1. 17 Mar, 2017 1 commit
  2. 06 Apr, 2016 1 commit
  3. 22 Dec, 2015 1 commit
  4. 18 Dec, 2015 2 commits
  5. 20 Jul, 2015 1 commit
    • sergeyu's avatar
      Add P2PDatagramSocket and P2PStreamSocket interfaces. · aa22c085
      sergeyu authored
      Previously remoting code was using net::Socket and net::StreamSocket
      for datagram and stream socket. Problem is that net::StreamSocket
      interface contains a lot of methods that are not relevant for
      peer-to-peer connections in remoting. Added P2PDatagramSocket and
      P2PStreamSocket interfaces independent of net::Socket. This allowed to
      remove a lot of the redundant code needed for net::StreamSocket
      implementations. There are two new adapters required in
      SslHmacChannelAuthenticator for the SSL layer, but these won't be
      necessary after we migrate to QUIC.
      
      Review URL: https://codereview.chromium.org/1197853003
      
      Cr-Commit-Position: refs/heads/master@{#339489}
      aa22c085
  6. 15 May, 2015 1 commit
    • ttuttle's avatar
      Collect all ConnectionAttempts from both sockets in TransportConnectJob. · 23fdb7b4
      ttuttle authored
      Before, the TransportConnectJob simply inferred that, if the main socket
      failed to connect, the address it was using was the last address in the
      list. With this change, the TCPClientSocket actually tracks all of the
      connection attempts made (as it tries each address in the list), and the
      TransportConnectJob copies the attempts from both the main and fallback
      sockets and records all of them in the ClientSocketHandle in
      GetAdditionalErrorState.
      
      BUG=480565
      TBR=jam
      
      Review URL: https://codereview.chromium.org/1096203006
      
      Cr-Commit-Position: refs/heads/master@{#330012}
      23fdb7b4
  7. 24 Apr, 2015 1 commit
    • davidben's avatar
      Pass in a non-null CertVerifier into SSLClientSocket. · 9bbf3290
      davidben authored
      SslHmacChannelAuthenticator passes in a null one which crashes but the
      IsAllowedBadCert check, as well as inconsistent ability to use X509Certificate
      in the sandbox masks the issue most of the time.
      
      This also fixes FakeStreamSocket to propogate disconnects to the peer, which is
      needed to add a test for this case. (If SSLClientSocket doesn't like a
      certificate, it just ceremoniously disconnects the connection right after the
      handshake.) This test crashed before this CL outside the sandbox. (Inside the
      sandbox, it's possible that it worked on some platforms due to the sandbox
      breaking net::X509Certificate. I didn't do a survey.)
      
      BUG=none
      
      Review URL: https://codereview.chromium.org/1080593003
      
      Cr-Commit-Position: refs/heads/master@{#326886}
      9bbf3290
  8. 21 Oct, 2014 1 commit
  9. 08 Oct, 2014 1 commit
  10. 23 Sep, 2014 1 commit