org/26745002 TBR=tsepez@chromium.org Review URL: https://codereview.chromium.org/26781005 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@228468 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 227704 "Make SSL False Start work with asynchronous certif..."wtc@chromium.org2013-10-1113-93/+934
| | | | | | | | | | | | | | | | | | | | | > Make SSL False Start work with asynchronous certificate validation > (SSL_AuthCertificateComplete). > > Patch by Brian Smith <brian@briansmith.org>. > > NSS bug https://bugzilla.mozilla.org/show_bug.cgi?id=713933 > > R=agl@chromium.org > BUG=none > TEST=none > > Review URL: https://codereview.chromium.org/23621040 TBR=wtc@chromium.org Review URL: https://codereview.chromium.org/27000008 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@228202 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 227331 "net: don't send resumption ClientHello records wit..."agl@chromium.org2013-10-093-4/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | | | > net: don't send resumption ClientHello records with versions > 0x0301. > > Best we can tell, F5 BIG-IP devices with firmware < 10.2.4 hang the connection > when a ClientHello record is received with version > 0x0301 and is longer than > 255 bytes. > > With TLS 1.2, we're hitting this size limit on resume connections with long > hostnames. Since the servers negotiate TLS 1.2, NSS previously used 0x0303 as > the ClientHello record version. This change causes NSS to always use at most > 0x0301 as the ClientHello record version, even when we are resuming a session > and know that the server supports TLS 1.2. > > See http://rt.openssl.org/Ticket/Display.html?id=2771#txn-33812 > > https://bugzilla.mozilla.org/show_bug.cgi?id=923696 > > BUG=303398 > > Review URL: https://codereview.chromium.org/25868004 TBR=agl@chromium.org Review URL: https://codereview.chromium.org/26730002 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@227768 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 225345 "NSS: don't advertise TLS 1.2-only ciphersuites in ..."agl@chromium.org2013-10-024-25/+213
| | | | | | | | | | | | | | | | | | | | | > NSS: don't advertise TLS 1.2-only ciphersuites in a TLS 1.1 ClientHello. > > Chrome is advertising SHA256 ciphersuites with a TLS 1.1 ClientHello. This > breaks PolarSSL servers because they also have a bug: they accept the SHA256 > ciphersuite and then break because they negotiated TLS 1.1 > > This change causes NSS not to advertise cipher suites that aren't applicable to > the version being negotiated. > > BUG=297151 > > Review URL: https://codereview.chromium.org/23928007 TBR=agl@chromium.org Review URL: https://codereview.chromium.org/25552004 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@226464 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 225155 "Keep running mdns client even if either IPv4 or IP..."noamsml@chromium.org2013-09-263-63/+62
| | | | | | | | | | | | | | | > Keep running mdns client even if either IPv4 or IPv6 bind failed. > > BUG=297212 > NOTRY=true > > Review URL: https://chromiumcodereview.appspot.com/23498056 TBR=vitalybuka@chromium.org Review URL: https://codereview.chromium.org/24742006 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@225470 0039d316-1c4b-4281-b951-d872f2087c98
* Merge 225017 "net: disable TLS False Start."agl@chromium.org2013-09-262-3/+2
| | | | | | | | | | | | > net: disable TLS False Start. > > Review URL: https://codereview.chromium.org/23455059 TBR=agl@chromium.org Review URL: https://codereview.chromium.org/24573004 git-svn-id: svn://svn.chromium.org/chrome/branches/1650/src@225459 0039d316-1c4b-4281-b951-d872f2087c98
* Simple Cache: Make stream 2 optionalttuttle@chromium.org2013-09-234-176/+539
| | | | | | | | | | Make the third stream optional, since it's usually empty. BUG=280592 Review URL: https://chromiumcodereview.appspot.com/22511002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224674 0039d316-1c4b-4281-b951-d872f2087c98
* [CleanUp] Use base::STLSetDifference() in place of std::set_difference()limasdf@gmail.com2013-09-231-9/+7
| | | | | | | | | BUG=254066 TEST=net_unittests Review URL: https://chromiumcodereview.appspot.com/24155002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224658 0039d316-1c4b-4281-b951-d872f2087c98
* Migrate AppCache to simple cache backend on Android.pliard@chromium.org2013-09-211-3/+3
| | | | | | | | BUG=283896 Review URL: https://chromiumcodereview.appspot.com/23503069 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224604 0039d316-1c4b-4281-b951-d872f2087c98
* Remove control character cookie UMA stats.jww@chromium.org2013-09-211-41/+3
| | | | | | | | BUG=238041 Review URL: https://chromiumcodereview.appspot.com/23503084 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224583 0039d316-1c4b-4281-b951-d872f2087c98
* Fix copypasto: QuicClockTest -> QuicEpollClockTest.earthdok@chromium.org2013-09-211-1/+1
| | | | | | | | | BUG=NONE R=rch@chromium.org Review URL: https://chromiumcodereview.appspot.com/23465035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224580 0039d316-1c4b-4281-b951-d872f2087c98
* SimpleCache: Track mass dooms as pending dooms.gavinp@chromium.org2013-09-2113-165/+323
| | | | | | | | | | | | | By placing entries being doomed in mass dooms into entries_pending_doom_, we avoid racing operations on individual entries with mass operations. R=pliard@chromium.org, rdsmith@chromium.org, pasko, rdsmith, ttuttle BUG=289542,294186 Review URL: https://codereview.chromium.org/23437030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224543 0039d316-1c4b-4281-b951-d872f2087c98
* Handle the case when StopCaching was called in DoneReadingdavidben@chromium.org2013-09-202-3/+49
| | | | | | | | | | | | | | If StopCaching is called, it is possible for mode_ to be NONE while entry_ is non-NULL and points to an entry in write mode. Don't incorrectly close it as a read entry (thus crashing) in DoneReading. Add a test which stresses this case. BUG=295638 TEST=HttpCache.StopCachingThenDoneReadingDeletesEntry, downloading a large-ish download with gzip compression doesn't crash Review URL: https://chromiumcodereview.appspot.com/24286004 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224513 0039d316-1c4b-4281-b951-d872f2087c98
* SimpleCache: fix bug in crc32 computationclamy@chromium.org2013-09-202-0/+53
| | | | | | | | | | | When writing over a range for which the crc32 had already computed, the crc32 is now properly reset to 0 BUG=294859 Review URL: https://chromiumcodereview.appspot.com/23708051 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224448 0039d316-1c4b-4281-b951-d872f2087c98
* Added to test the crash if QuicReliableClientStream doesn't have artenneti@chromium.org2013-09-201-0/+29
| | | | | | | | | | | delegate. R=rch@chromium.org BUG=294870 Review URL: https://chromiumcodereview.appspot.com/24211005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224409 0039d316-1c4b-4281-b951-d872f2087c98
* Disable the flaky SimpleIndexFileTest.WriteThenLoadIndex.glider@chromium.org2013-09-201-1/+2
| | | | | | | | | BUG=255775 TBR=gavinp@chromium.org Review URL: https://codereview.chromium.org/24240012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224373 0039d316-1c4b-4281-b951-d872f2087c98
* Pump the message loop in URLRequest tests.earthdok@chromium.org2013-09-201-1/+4
| | | | | | | | | | | Fixes memory leaks. BUG=290897 R=rsleevi@chromium.org Review URL: https://chromiumcodereview.appspot.com/23532081 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224334 0039d316-1c4b-4281-b951-d872f2087c98
* NSS: fix session cache lock initialisation.agl@chromium.org2013-09-207-99/+296
| | | | | | | | | | | | This code previously used an unprotected global, that was accessed from multiple threads, to guard whether global locks had been created. See bug for details. BUG=292999 Review URL: https://chromiumcodereview.appspot.com/24216005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224311 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 224271 "Introduce WebSocketInflater."tkent@chromium.org2013-09-205-661/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The new test WebSocketInflaterTest.LargeRandomDeflateInflate failed on XP Tests (dbg) and Win7 Tests (dbg). http://build.chromium.org/p/chromium.win/builders/Win7%20Tests%20%28dbg%29%282%29/builds/17568/steps/net_unittests/logs/stdio > [6994/6994] 376.29s WebSocketInflaterTest.LargeRandomDeflateInflate (0.73s) - retry #2 > Note: Google Test filter = WebSocketInflaterTest.LargeRandomDeflateInflate > [==========] Running 1 test from 1 test case. > [----------] Global test environment set-up. > [----------] 1 test from WebSocketInflaterTest > [ RUN ] WebSocketInflaterTest.LargeRandomDeflateInflate > c:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\include\vector(932) : Assertion failed: vector subscript out of range > c:\Program Files (x86)\Microsoft Visual Studio 10.0\VC\include\vector(933) : Assertion failed: "Standard C++ Libraries Out of Range" && 0 > Introduce WebSocketInflater. > > Implement WebSocketInflater, a utility class for the permessage-deflate WebSocket extension. > > BUG=280910 > R=ricea, tyoshino > > Review URL: https://chromiumcodereview.appspot.com/23480049 TBR=yhirano@chromium.org Review URL: https://codereview.chromium.org/24078027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224292 0039d316-1c4b-4281-b951-d872f2087c98
* Fix test-only leak in ↵earthdok@chromium.org2013-09-201-23/+29
| | | | | | | | | | | HttpStreamParser.ShouldMergeRequestHeadersAndBody_FileBody. BUG=294807,290897,294797 R=rsleevi@chromium.org Review URL: https://chromiumcodereview.appspot.com/23707054 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224286 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 224269 "Don't persist HPKP if PrivacyMode is enabled."tkent@chromium.org2013-09-2013-184/+90
| | | | | | | | | | | | | | | | | | | | | | | It broke Google Chrome ChromeOS bot. http://build.chromium.org/p/chromium.chrome/builders/Google%20Chrome%20ChromeOS/builds/58548/steps/compile/logs/stdio#error1 FAILED: g++ ... -c ../../net/socket/ssl_client_socket_nss.cc -o obj/net/socket/net.ssl_client_socket_nss.o ../../net/socket/ssl_client_socket_nss.cc: In member function 'int net::SSLClientSocketNSS::DoVerifyCertComplete(int)': ../../net/socket/ssl_client_socket_nss.cc:3445:64:error: no matching function for call to 'net::TransportSecurityState::GetDomainState(const string&, bool&, net::TransportSecurityState::DomainState*)' ../../net/socket/ssl_client_socket_nss.cc:3445:64: note: candidate is: ../../net/http/transport_security_state.h:212:8: note: bool net::TransportSecurityState::GetDomainState(const string&, bool, bool, net::TransportSecurityState::DomainState*) ../../net/http/transport_security_state.h:212:8: note: candidate expects 4 arguments, 3 provided > Don't persist HPKP if PrivacyMode is enabled. > > BUG=258667 > > Review URL: https://chromiumcodereview.appspot.com/19269012 TBR=mef@chromium.org Review URL: https://codereview.chromium.org/24251011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224275 0039d316-1c4b-4281-b951-d872f2087c98
* Introduce WebSocketInflater.yhirano@chromium.org2013-09-205-0/+661
| | | | | | | | | | | Implement WebSocketInflater, a utility class for the permessage-deflate WebSocket extension. BUG=280910 R=ricea, tyoshino Review URL: https://chromiumcodereview.appspot.com/23480049 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224271 0039d316-1c4b-4281-b951-d872f2087c98
* Don't persist HPKP if PrivacyMode is enabled.mef@chromium.org2013-09-2013-90/+184
| | | | | | | | BUG=258667 Review URL: https://chromiumcodereview.appspot.com/19269012 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224269 0039d316-1c4b-4281-b951-d872f2087c98
* Disallow cookies with control chars.jww@chromium.org2013-09-205-11/+177
| | | | | | | | BUG=238041 Review URL: https://chromiumcodereview.appspot.com/15542005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224268 0039d316-1c4b-4281-b951-d872f2087c98
* Disable 0-RTT for HTTPSrch@chromium.org2013-09-201-1/+1
| | | | | | Review URL: https://chromiumcodereview.appspot.com/23976006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224254 0039d316-1c4b-4281-b951-d872f2087c98
* Add PNACL_CACHE cache backend type, and allow larger files for this type.dschuff@chromium.org2013-09-193-2/+6
| | | | | | | | | | | | | | | | | | PnaCl's translation cache is currently using the DISK_CACHE backend, but we don't want to mix the UMA statistics for these caches. Also, because we expect PNaCl's cache to have a small number of files, which will be much larger than most HTTP cache files, we remove the restriction that files can take up no more than 1/8 of the cache. For machines with little available disk space (and thus small caches), this may mean the difference between being able to store any files in the cache, or not. R=rvargas@chromium.org,jvoung@chromium.org BUG=none TEST= unit_tests PnaclTranslationCacheTest.* (and no net_unittests break) Review URL: https://chromiumcodereview.appspot.com/24208003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224176 0039d316-1c4b-4281-b951-d872f2087c98
* Release the cache entry on deferred redirect.davidben@chromium.org2013-09-197-9/+97
| | | | | | | | | | | | | | | | | | | | | | | | | If a redirect is deferred in the warm cache case, the HTTP transaction currently doesn't release the cache entry until after the redirect continues. This prevents other requests from accessing the cache entry. Reuse the DoneReading() signal for the URLRequestJob to notify the transaction that the response body is to be discarded. This matches the redirect-specific logic in HttpCache::Transaction which does not cache redirect bodies. In addition, now that this signal exists at a higher level, remove that logic in HttpCache::Transaction. It is now the caller's job to decide which response bodies are and aren't truncated away. Fixup and add new tests for this behavior. BUG=292879 TEST=HttpCache.CachedRedirect, HttpCache.DoneReading, URLRequestJob.RedirectTransactionNotifiedWhenDone Review URL: https://chromiumcodereview.appspot.com/23710059 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224161 0039d316-1c4b-4281-b951-d872f2087c98
* Check for delegate before calling it's HasSendHeadersComplete method.rtenneti@chromium.org2013-09-191-1/+1
| | | | | | | | | | BUG=294870 R=rch@chromium.org NOTRY=true Review URL: https://chromiumcodereview.appspot.com/24210007 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224157 0039d316-1c4b-4281-b951-d872f2087c98
* SimpleCache: fix error in computation of crc32 for stream 0clamy@chromium.org2013-09-191-1/+1
| | | | | | | | | | | | | | | | | This CL fixes the following problem: 1) An EOF record for stream 0 is written to disk with no crc32. 2) The entry is opened, and the wrong crc32 (from the EOF records, that is invalid) is assigned as the computed value for stream 0. 3) Something is written to stream1 but not to stream 0 and the entry is closed. An EOF record needs to be written for stream 0, where the HAS_CRC32 flag is on, but which has the wrong value. 4) Next open will fail because of wrong value of crc32 for stream 0. BUG=173398 Review URL: https://chromiumcodereview.appspot.com/24251005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224138 0039d316-1c4b-4281-b951-d872f2087c98
* Simple Cache: transactional index in subdirectorypasko@chromium.org2013-09-1913-193/+718
| | | | | | | | | | This change also introduces a minimalistic infrastructure for upgrading cache on disk during browser startup. See simple_version_upgrade.h for more details. BUG=261618 Review URL: https://chromiumcodereview.appspot.com/22184002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224131 0039d316-1c4b-4281-b951-d872f2087c98
* Implement WebSocketExtensionParseryhirano@chromium.org2013-09-197-0/+449
| | | | | | | | | | | Implement WebSocketExtensionParser, which parses Sec-WebSocket-Extension header value as specified in RFC6455. BUG=280910 Review URL: https://chromiumcodereview.appspot.com/23872029 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224102 0039d316-1c4b-4281-b951-d872f2087c98
* Remove hard dependency on bundled python_26 in testsbratell@opera.com2013-09-192-11/+65
| | | | | | | | | | | | | | | | | | | | | | | | | | (solution suggested in https://codereview.chromium.org/16117004/ ) The hardcoded dependency on third_party/python_26 in some unit tests makes it necessary to bundle that python with the test binaries. On other platforms the system python is used and there is no reason Windows can't do the same if one is available. This saves us band-width (25 MB per test machine) when distributing tests. The change is implemented as a removal of the hard coded path in execution and instead it's inserted at the end of the PATH environment variable. That way it will still be used if there is no other python available but otherwise a system python will be used. There is a small risk that the system python is unsuitable but that is a risk we already take on non-Windows platforms. Another solution was discussed in https://codereview.chromium.org/16117004/ before this solution was suggested. Review URL: https://chromiumcodereview.appspot.com/21537002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224096 0039d316-1c4b-4281-b951-d872f2087c98
* Clean up GaiaUrls to actually return GURLs.mnissler@chromium.org2013-09-192-2/+15
| | | | | | | | | | | | | | It turns out that most consuming code can actually handle a GURL return value better. Other consumers can use GURL::Resolve() which provides nicer semantics for construction URLs that string concatenation, which had been used before. BUG=chromium:243889 R=akalin@chromium.org, bauerb@chromium.org, brettw@chromium.org, courage@chromium.org, isherman@chromium.org, rogerta@chromium.org, sail@chromium.org, sky@chromium.org, zelidrag@chromium.org Review URL: https://codereview.chromium.org/23691043 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224092 0039d316-1c4b-4281-b951-d872f2087c98
* Detect privet traffic before starting utility process.vitalybuka@chromium.org2013-09-194-17/+34
| | | | | | | | | | | Simple PrivetTrafficDetector listens mDns port for specific sub-string and starts notification only if privet-like traffic detected. This allows to avoid ruining additional process for users without such devices on network. BUG=292754 TBR=jln,jschuh Review URL: https://chromiumcodereview.appspot.com/23702043 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224052 0039d316-1c4b-4281-b951-d872f2087c98
* Fast-fail WPAD detection.ellyjones@chromium.org2013-09-197-7/+217
| | | | | | | | | | | | | | | | | | | | | | Right now, if there's no WPAD host on the local network, we have to wait up to two seconds for ProxyScriptDecider to time out, during which all requests are stalled waiting to find out what proxy to use. This is a pretty crappy experience when you have proxy autodetection turned on and no WPAD host. Therefore, add a new state to ProxyScriptDecider's state machine: "QuickCheck". When we're in this state, we are doing a DNS query only for WPAD, with a timeout of 1 second; if this query doesn't succeed, we abort the entire WPAD process. We also upload an UMA report saying how long the WPAD resolution took to succeed. In future, once we have a good idea how long WPAD requests usually actually take, we'll turn this timeout down, probably to something extremely low (from experiments, IE appears to use a timeout of 50ms). TEST=unit,trybot,manual BUG=chromium:161826 Review URL: https://chromiumcodereview.appspot.com/23181010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@224030 0039d316-1c4b-4281-b951-d872f2087c98
* Land Recent QUIC changes.rtenneti@chromium.org2013-09-1828-538/+1009
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Added a DCHECK that ProcessRawData will not be called with zero data length. Merge internal change: 52068687 Removed reinterpret_cast<QuicFecBuilderInterface*>. Minor comment fix. Merge internal change: 52051673 Replace QuicConnectionVisitorInterface::OnPacket with OnStreamFrames Merge internal change: 52049491 Remove unused OnAck method from QuicConnectionVisitorInterface. This is a bit of an abstraction violation, since nothing above the Connection knows about packets. The AckNotifier interface provides the "right" abstraction. Merge internal change: 52027657 Add state to session to indicate that a crypto stream is blocked, so that we can properly set the IS_HANDSHAKE argument when asking the congestion manager if we CanWrite(). Merge internal change: 51983405 Break out the tracking of sent packet from QuicConnection to a new QuicSentPacketManager class. Merge internal change: 51969314 Delay the RTO every time an ack is received, per TCP RTO spec. Merge internal change: 51954312 Sending ConnectionClose frames via the PacketGenerator so they get properly queued if they cannot be sent immediately. Prevents multiple different connection close packets from being sent, a potential infinite loop, and from dropping connection close packets which can't be sent due to a write block from being dropped entirely. Merge internal change: 51890780 Increse the default max_tcp_congestion_window to 100 from 50, now that the RTO has been increased to the TCP standard of 60 seconds. Merge internal change: 51854728 Added large (1 Mb) POST tests. Verified that without the fix from cl/51829697 these tests timeout due to receiver cwnd dropping to zero after sending ACKs. Merge internal change: 51854636 Refactored and replaced SendStreamAndNotifyWhenAck() to work with SendvStreamData(). Merge internal change: 51848330 Remove unused client2 scoped_ptrs from end_to_end_tests Merge internal change: 51835589 R=rch@chromium.org Review URL: https://chromiumcodereview.appspot.com/23691073 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223996 0039d316-1c4b-4281-b951-d872f2087c98
* SimpleCache: merge the first and second stream in one fileclamy@chromium.org2013-09-1811-246/+635
| | | | | | | | | | | This CL merges the two first streams in a single file in order to reduce the disk space consumption of the Simple Cache. BUG=173398 Review URL: https://chromiumcodereview.appspot.com/23983005 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223989 0039d316-1c4b-4281-b951-d872f2087c98
* Re-enable ipv6 support in QUIC.rch@chromium.org2013-09-181-10/+0
| | | | | | | | Revert 208041 Review URL: https://chromiumcodereview.appspot.com/18271006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223951 0039d316-1c4b-4281-b951-d872f2087c98
* POSIX only: Move client socket functionality from TCPClientSocket into ↵yzshen@chromium.org2013-09-1811-1252/+909
| | | | | | | | | | | | | TCPSocket. TCPClientSocket becomes a wrapper around TCPSocket to expose a client-only interface. BUG=262601 TEST=tcp_socket_unittest.cc Review URL: https://chromiumcodereview.appspot.com/23454010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223945 0039d316-1c4b-4281-b951-d872f2087c98
* Disable unittests that depends on OpenSSL when use_openssl==0robertn@opera.com2013-09-181-0/+3
| | | | | | | | | | | | These unittests include headers that includes openssl/ssl.h (sm_connection.h). For platforms that don't have access to OpenSSL this won't work. BUG=23724020 Review URL: https://chromiumcodereview.appspot.com/23724020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223893 0039d316-1c4b-4281-b951-d872f2087c98
* net: add (*.)saturngames.co.uk to HSTS preloaded.agl@chromium.org2013-09-182-0/+2
| | | | git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223891 0039d316-1c4b-4281-b951-d872f2087c98
* Land Recent QUIC changes.rtenneti@chromium.org2013-09-1859-334/+1058
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Pass HasRetransmittableData to the congestion manager and the send algorithm. This allows tcp_cubic_sender to not count ACK-only packets against the congestion window. Merge internal change: 51829697 If a previously zombie'd QUIC stream is closed and the headers have been decompressed, remove that entry from the zombie stream map. Merge internal change: 51697989 Change the value used to set the sequence number with to both correctly calculate the widest packet spread currently outstanding and fix a DCHECK failure in EndToEnd's Uber test when packets were transmitted sufficiently out of order that the packet being sent was less than the last packet the peer was awaiting. Merge internal change: 51644967 Fix a bug where frames are queued and not enough room for the next stream frame is available, but we attempt to create a STREAM frame anyway in ConsumeData. Merge internal change: 51604946 Changed Delayed Ack Timer to go off before the sender's retransmission timer goes off. Merge internal change: 51594956 Using the priorities sent by the client, including bounds checking, and bumping the priority of initial writes to avoid the HOL header blocking issue. Merge internal change: 51586426 Fix memory leak uncovered by https://codereview.chromium.org/23587004 Merge internal change: 51569066 Added logging of QUIC version negotiated. Export number of QUIC sessions and streams for each QUIC version. Merge internal change: 51540178 A refactor of QuicFdWrapper's writev to pass the iovec all the way to QuicConnection, allowing better packet packing. Merge internal change: 51530908 Enabled priorities in chrome quic streams. R=rch@chromium.org Review URL: https://chromiumcodereview.appspot.com/23597045 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@223880 0039d316-1c4b-4281-b951-d872f2087c98