summaryrefslogtreecommitdiffstats
path: root/net
Commit message (Collapse)AuthorAgeFilesLines
* Provide a wstring-free version of FormatUrl(), part 1.viettrungluu@chromium.org2010-08-253-0/+210
| | | | | | | | | | | | | I haven't converted the code yet -- the new version just calls the old (wstring) version and does conversions. But I converted the unit test, so that when I do convert the code I'll know it works correctly. BUG=23581 TEST=unit test Review URL: http://codereview.chromium.org/3152048 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57336 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 57333 - Add support for speaking SSL to an HTTP Proxy, todhollowa@chromium.org2010-08-2513-738/+104
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | HttpProxyClientSocketPool (and friends) Reverting due to heapcheck issues: http://build.chromium.org/buildbot/memory/builders/Linux%20Heapcheck/builds/7039/steps/heapcheck%20test:%20net/logs/stdio Suppression: { <insert_a_suppression_name_here> Heapcheck:Leak fun:RefCountedBase fun:RefCounted fun:TCPSocketParams fun:net::HttpStreamRequest::DoInitConnection fun:net::HttpStreamRequest::DoLoop fun:net::HttpStreamRequest::RunLoop fun:net::HttpStreamRequest::Start fun:net::HttpStreamFactory::RequestStream fun:net::HttpNetworkTransaction::DoInitStream fun:net::HttpNetworkTransaction::DoLoop fun:net::HttpNetworkTransaction::RestartIgnoringLastError fun:net::HttpNetworkTransactionTest_HTTPSBadCertificateViaHttpsProxy_Test::TestBody fun:testing::Test::Run fun:testing::internal::TestInfoImpl::Run fun:testing::TestCase::Run fun:testing::internal::UnitTestImpl::RunAllTests fun:testing::UnitTest::Run fun:base::TestSuite::Run fun:main fun:__libc_start_main } More information about an HTTPS Proxy can be found here: http://dev.chromium.org/spdy/spdy-proxy This implementation supports both http:// and https:// requests, as well as support for both Proxy and Server auth. BUG=29625 TEST=none Review URL: http://codereview.chromium.org/3110006 TBR=rch@chromium.org Review URL: http://codereview.chromium.org/3134034 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57335 0039d316-1c4b-4281-b951-d872f2087c98
* Add support for speaking SSL to an HTTP Proxy, torch@chromium.org2010-08-2513-104/+738
| | | | | | | | | | | | | | | | | | HttpProxyClientSocketPool (and friends) More information about an HTTPS Proxy can be found here: http://dev.chromium.org/spdy/spdy-proxy This implementation supports both http:// and https:// requests, as well as support for both Proxy and Server auth. BUG=29625 TEST=none Review URL: http://codereview.chromium.org/3110006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57333 0039d316-1c4b-4281-b951-d872f2087c98
* NSS: Add Snap Start supportagl@chromium.org2010-08-2510-15/+1299
| | | | | | | | | | | This patch adds NSS support for Snap Start, an experimental TLS extension for zero round trip handshakes. This change does not enable Snap Start. BUG=none TEST=External unittests (not in tree) git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57325 0039d316-1c4b-4281-b951-d872f2087c98
* Don't run URLRequestTest under ThreadSanitizer on Windowstimurrrr@chromium.org2010-08-251-0/+3
| | | | | | | | BUG=53304 TBR=glider Review URL: http://codereview.chromium.org/3122040 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57318 0039d316-1c4b-4281-b951-d872f2087c98
* Remove dead log entries for SPDY_TRANSACTION_*mbelshe@chromium.org2010-08-251-16/+0
| | | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3205003 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57300 0039d316-1c4b-4281-b951-d872f2087c98
* Refactor: change the spdy session pool key to take a ProxyServer instead of ↵eroman@chromium.org2010-08-2510-22/+109
| | | | | | | | | a string representation of the proxy server. BUG=52668 Review URL: http://codereview.chromium.org/3197018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57297 0039d316-1c4b-4281-b951-d872f2087c98
* Fix a crash where we are checking IsConnected(). If you look into the mbelshe@chromium.org2010-08-258-6/+326
| | | | | | | | | | | | | | | | | | | | | | | | | | implementation of IsConnected() on windows, you'll find that it can synchronously check if the socket is connected. This makes it so that a CHECK (or DCHECK) on this attribute is dependent on the peer. The peer could send us a TCP-FIN at any time - even 1 nanosecond before our call to IsConnected(). We can only use CHECK(!IsConnected()) to check before we connect, we simply can't use it at runtime. I searched the code and found 4 other instances of this broken check. Most were DCHECKs, which is good, but I've removed them just the same. Turns out our MockSockets have a mechanism for simulating this error, but it wasn't tested nor plumbed through the MockSSLClientSocket. In the process I added a couple of basic proxy test cases, which may be slightly redundant with other test cases that are more advanced. But they seem like a good idea to cover anyway. Added 6 tests in total. BUG=53099 TEST=ProxyTunnelGetHangup, RecycleDeadSSLSocket Review URL: http://codereview.chromium.org/3107036 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57295 0039d316-1c4b-4281-b951-d872f2087c98
* Cleanup: rename ProxyRules::socks_proxy --> ProxyRules::fallback_proxy.eroman@chromium.org2010-08-256-36/+44
| | | | | | | | BUG=None TEST=Compiles Review URL: http://codereview.chromium.org/3146029 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57294 0039d316-1c4b-4281-b951-d872f2087c98
* A/B experiment for re-establishing TCP connections.ziadh@chromium.org2010-08-255-25/+50
| | | | | | | | | | | | | We would like to test the impact of automatic retries when a TCP connection exceeds a certain threshold before it gets back an ACK. We are observing a fair number of sockets where the connection had been established, but the sockets were not used thereafter. r=mbelche Review URL: http://codereview.chromium.org/3191019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57276 0039d316-1c4b-4281-b951-d872f2087c98
* Make sure the key into the spdy session pool identifies the actual proxy ↵eroman@chromium.org2010-08-257-22/+77
| | | | | | | | | | used, and not the full list of possible proxies for the URL. BUG=52668 TEST=SpdyNetworkTransactionTest.DirectConnectProxyReconnect Review URL: http://codereview.chromium.org/3192011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57274 0039d316-1c4b-4281-b951-d872f2087c98
* Remove two CHECKs that were added to help track down the crashwtc@chromium.org2010-08-242-7/+2
| | | | | | | | | | | | | in http://crbug.com/49862. That crash no longer occurs. Fix cpplint.py nit: add a "// namespace" comment. R=vandebo BUG=49862 TEST=none Review URL: http://codereview.chromium.org/3165057 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57250 0039d316-1c4b-4281-b951-d872f2087c98
* When asserting that an event object is not signaled,wtc@chromium.org2010-08-241-6/+19
| | | | | | | | | | | | | pass important values (the return value of WaitForSingleObject and the error code) as function arguments so that they are available in crash dumps. R=eroman BUG=51950,52008 TEST=none Review URL: http://codereview.chromium.org/3107032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57247 0039d316-1c4b-4281-b951-d872f2087c98
* Fail rather than crash if username+password are unspecified for NTLM on ↵cbentzel@chromium.org2010-08-241-0/+5
| | | | | | | | | | | | | Linux+OSX. This will be yanked out, but is being used to triage a bug. BUG=50517 TEST=None Review URL: http://codereview.chromium.org/3150033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57211 0039d316-1c4b-4281-b951-d872f2087c98
* Http cache: Make sure that the memory used to receive thervargas@google.com2010-08-243-11/+22
| | | | | | | | | | | | | pointer of the backend is valid until the callback fires, even after the http cache is deleted. BUG=52387 TEST=net_unittests Review URL: http://codereview.chromium.org/3195017 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57210 0039d316-1c4b-4281-b951-d872f2087c98
* Heapcheck: Don't run net_unittests that simulate crashes.rvargas@google.com2010-08-241-0/+14
| | | | | | | | | | BUG=53141 TEST=none Review URL: http://codereview.chromium.org/3159035 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57209 0039d316-1c4b-4281-b951-d872f2087c98
* chromeos: 1st draft of ProxyConfigService for chromeoskuan@chromium.org2010-08-242-1/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | what this cl is: - a REALLY bare skeleton implementation of ProxyConfigService for chromeos (lots of design details remain to be worked out on the chromeos side, but i needed to get something basic up) - focused on getting chrome part correct, extracting design flow and implementation from linux variant that are relevant to chromeos, e.g.: - provide access of ProxyConfigService interface on IO thread - provide methods on UI thread for UI to read/modify proxy config (like linux's GConf notifications on UI thread) - fetch initial config on UI thread (this is not absolutely necessary for chromeos, 'cos i don't use GConf, but i just follow linux for now) - however, the class is RefCountedThreadSafe (so that both net::ProxyService and DOMUI can access it), and the code resides in chrome/browser/chromeos dir instead of net/proxy. - design details are in .h files - initial config is hardcoded as pac script and loaded as owner (TODO: load this from cros settings persisted on chromeos device) - this should work like the current chromeos session manager which sets the auto-proxy environment variable in login script to the same pac script - implement an augmented analogue to net::ProxyConfig to hold actual proxy config and UI settings (e.g. source and readonly attributes) - backend uses this as the main proxy config, and only converts it to net:::ProxyConfig for network stack on the IO thread in net::ProxyService::GetLatestProxyConfig. - UI methods also use this structure - provide methods to get and set configs from UI thread - UI can use dom_ui->GetProfile()->GetChromeOSProxyConfigServiceImpl() to access these methods on the UI thread - these methods are by no means final - i only added them here to verify the design flow that modifications can be made from UI thread and picked up by IO thread. - david and i will improve or modify them to whatever works best for frontend and backend. - unittest that tests most functionalities: socks and bypass_rules will be enabled in a later cl. TODOs after this cl: - work with UI, load initial config as owner from cros settings - implement policy mechanism, merge it with owner during initial load and modifications - persist proxy settings - etc etc etc BUG=chromium-os:5127 TEST=nothing yet. Review URL: http://codereview.chromium.org/3047052 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57204 0039d316-1c4b-4281-b951-d872f2087c98
* Actually allow recursive=true to be set in net::DirectoryListerjohnnyg@chromium.org2010-08-241-1/+1
| | | | | | | | | BUG=41762 TEST=none Review URL: http://codereview.chromium.org/3165055 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57202 0039d316-1c4b-4281-b951-d872f2087c98
* Adds HostResolveImpl Requests and Jobs to log.mmenke@chromium.org2010-08-2418-99/+370
| | | | | | | | | | | | | | | Differences over the reverted version (http://codereview.chromium.org/3080034/show - reverted http://codereview.chromium.org/3137022/show ): * Jobs never log anything in their destructor, as the HostResolverImpl randomly outlives the NetLog, at least in some unit tests. * Removed the extra log entries for when a DNS lookup starts/completes. Instead, the job's event is ended in OnLookupComplete(). * Slight modification of the CanceledAsynchronousLookup unit test, as the Job is now closed before posting any events to the Request. For actual lookups, this behavior means the Job's duration more accurately reflects the time the DNS lookup takes itself. BUG=46844 TEST=Look at the net-internals screen. Review URL: http://codereview.chromium.org/3119027 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57189 0039d316-1c4b-4281-b951-d872f2087c98
* Revert 57100 - Only create the backup ConnectJob when it is needed.thestig@chromium.org2010-08-232-215/+188
| | | | | | | | | | | | | | This reduces the unnecessary NetLog spam, since we would log to the NetLog everytime we created the backup ConnectJob, even though we usually wouldn't actually call Connect() on it. Now, we only create the backup ConnectJob when we intend to call Connect() on it. Includes some various cleanup necessary for this: * struct Group => class Group * method_factory moves from CSP to Group Review URL: http://codereview.chromium.org/3171017 TBR=willchan@chromium.org Review URL: http://codereview.chromium.org/3198009 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57107 0039d316-1c4b-4281-b951-d872f2087c98
* Only create the backup ConnectJob when it is needed.willchan@chromium.org2010-08-232-188/+215
| | | | | | | | | | | This reduces the unnecessary NetLog spam, since we would log to the NetLog everytime we created the backup ConnectJob, even though we usually wouldn't actually call Connect() on it. Now, we only create the backup ConnectJob when we intend to call Connect() on it. Includes some various cleanup necessary for this: * struct Group => class Group * method_factory moves from CSP to Group Review URL: http://codereview.chromium.org/3171017 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57100 0039d316-1c4b-4281-b951-d872f2087c98
* Disk cache: Extend the internal buffering performed by each entryrvargas@google.com2010-08-2311-543/+1079
| | | | | | | | | | | | | | | | | | | | | | to cover external files. We now keep a variable-size buffer and use it even after we know that the data is not going to be stored by a block-file. The backend keeps track of the total memory used by all entries and prevents that value from going over a max value that depends on the total memory available. This CL removes the tests that were checking the synchronous operation of sparse IO because that model is no longer supported by the public API, and this CL would add complexity to them (they fail due to thread safety concerns). BUG=6626 TEST=net_unittests Review URL: http://codereview.chromium.org/3167020 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57082 0039d316-1c4b-4281-b951-d872f2087c98
* --auth-schemes specifies which authentication schemes are supported on the ↵cbentzel@chromium.org2010-08-232-0/+71
| | | | | | | | | | | | | | | command line. --auth-schemes should be a command separated list containing one or more of the following schemes: basic, digest, ntlm, or negotiate. This will primarily be used to help triage user-reported bugs. BUG=None TEST=specify --auth-schemes and ensure that only the specified schemes are supported. Also, when unspecified all schemes should be supported. Review URL: http://codereview.chromium.org/3199002 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57073 0039d316-1c4b-4281-b951-d872f2087c98
* Address post-review comments on r56727.agl@chromium.org2010-08-232-13/+14
| | | | | | | | | BUG=none TEST=none http://codereview.chromium.org/3107030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57059 0039d316-1c4b-4281-b951-d872f2087c98
* Missed a file from last checkin. histograms_recorded member variable ismbelshe@chromium.org2010-08-231-1/+0
| | | | | | | | | | | no longer needed. (I thought we had a warning for that?) BUG=none TEST=none Review URL: http://codereview.chromium.org/3199013 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57056 0039d316-1c4b-4281-b951-d872f2087c98
* Fix bug where pushed SPDY streams were never actually closed.mbelshe@chromium.org2010-08-235-137/+271
| | | | | | | | | | | | | | | | | | | | | | | | The fix uncovers a few things. Previously, when we had an unclaimed push stream, we'd leave it as an "active" stream, even if the EOF had already been received on that stream. I changed it so that the push stream is removed from the active stream as soon as it is inactive, but it remains on the unclaimed_pushed_streams list. This seems more correct. The hardest part of the test was getting the test to verify the fix. To verify the fix, I modified the Push tests so that we leave the session open (e.g. terminate the list of reads with an ERR_IO_PENDING rather than an EOF so that it sits open), which gives us the opportunity to check if there are active streams left on the session when we completed the test. If so, then we'll pop an error. BUG=52898 TEST=Updated existing tests. Review URL: http://codereview.chromium.org/3108038 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57023 0039d316-1c4b-4281-b951-d872f2087c98
* Add option to simulate alternate protocol always being present.mbelshe@chromium.org2010-08-224-3/+84
| | | | | | | | | | | | | | | It's a bit hardcoded (port 443, NPN/SPDY2), but it is just for testing purposes. To use this mode, run chrome with: chrome.exe --use-spdy=npn,force-alt-protocols BUG=none TEST=http_alternate_protocols_unittest.cc Review URL: http://codereview.chromium.org/3195015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57022 0039d316-1c4b-4281-b951-d872f2087c98
* Whitespace change to trigger the bots.viettrungluu@chromium.org2010-08-221-2/+2
| | | | | | | | | BUG=none TEST=none Review URL: http://codereview.chromium.org/3191018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57009 0039d316-1c4b-4281-b951-d872f2087c98
* Allow net::DirectoryLister to be used to recursively list the directory, and ↵johnnyg@chromium.org2010-08-215-60/+151
| | | | | | | | | | | add a FULL_PATH sort option. BUG=41762 TEST=unit test Review URL: http://codereview.chromium.org/3175023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57005 0039d316-1c4b-4281-b951-d872f2087c98
* Change EXPECT_ to ASSERT_ for X.509 tests where it will crash if the check failsrsleevi@chromium.org2010-08-211-9/+9
| | | | | | | | | | | Some of the X.509 parsing tests rely on a certain number of principals being returned, and will crash otherwise. Change the checks to be ASSERT_, so that the test fails gracefully rather than bringing down net_unittests BUG=none TEST=X509CertificateTest.* Review URL: http://codereview.chromium.org/3142016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57004 0039d316-1c4b-4281-b951-d872f2087c98
* Remove obviously unneeded forward declarations from headers under ↵viettrungluu@chromium.org2010-08-2124-56/+7
| | | | | | | | | | | src/{app,base,net}. BUG=none TEST=builds Review URL: http://codereview.chromium.org/3136025 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56995 0039d316-1c4b-4281-b951-d872f2087c98
* Reintegrate certificate selection in HttpNetworkTransaction DoLoopdavidben@chromium.org2010-08-213-6/+74
| | | | | | | | | | | | | | | | | | | | | The HttpNetworkTransaction refactor intercepts the client auth handling and moves it out of DoLoop. Because HandleCertificateRequest often switches states, this caused a DCHECK and crash in some circumstances. This reintegrates it and adds unit tests to catch the DCHECK. We really want to test sending a legitimate certificate, as well as more checking interesting errors, but we cannot import temporary keys yet. We also add a patch for tlslite to send a non-empty certificate_types. Apple's SSL implementation raises a protocol error otherwise. BUG=52744,51132,52778 TEST=SSLClientSocketTest.ConnectClientAuth*,URLRequestTest.ClientAuthTest Review URL: http://codereview.chromium.org/3141026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56983 0039d316-1c4b-4281-b951-d872f2087c98
* Improve support for requesting client certs in tlslitersleevi@chromium.org2010-08-211-4/+21
| | | | | | | | | | | Currently, tlslite only supports the caller passing in a list of CAs pre-encoded for the TLS CertificateRequest message. This CL improves that, by providing a means of extracting the DER-encoded subject name from an X509 certificate, supplying a list of such names to tlslite's server routines, and having tlslite encode the list of CAs as part of the CertificateRequest. BUG=47656, 47658 TEST=net_unittests Review URL: http://codereview.chromium.org/3177015 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56982 0039d316-1c4b-4281-b951-d872f2087c98
* Add a feature to the HostResolverRules to be able to match rules onlymbelshe@chromium.org2010-08-212-2/+42
| | | | | | | | | | | | | | | for a specific port. This allows me to alter resolutions for certain ports like send :80 lookups to one location and :443 lookups to a different location. This enables me to mock out support for AlternateProtocol. BUG=none TEST=HostMappingRulesTest.PortSpecificMatching Review URL: http://codereview.chromium.org/3177026 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56970 0039d316-1c4b-4281-b951-d872f2087c98
* HTTP cache: Move DeleteCacheCompletionCallback to the anonymous namespacervargas@google.com2010-08-211-14/+14
| | | | | | | | | | | | | to see if that makes mac release happy. BUG=none TEST=none TBR=eroman Review URL: http://codereview.chromium.org/3167032 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56969 0039d316-1c4b-4281-b951-d872f2087c98
* Http cache: It turns out that the cache destructorrvargas@google.com2010-08-212-17/+90
| | | | | | | | | | | | | | | may be called from within one of the notifications of "backend construction done". This CL makes sure that this scenario is handled properly by invoking the callbacks one at a time, posting a task before moving on to the next one. BUG=52090 TEST=netunittests Review URL: http://codereview.chromium.org/3173030 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56964 0039d316-1c4b-4281-b951-d872f2087c98
* x509_certificate_nss: remove unused ScopedCERTCertificate and ScopedCERTCertListmattm@chromium.org2010-08-211-32/+0
| | | | | | | | | BUG=none TEST=builds Review URL: http://codereview.chromium.org/3134022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56954 0039d316-1c4b-4281-b951-d872f2087c98
* NSS cert database cleanupsmattm@chromium.org2010-08-202-50/+48
| | | | | | | | | | | | | | Use ScopedPK11Slot. Move common test functionality into functions. Move common test conditions into SetUp/TearDown. Move common test variables into attributes of the test class. BUG=19991 TEST=tests still pass Review URL: http://codereview.chromium.org/3189014 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56801 0039d316-1c4b-4281-b951-d872f2087c98
* Move nsNSSCertTrust from chrome/third_party to net/third_party.mattm@chromium.org2010-08-203-0/+499
| | | | | | | | | BUG=19991 TEST=builds Review URL: http://codereview.chromium.org/3104022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56799 0039d316-1c4b-4281-b951-d872f2087c98
* Give keys friendly names in NSS and OS Xdavidben@chromium.org2010-08-196-10/+65
| | | | | | | | | | | | | | | | This will make them browsing them easier in Keychain Access and certutil. It also gives them a more useful name in Keychain permission dialogs. The friendly name is currently just the hostname which requested the key. It would be nice to have some surrounding text with localization, but this works for now. BUG=none TEST=none Review URL: http://codereview.chromium.org/2806045 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56774 0039d316-1c4b-4281-b951-d872f2087c98
* Convert FormatBytes to string16.evan@chromium.org2010-08-191-1/+2
| | | | | | | | | | I considered ASCII, but it's producing what is intended to be a human-readable string. For example, in theory the "bytes/s" annotation could be localized into a language where the "b" is non-ASCII. Review URL: http://codereview.chromium.org/3107021 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56771 0039d316-1c4b-4281-b951-d872f2087c98
* GTTF: Remove TryKillingOldServer from testserver.py, it's broken.phajdan.jr@chromium.org2010-08-191-14/+0
| | | | | | | | | | | | | | | Sometimes TryKillingOldServer fails with an exception we don't catch, which is even worse because then the new server fails to start. We should rely on the C++ code to kill the server in a reliable way, rather than this Python hack. TEST=net_unittests, unit_tests, ui_tests, ... BUG=52644 Review URL: http://codereview.chromium.org/3110025 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56736 0039d316-1c4b-4281-b951-d872f2087c98
* net: expect MITM attacks with HTTP proxies and command line flag.agl@chromium.org2010-08-197-8/+44
| | | | | | | | | | | | | | | | | With r51258 we started requiring the TLS renegotiation extension from a whitelist of servers that we knew supported it. When Chrome is getting MITM attacked, this extension can be removed and this broke some debugging tools (which intercept SSL connections) and some proxies which do the same. This patch causes us to expect to be MITM attacked when tunneling via an HTTP proxy and when the --allow-ssl-mitm-proxies command line flag is given. BUG=48485 TEST=Can't really test without one of these MITM proxy machines. http://codereview.chromium.org/3111019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56727 0039d316-1c4b-4281-b951-d872f2087c98
* Remove forward declares for ASCIIToUTF16 from string_util. All callers now usebrettw@chromium.org2010-08-192-0/+2
| | | | | | | | | | utf_string_conversions.h TEST=it compiles BUG=none Review URL: http://codereview.chromium.org/3148019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56719 0039d316-1c4b-4281-b951-d872f2087c98
* Make sure we flush ssl pool when CloseCurrentConnections is called.lzheng@chromium.org2010-08-191-0/+1
| | | | | | | | | BUG=none TEST=none (this is a method for testing/debugging) Review URL: http://codereview.chromium.org/3171016 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56698 0039d316-1c4b-4281-b951-d872f2087c98
* SpdySessionPool closes down sessions accurately now.erikchen@google.com2010-08-196-33/+53
| | | | | | | | | | This may or may not fix 50265. Regardless, the previous behavior was incorrect. TEST=none BUG=none Review URL: http://codereview.chromium.org/3150023 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56696 0039d316-1c4b-4281-b951-d872f2087c98
* Don't run some more HttpNetworkTransactionTest under ThreadSanitizertimurrrr@chromium.org2010-08-193-8/+6
| | | | | | | | BUG=51145 TBR=glider Review URL: http://codereview.chromium.org/3174018 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56678 0039d316-1c4b-4281-b951-d872f2087c98
* Don't run ↵timurrrr@chromium.org2010-08-191-0/+4
| | | | | | | | | | HttpNetworkTransactionTest.UseAlternateProtocolForNpnSpdyWithExistingSpdySession under ThreadSanitizer on Windows TBR=glider BUG=52699 Review URL: http://codereview.chromium.org/3126019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56658 0039d316-1c4b-4281-b951-d872f2087c98
* FBTF: Remove unnecessary STL #includes from src/net.viettrungluu@chromium.org2010-08-1929-59/+16
| | | | | | | | | | | | This removes obviously unneeded inclusions of <map>, <set>, <string>, <vector>, etc. from src/net. BUG=none TEST=builds Review URL: http://codereview.chromium.org/3132022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56654 0039d316-1c4b-4281-b951-d872f2087c98
* A WebKit layout test failed with the HttpNetworkTransaction refactoring.mbelshe@chromium.org2010-08-191-1/+6
| | | | | | | | | | | | | | | The problem is that upload progress continues after the socket has been returned to the pool, but because we had zeroed out the stream, we could no longer report a value. (We'd go from 100% done, to 0 progress because GetUploadProgress() would return 0) BUG=none TEST=none TBR=vandebo@chromium.org Review URL: http://codereview.chromium.org/3189011 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@56650 0039d316-1c4b-4281-b951-d872f2087c98