• Home
  • History
  • Annotate
  • only in /frameworks/base/core/java/android/net/http/
History log of /frameworks/base/core/java/android/net/http/
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
992f238d13fff7c21b60ef6958784a4ed2156784 26-Sep-2012 Brian Carlstrom <bdc@google.com> Reverting public setSoWriteTimeout

This reverts fd901f735c858af8ec8884b2e7ab71a46a9639e6 and 5e21bf934b2a71b595deb9856a2044eea4dbce86

Bug: 7237764
Bug: 6693087
Change-Id: I7cc9657e4df219481eb33de803081a01b13ee0f2
ndroidHttpClient.java
fd901f735c858af8ec8884b2e7ab71a46a9639e6 26-Sep-2012 Alon Albert <aalbert@google.com> Add a static generator that takes a Socket Write Timeout Argumanet

Use it from AndroidHttpClient

Bug: 6693087
Change-Id: I08648e441a6431d0944caaec0db516a26671f2a5
ndroidHttpClient.java
8071124375e336b98de45b44b9884c92cdfd9bd8 19-Sep-2012 Andy Stadler <stadler@google.com> Move X509TrustManagerExtensions to correct directory

Also removed unused imports.

Original Change-Id: If117ffd2240a7bf3437115f3cf2f766c4e249600

Change-Id: I66886ee9792c23a1e421022fd1f675fdf35ea049
509TrustManagerExtensions.java
f743e54f2d761c742d99ac868705818616dcf74f 15-Sep-2012 Geremy Condra <gcondra@google.com> Change verifyServerDomainAndCertificates to pass in a hostname.

This is required for cert pinning.

Change-Id: I16041f17e97d9ae592a2b809f6a8164268338d1b
ertificateChainValidator.java
f76a50ce8fdc6aea22cabc77b2977a1a15a79630 09-Mar-2012 Ken Wakasa <kwakasa@google.com> Fix obvious typos under frameworks/base/core

Change-Id: Ia5fc3db1bb51824e7523885553be926bcc42d736
slError.java
866666071bc49bd0c4fcd1776c9d9036d4e29fec 08-Mar-2012 Brian Carlstrom <bdc@google.com> Tracking changes to SSLParametersImpl.getDefaultTrustManager()

Change-Id: I0bcf2bbcd2581f6b66e08d1c6f0de24bf8d34199
ertificateChainValidator.java
93ba4fedebb78ba47c24e8472c8960ea8fdc933a 14-Feb-2012 Selim Gurun <sgurun@google.com> Act on credential storage updates.

Bug: 6009802

Cherry pick fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1
Listen to credential storage updates and clean state when necessary.

Change-Id: I2c63e6771e9373da8b39781fdcf3d21583c4e3b2
ertificateChainValidator.java
d8d6afdc068e8aa31fddd06f5946311d2b961026 16-Feb-2012 Selim Gurun <sgurun@google.com> Merge "Revert "Act on credential storage updates.""
43e41580e4c700e970cc5e62180a767ab424da6d 16-Feb-2012 Selim Gurun <sgurun@google.com> Revert "Act on credential storage updates."

This reverts commit fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1
ertificateChainValidator.java
e83b83fe20aa89f9bf730bb07006890f6c65e89c 16-Feb-2012 Selim Gurun <sgurun@google.com> Merge "Act on credential storage updates."
18c227ba72406c0b69ce9925a80113060d870256 15-Feb-2012 Jesse Wilson <jessewilson@google.com> Implement the (hidden) ExtendedResponseCache interface.

Bug: http://code.google.com/p/android/issues/detail?id=25418
Change-Id: I4b20d576bac7036f94e57db7124de44f5b8d75be
ttpResponseCache.java
fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1 14-Feb-2012 Selim Gurun <sgurun@google.com> Act on credential storage updates.

Bug: 6009802

Listen to credential storage updates and clean state when necessary.

Change-Id: I48f2e7d6e036882c2b4a29fbd357ca018fd4e4c7
ertificateChainValidator.java
52cd299eef703030f8fcf7a92f413791301771cc 27-Dec-2011 Jesse Wilson <jessewilson@google.com> Move the frameworks/base hostname verifier into libcore. Part 2/2

Bug: http://b/5619726
Change-Id: I165eb3befcef104ff56ffb466c87c60b632f3194
ertificateChainValidator.java
8543b5480d9c261e72965f64a7bc918eb183ea25 15-Dec-2011 Jesse Wilson <jessewilson@google.com> Give a reflection example for installing the HTTP response cache.

From the Android developers blog,
http://android-developers.blogspot.com/2011/09/androids-http-clients.html

Change-Id: Iff0a06fb7b0b8c085b9f16e85b30db44c889235e
ttpResponseCache.java
518f72ca38f4a5e1dfcfade6b40e4fd082dd9fd8 05-Oct-2011 Steve Block <steveblock@google.com> Fix SslError.getPrimaryError() to return -1 if the set of errors is empty

Also fix a couple of buggy asserts.

Bug: 5416594
Change-Id: I0e7e2548886af5fc0b8c20f70a3040d2c5bc68ea
slError.java
fa03f9a3460a695337231df3195271060a1b4a06 05-Oct-2011 Steve Block <steveblock@google.com> Fix BrowserFrame to construct SslError using the full URL, rather than the host

https://android-git.corp.google.com/g/#/c/133348 changed BrowserFrame to
construct the SslError using only the host. This was done so that we match on
just the host component of the URL when re-using previous decisions in case of
an SSL error. It also means that the browser displays only the host when it
shows the SSL error dialog.

This change fixes BrowserFrame to pass the full URL to SslError. We modify
SslCertLookupTable to keep the existing behaviour regarding matching on only the
host component. There's no need to change Browser to continue displaying only
the host as I think this change was an unintentional side-effect.

Also remove dead code-path in BrowserFrame.reportSslCertError(). This
method is used only with the Chromium HTTP stack. This code was added
in https://android-git.corp.google.com/g/#/c/121023.

No functional change.

Bug: 5410252
Change-Id: Ief2dbf4558095fb6fa7ab0caac7d37fa4f640b66
slError.java
9e334dbc308da119c7902a4badd2424adc5e9fb9 03-Oct-2011 Steve Block <steveblock@google.com> Clean up SslError

- Don't use runtime exceptions for programming errors
- Avoid code duplication
- Tweak JavaDoc for public API

Bug: 5248376
Change-Id: I5a88e5d444094efd44cce323e92f279840cf857f
slError.java
1abd5b3e6f11ef9d7076685c56ef942fa0dd77e4 12-Jul-2011 Kristian Monsen <kristianm@google.com> Part of fix for bug 4997380: Some error types unknown to SslError

Mapping chromium error codes from net/base/net_error_list.h to
SslError codes.

Change-Id: Ie4f98974e23969c3b5ae1f8c4413772cf93603b9
slError.java
7b91b31e28097b468db4cc2c6ac1a8e4064d8027 13-Jul-2011 Elliott Hughes <enh@google.com> Fix typo in AndroidHttpClient JavaDoc.

Bug: http://code.google.com/p/android/issues/detail?id=14788
Change-Id: I7465c6c42e7b208efc9c954ac46c1b683676106e
ndroidHttpClient.java
4a06281052e42c09062050abd7fa3de3249c088c 06-Jul-2011 Brian Carlstrom <bdc@google.com> Adding additional details to ssl_certificate view

Change-Id: I3da80988b749fe60174c3c8df856d714ede518ba
slCertificate.java
5bb9b19c5a3f3cf292f812ff5b9f9b8bcc88e5af 28-Jun-2011 Huahui Wu <hwu@google.com> 2nd try: Gets the URL that has a cert error and carrys it in SslError.

Identical to https://android-git.corp.google.com/g/#change,117828
which was reverted since its collaborative CL broke the build.

Change-Id: I5fa7d3e9b6026639bf72530ff5b449e36f802914
slError.java
899639dd44a9bedc807be6b712c35e7300e01026 28-Jun-2011 Huahui Wu <hwu@google.com> Merge "Revert "Gets the URL that has a cert error and carrys it in SslError.""
2e029c67a8e893e91600df989bbb42272d82af21 28-Jun-2011 Huahui Wu <hwu@google.com> Revert "Gets the URL that has a cert error and carrys it in SslError."

This reverts commit 3015516a4611db23ce56ae057d281c9328cfdf24.
slError.java
fa487ca830cb150be5822d8d73c3d832672f7108 28-Jun-2011 Huahui Wu <hwu@google.com> Merge "Gets the URL that has a cert error and carrys it in SslError."
3015516a4611db23ce56ae057d281c9328cfdf24 27-Jun-2011 Huahui Wu <hwu@google.com> Gets the URL that has a cert error and carrys it in SslError.

b/2689122 SSL error shows the wrong page when triggered by an image/javascript in the page.
This change receives the URL which has a cert error from webkit and carrys it in SslError.
so the Browser app can show the URL in the dialog boxes. Related CLs are:
webkit: https://android-git.corp.google.com/g/#change,117817
browser: https://android-git.corp.google.com/g/#change,117835

Change-Id: I65c3f038a48b6386fa93cb25a9ef70dbfb982c18
slError.java
6da00334478df64921b68fcbb45c9d1eef6f35bd 27-Jun-2011 Brian Carlstrom <bdc@google.com> Moving ssl_certificate layout, resources, and helper code to SslCertificate
Add IKeyChainService.deleteCaCertificate

Change-Id: If42341bc732efcfe4f958c00cdd6c0fec11a3c75
slCertificate.java
98e8b19c7bc422600a7a27819311d0059b5af2da 24-Jun-2011 Jesse Wilson <jessewilson@google.com> Warn about the lack of access controls for SD card HTTP caches.

Change-Id: I54adc2f9b57964e15a0fc26b719729e6087b1bda
http://b/4772280
ttpResponseCache.java
a7284f0e72745d66155e1e282fc07113332790fa 27-May-2011 Brian Carlstrom <bdc@google.com> Tracking merge of dalvik-dev to master

Adapt to change in the way MockWebServer sets up CONNECT proxies.
git cherry-pick --no-commit c7e2feee5e7908a019a0de91123c1feb9bdc38bc

React to move of Base64 in libcore
git cherry-pick --no-commit 119f7ebdd1f8df3a8ff8e3b8056bff725d569253

Expose and document android.net.HttpResponseCache.
git cherry-pick --no-commit 7b73f0fdb8c032a65c55610541d66385bd8bcbe6)

make update-api

Change-Id: Ieb48b304ea38ee8c2ec01e860d99b1404583889e
ttpResponseCache.java
43a17654cf4bfe7f1ec22bd8b7b32daccdf27c09 07-Apr-2011 Joe Onorato <joeo@google.com> Remove the deprecated things from Config.java. These haven't been working since before 1.0.

Change-Id: Ic2e8fa68797ea9d486f4117f3d82c98233cdab1e
eaders.java
ttpLog.java
79ae37086b277765001a0d2da3fd058e9fa73abf 05-Feb-2011 Lorenzo Colitti <lorenzo@google.com> Fix IPv6->IPv4 fallback for HTTPS.

Bug: http://code.google.com/p/android/issues/detail?id=8113

Change-Id: If49f4f2f8c676badbe0c44a138f4756bd8a9ac08
ttpsConnection.java
cc687c52a0313b3b42d2960c8ca669cf1d94aae8 16-Feb-2011 Brian Carlstrom <bdc@google.com> Deprecate non-X509Certificate SslCertificate constructors

Change-Id: I45541c48b321fbd6054712c08d8ac64108d32674
slCertificate.java
929a1c219248b62778807cac8ea256c7ac0fda6a 02-Feb-2011 Brian Carlstrom <bdc@google.com> Removing android.security.MessageDigest

Bug: 3392028
Change-Id: I6b9732da17d086ba00c846c3ad1c7fb39baf9502
ertificateValidatorCache.java
equestHandle.java
4140faeebbfa23d56068c1862b2913fb62145f4f 25-Jan-2011 Brian Carlstrom <bdc@google.com> Tracking jarjar of org.bouncycastle to com.android.org.bouncycastle

Bug: 3086427
Change-Id: I7af99fe4c36d9a519777f0499ccab65646313879
slCertificate.java
4887804ea619dd98ccb52a1cd911d23c74b4b457 29-Dec-2010 Jean-Baptiste Queru <jbq@google.com> am a6ac0ec3: am 69ebb984: Merge "according to rfc2617, nc-value = 8LHEX"

* commit 'a6ac0ec30dfdacb7baba126b5cea69fc7097496e':
according to rfc2617, nc-value = 8LHEX
b19c9c39949eef293dd3a271ec88d28c3ff62044 25-Dec-2010 Bin Jin <bjin1990@gmail.com> according to rfc2617, nc-value = 8LHEX

Change-Id: I8646fd8d68cfa4786ee6fc24a757b2af93955c4b
equestHandle.java
4c240a2cd16962016b81081777d5b15c573fa59c 07-Dec-2010 Jean-Baptiste Queru <jbq@google.com> am 465e88eb: am 1ee2394e: am 1d67fa5b: Merge "Changing connect and response timeout."

* commit '465e88eb008408d4e655ca7bdd9c2b3ac305e54b':
Changing connect and response timeout.
1ee2394edd4b90111f8174862c7c0f435e1a3634 06-Dec-2010 Jean-Baptiste Queru <jbq@google.com> am 1d67fa5b: Merge "Changing connect and response timeout."

* commit '1d67fa5b110a1df21e408d450394fb62d5dc9a1e':
Changing connect and response timeout.
d39fd5a97c6f56794a6ed7ac1dfb0bbf585becf1 18-Nov-2010 Henrik Baard <henrik.baard@sonyericsson.com> Changing connect and response timeout.

In bad network conditions and where switches often occur between 2G and
3G the timeout of 20s is too short.

Setting this timeout to 60 seconds will improve functionality in bad conditions
while it will not affect functionality in good networks. This change also aligns
the timeouts with the timeouts used by the Browser (Connection.java).

Change-Id: I0fbe3cbfe734f8d55a41bfa5d8ab6b332a19f912
ndroidHttpClient.java
83d4a23c280bdcaf6c301651b76ddc6fbf08949c 12-Nov-2010 Iain Merrick <husky@google.com> Provide default error strings in BrowserFrame.onReceivedError().

This method is called from both the Android and Chrome HTTP stacks.
We want the same user-facing behaviour in each case, but the Chrome
code does not have easy access to the same error message strings.

Therefore, I'll have the Chrome HTTP stack provide empty strings
for the descriptions. (See change I9042a2ee in external/webkit).

This CL makes BrowserFrame check for empty or null strings and use
the standard error messages instead.

The strings were package-private, so I did a little cleaning up
to make them public (but still hidden from the API). Using a switch
statement instead of an array because it's more robust and should
be comparably efficient.

Bug: 3172265
Test: Load http://google.com:81 to force a timeout error, check
that the correct message is displayed.

Change-Id: I7dec8dffe8ad9e513fdb90877e0b466e707174a8
onnection.java
rrorStrings.java
ventHandler.java
06d8dfd5d1088f20d899b67b20df2cd741990679 09-Nov-2010 Huahui Wu <hwu@google.com> Merge "b/2864818 use authType for cert verification."
762b33f9494ba48aa1be3701d345b692e8432af9 09-Nov-2010 Jesse Wilson <jessewilson@google.com> am 2d2f10fa: am 28c74257: Add @Deprecated to match @deprecated where it\'s missing.

* commit '2d2f10fa3412adc07a08c25ba5d2df600fb654bf':
Add @Deprecated to match @deprecated where it's missing.
2d2f10fa3412adc07a08c25ba5d2df600fb654bf 09-Nov-2010 Jesse Wilson <jessewilson@google.com> am 28c74257: Add @Deprecated to match @deprecated where it\'s missing.

* commit '28c742573ccaeb55c16bc02fb25fdd86b8d1f76a':
Add @Deprecated to match @deprecated where it's missing.
28c742573ccaeb55c16bc02fb25fdd86b8d1f76a 04-Nov-2010 Jesse Wilson <jessewilson@google.com> Add @Deprecated to match @deprecated where it's missing.

Change-Id: Ice95022671968386a601f32df7850f9baa1d2dd0
slCertificate.java
8234bdb36a951c1265b2bc702c06bab09509a615 09-Nov-2010 Huahui Wu <hwu@google.com> b/2864818 use authType for cert verification.

Change-Id: I2a3cb963165a7e2e4e72a1d398205b31f769cafa
ertificateChainValidator.java
85ffa26f67efad30912e1561b5123b6f8f5827ee 08-Nov-2010 Huahui Wu <hwu@google.com> Expose the cert validator to JNI.

Change-Id: Ie31919e762b1f528b319c251ccfd891dd7738544
ertificateChainValidator.java
02ca44b13c7aa66f99242dbcb07feac877153754 22-Oct-2010 Brian Carlstrom <bdc@google.com> Move improved cert chain handling from CertificateChainValidator to TrustManagerImpl

Bug: 2658463
Change-Id: Iaf27e6b37ad4ad3951ecccc17eab64049bbfaac0
ertificateChainValidator.java
eb8be973c7982fe3ece0aeaeca379c3b3cdced0c 12-Oct-2010 Bjorn Bringert <bringert@android.com> Make fields in WebAddress private, add getters/setters

Change-Id: Iceaf3d648289344e53c37273f7324a79676fbef7
equestQueue.java
b3f23da320991dd078b6cc55c719201cd8d7eb1c 15-Sep-2010 Brian Carlstrom <bdc@google.com> am e68f8b7e: am 405d4db5: Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters

Merge commit 'e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0'

* commit 'e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0':
Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters
7352c8bb4242caeba47e7696541c133760cc95de 15-Sep-2010 Brian Carlstrom <bdc@google.com> am 0535d857: am 94126238: Merge "Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments" into gingerbread

Merge commit '0535d8577fb2a3687428f462c591ae3220e1f773'

* commit '0535d8577fb2a3687428f462c591ae3220e1f773':
Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments
e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0 14-Sep-2010 Brian Carlstrom <bdc@google.com> am 405d4db5: Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters

Merge commit '405d4db50b3db1fc5e015475218e190d193332d4' into gingerbread-plus-aosp

* commit '405d4db50b3db1fc5e015475218e190d193332d4':
Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters
405d4db50b3db1fc5e015475218e190d193332d4 14-Sep-2010 Brian Carlstrom <bdc@google.com> Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters

Bug: 2672817
Change-Id: Ibe20830f024f76232f3628cfca922d49a5a06bef
ertificateChainValidator.java
0535d8577fb2a3687428f462c591ae3220e1f773 14-Sep-2010 Brian Carlstrom <bdc@google.com> am 94126238: Merge "Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments" into gingerbread

Merge commit '94126238427f04ecb86fe6832113afb2f04e89b5' into gingerbread-plus-aosp

* commit '94126238427f04ecb86fe6832113afb2f04e89b5':
Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments
2c42c8fbaf02be1f3ea6298077128d0c419526f0 14-Sep-2010 Brian Carlstrom <bdc@google.com> Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments

Bug: 2672817

Change-Id: If5f10fa16eaf5676a0c1540463759cd4e0e837de
ttpsConnection.java
1b7e4d5adcc2737bc11bfbf42a88a02d6df984e0 05-Aug-2010 Brian Carlstrom <bdc@google.com> am 4ae1e382: Merge "Tracking merge of dalvik-dev to gingerbread" into gingerbread

Merge commit '4ae1e382f4b6c5bb9e757f35f82ad48dc02c32af' into gingerbread-plus-aosp

* commit '4ae1e382f4b6c5bb9e757f35f82ad48dc02c32af':
Tracking merge of dalvik-dev to gingerbread
3c7c351a6217ac48b741740167c201a679a0ca65 05-Aug-2010 Brian Carlstrom <bdc@google.com> Tracking merge of dalvik-dev to gingerbread

git cherry-pick --no-commit f77cf7f0
git cherry-pick --no-commit c8f503b5285e30c1a881d0ba860ba9021f57d113
git cherry-pick --no-commit 570bb561
git cherry-pick --no-commit e2417541
git cherry-pick --no-commit e4d81f25bd4dc1a5c909b56ab56a56406290da30
git cherry-pick --no-commit 5e8a587d

Change-Id: I101a385d43f3e0f4ce5352217f92ef67a3908c88
ttpsConnection.java
5e8a587d49f014fdd42403f51bbe877855e4a6b3 29-Jul-2010 Brian Carlstrom <bdc@google.com> Tracking merge of dalvik-dev to master

Change-Id: Id4c19401ad0aa238219aaf5d9a20d2889d0a4b18
ttpsConnection.java
62dfcf38b5e93ecd6ea90910516c0089b7a332ea 16-Jul-2010 The Android Open Source Project <initial-contribution@android.com> am 3b97e5a6: merge from open-source master

Merge commit '3b97e5a6270f40111117c4d3f1e964154ddea0fe'

* commit '3b97e5a6270f40111117c4d3f1e964154ddea0fe':
Make HTTP Header class handle multiple cache-control fields.
c692e8c4da1c5e481ec8564839d47576e643f50c 13-Jul-2010 Henrik Baard <henrik.baard@sonyericsson.com> Make HTTP Header class handle multiple cache-control fields.

The HTTP specification states the following about the fields:
Multiple message-header fields with the same field-name MAY be present
in a message if and only if the entire field-value for that header field
is defined as a comma-separated list [i.e., #(values)]. It MUST be
possible to combine the multiple header fields into one "field-name:
field-value" pair, without changing the semantics of the message, by
appending each subsequent field-value to the first, each separated by a
comma. The order in which header fields with the same field-name are
received is therefore significant to the interpretation of the combined
field value, and thus a proxy MUST NOT change the order of these field
values when a message is forwarded.

Change-Id: I1a6fe5cc8f541f8e80d559641d270d09eac9d85c
eaders.java
e4031a3780ad3560d540e87e543a316b0b50a945 10-Jun-2010 Jean-Baptiste Queru <jbq@google.com> am 030b0ebe: merge from froyo-plus-aosp
4bd6940c576a1bbf47e52607e7c06a1cb7a476dc 08-Jun-2010 The Android Open Source Project <initial-contribution@android.com> merge from open-source master

Change-Id: Id2305d345a6cc248e08c0bdc6f3c8d999cc1d861
d81689aefcf57cfb692b73161b1a00511a90ee1e 04-Jun-2010 Alon Albert <aalbert@google.com> Add support for logging curl commands for binary POST data

Change-Id: Ibf55b95c2ae11681b18b20ba5643057ea0083f7f
ndroidHttpClient.java
e103355d9332e2fab9d5c408e824ac8ab3b915a7 05-May-2010 Brian Carlstrom <bdc@google.com> Remove explicit SSLSocket.startHandshake

When dalvik-dev merges to master, startHandshake will imply that
the caller wants a fully synchronous handshake instead of using
handshake cutthrough. This removes an unnecessary startHandshake
from the CertificateChainValidator.

core/java/android/net/http/CertificateChainValidator.java

Change-Id: Ie28abd961a06b28fa780d62b0063371ef4dc1eec
ertificateChainValidator.java
6ead8f6771fdc80d3ac67e174066b674f688b2d6 24-Apr-2010 Grace Kloba <klobag@google.com> Restrict the range request to the servers claiming
that they accept ranges. This may be too restrict as
the spec says the server MAY set this in the response
header. But this is the last minute change made in
https://android-git.corp.google.com/g/#change,49444
I think it is safer to be conservative.

Fix http://b/issue?id=2616477
equest.java
52e41583f58132ae109c632b51f8419c4c2225d6 22-Apr-2010 Grace Kloba <klobag@google.com> Added the subset of partial content support so that
we can continue the interrupted request to support
streaming the content even with a brief disconnection.

Note: we don't update the headers for partial content
as the headers we care should not be updated. See
a list in chromium/net/http/http_response_headers.cc.

We currently also don't support cache for partial content.

Fix http://b/issue?id=2616477
equest.java
7cfa90fee54f44831ac492891d1c123601c2a262 08-Apr-2010 Jesse Wilson <jessewilson@google.com> Move the public method HttpDateTime.parse() into AndroidHttpClient.

See bug http://b/2553589

Change-Id: Ide3399c7c63daf9c0b8c18669076f2f4d6e9a876
ndroidHttpClient.java
ttpDateTime.java
f1cac90c7baafa48b47c5d178dd12a75ba89af0b 31-Mar-2010 Robert Greenwalt <robdroid@android.com> Fix HttpProxy.

A key bit of code was lost in change 38/25338/5 (2009/09/17 change
of RequestQueue.java) which caused us to not pick up proxy settings.
Putting it back.

bug:2364475
Change-Id: I1e79858f64d8e793a966ef8e6f7a0d3f2a02251f
equestQueue.java
c76bfa5bb5e6e9afdae571e4b98d7f3dcc9a1669 24-Mar-2010 Steve Block <steveblock@google.com> Fixes synchronous XHR requests which require authentication to complete synchronously

Bug: 2540515
Change-Id: I58eebdf2db9388f66c75d86dc26b8055f513b038
equestHandle.java
60708a75120c4469dc2683485301ff9ee3b022e0 23-Mar-2010 Leon Clarke <leonclarke@google.com> Fix for when flash loads cached crossdomain.xml files.
Cache the x-permitted-cross-domain-policies header.
http://b/issue?id=2519669
eaders.java
5b494c1ca4c3cf0e0992c59fe34ae66c81e6dcce 12-Mar-2010 Ben Murdoch <benm@google.com> Add an API on the Java side to allow WebKit to pause the current load. This is used when the plugin is streaming data but it's
buffer is full. In that case, WebCore instructs the laoder to pause loading to give the plugin a chance to clear it's buffer and
continue.

Requires an external/webkit change.

Change-Id: Iec96a6325d92e979cbdc53289c2a20cad940ded2
equest.java
equestHandle.java
dba8cb76371960457e91b31fa396478f809a5a34 19-Mar-2010 Brian Carlstrom <bdc@google.com> b/2511635 Browser displays incorrect SSL cert information

Two more cases of "View certificate" problems like b/2511635

One problem is that if there are multiple resources downloaded for a
page. In that case the mCertificate shown ends up being from the last
loaded resource instead of the main resource of the page. The solution
is to only set the certificate if the LoadListener is the
mIsMainResourceLoader as well as the mIsMainPageLoader.

A larger problem was the fact that the EventHandler.certificate
interface method (in this case the LoadListener.certificate
implementation) once per https connection instead of once per request
as was documented. That meant if an https connection was reused (which
happens frequently on login pages such as
https://www.google.com/accounts which use the POST -> redirect -> GET
idiom to avoid POST data page refresh warnings) then later pages never
were associated with an SslCertificate.

The solution was to change EventHandler.certificate to be called once
per request, specifcally before the request. This means we no longer
call the certificate method in the handleSslErrorRequest case, which
is okay because it includes the SslCertificate within the SslError and
that is what the BrowserActivity expects.

Change-Id: Icbd9bd98c89db82762d1d06de85e1cde2470300d
onnection.java
ventHandler.java
ttpsConnection.java
ddb42a421fe110bfce8dab1cc241ca0fc1f5290e 03-Mar-2010 Brian Carlstrom <bdc@google.com> Merge "Fixing spelling of intiialization to initialization in comment"
a5987a510187749c32f0f68f8fc54e1334f91be6 02-Mar-2010 Brian Carlstrom <bdc@google.com> SslCertificate should clone Dates

To avoid external tampering with Dates withing SslCertificate by code
holding on to pointers to Dates used in the constructor or code
mutating values returned by the accessors, we now clone Dates taking
in as arguments and returned to callers.
slCertificate.java
37254dcdcf9f9eee9c61e124d23f2cb7114adeda 02-Mar-2010 Brian Carlstrom <bdc@google.com> Fixing spelling of intiialization to initialization in comment
ttpsConnection.java
9147a0ed64917e82c3f70632bbc3a91895cc1d55 02-Mar-2010 Brian Carlstrom <bdc@google.com> SslCertificate should use Dates - fixing api for build

Also fixing missing @deprecated noticed when updating API
slCertificate.java
445d8f159258708e084d578edaf468239d6cecc1 02-Mar-2010 Brian Carlstrom <bdc@google.com> SslCertificate should provide Date interface

While working on out openssl code, I found a Y2k bug that the dates
from invalidate certificates could be shown as 1909 instead of 2009.
The reason was because SslCertificate/BrowserActivity passed the
values around as Strings even though the started as Dates (from
X509Certificate) and were converted backed to Dates before
presentation by BrowserActivity's reformatCertificateDate.

SslCertificate now maintains date fields internally as Date objects
without converting them to Strings. The constructor and String
accessors, which are now @deprecated, now specify the format as an ISO
8601 date string which uses 4 digit years.

BrowserActivity now reformatCertificateDate is now simply
formatCertificateDate and no longer has to convert from String to Date
and back to String to get proper Locale formatting.

CTS SslCertificateTest also updated.
slCertificate.java
2269d1572e5fcfb725ea55f5764d8c3280d69f6d 25-Feb-2010 Dianne Hackborn <hackbod@google.com> Re-arrange android-common so framework no longer links with it.

This is the framework part, moving classes around so the framework
no longer needs to link to android-common. Makes some APIs public,
others that didn't need to be public are private in the framework,
some small things are copied.
ndroidHttpClient.java
ertificateChainValidator.java
ttpDateTime.java
ea4e597a87b51b8ec19798f3fdedf74a723d75d8 24-Feb-2010 Henrik Baard <henrik.baard@sonyericsson.com> Fixed problem with proxy server sometimes responds with 400 Bad Request when trying
to connect to a site using https.

The CONNECT to the server lacks the 'host' header which is mandatory according to the
specification. Some proxy servers are strictly following the specification and sends
back the 400 Bad Requst error code.
ttpsConnection.java
c4e834dc47885c8dbd3a2911ce4b9fccde21c800 08-Jan-2010 Huahui Wu <hwu@google.com> Rebuild a cleaner certificates chain before validating it.

This change cleans the server certificates:
1. Use the end-entity certificate as found in the chain received from the server as the end-entity cert for the newly built chain.

2. Look at the last cert in the newly built chain, specifically it's "issuer" field. If there's a cert in the chain as received with this as the "subject", and this cert hasn't yet been moved into the newly built chain, move it there (as the new last cert). Repeat this step 2 until you can't continue (because there's no matching previously unused cert left).

3. If the last certificate in the new chain has expired (and it's not the end-entity cert), remember this fact, and remove it (so that we can try if we can validating the chain for a different root). If in this case it turns out that we still can't validate the chain, it's probably the cert expiry error that should be displayed.

This CL also cleans the redundant error detection code and reduces the error messages to two types, which are the only two make differences to the user:
a. SSL_IDMISMATCH for name mismatch,
b. SSL_UNTRUSTED for other reasons.
ertificateChainValidator.java
6505122dfe96322bdeac4210d313b3f043c6a29a 27-Jan-2010 Brian Carlstrom <bdc@google.com> Issue 1597: browser crash possibly related to invalid SSL certificate
slCertificate.java
8f028a94fc533e75077485a7d11a04e4de820335 08-Jan-2010 Makoto Onuki <omakoto@google.com> Moved DomainNameChecker to android common.

- Moved DomainNameChecker from android.net.http to android common, and renamed to DomainNameValidator.
- Added a simplified version of DNParser, which DomainNameValidator uses instead of X509Name in order to extract Subject Name from a certificate.
- Added unit tests for DomainNameChecker and DNParser.

There's a suspicious comment in DomainNameChecker saying something like "X509Certificate fails to parse a certificate when a subject alt name begins with '*'". I think we should fix it if it's really the case -- otherwise certificates with the wildcard wouldn't work. I'll see if it's true after submitting this patch.
ertificateChainValidator.java
omainNameChecker.java
106f9b244633171ab75dd98b9761b7137c1a4705 05-Jan-2010 Grace Kloba <klobag@google.com> Patch from Huahui Wu.

Fix http://b/issue?id=1908085
omainNameChecker.java
7762d93621f508f4410fd37b5bbdfec0071b0420 11-Dec-2009 Paul Westbrook <pwestbro@google.com> Unbundling work

Moved AndroidHttpClient, Rfc822InputFilter, Rfc822Validator
NumberPicker, NumberPickerButton to android-common
---
ndroidHttpClient.java
ddcea3d21645bb3037703c84807dae077aae62ce 04-Dec-2009 Grace Kloba <klobag@google.com> Expose onReceivedSslError() so that the WebView client
can accept the error and continue.

Fix http://b/issue?id=2299152
slError.java
9db3d07b9620b4269ab33f78604a36327e536ce1 13-Nov-2009 Jean-Baptiste Queru <jbq@google.com> eclair snapshot
onnection.java
onnectionThread.java
equest.java
equestHandle.java
equestQueue.java
86806ce11a89260147d7c2efa2c192b711d923db 01-Oct-2009 Patrick Scott <phanna@android.com> Process synchronous requests in the same RequestQueue.

Use a dedicated Connection to process a synchronous request using the main
RequestQueue and on the WebCore thread.

HttpConnection, HttpsConnection, Connection:
No need for ConnectionManager, just pass the proxy host to
HttpsConnection. In Connection.clearPipe, empty should be set to true if the
RequestFeeder does _not_ have a request for the host. I don't think that
broke anything but it is incorrect.
ConnectionThread:
Refactor the proxy selection into ConnectionManager.getConnection
RequestHandle:
Add a new constructor that takes a Connection argument. Add processRequest
to process a single request on that Connection.
RequestQueue:
Add determine host to select between the request's host and the proxy. Add
queueSynchronousRequest to make a new request that operates on a private
connection. Add SyncFeeder to handle RequestFeeder.requeueRequest if the
request fails.
Network: Use the new RequestQueue api to handle a synchronous request.

Bug: 1315832
onnection.java
onnectionThread.java
ttpConnection.java
ttpsConnection.java
equestHandle.java
equestQueue.java
aaebc86386c8bb44c25dd06fe573e52ef6b60fbe 16-Sep-2009 Patrick Scott <phanna@android.com> Remove the network connection logic from RequestQueue.

This doesn't always work right and is causing some problems if the network comes
back up without sending the broadcast.
onnection.java
equestQueue.java
72b1f379d5c97c8ff31d2201e78215af777d6bda 31-Aug-2009 Jean-Baptiste Queru <jbq@google.com> donut snapshot
ertificateChainValidator.java
5dc0c00258f90a546efcfdeca87f8e57c5a07a54 21-Aug-2009 Bob Lee <crazybob@google.com> am e97c2006: Updated Browser and MCS to use shared default trust manager instead of initializing their own copies.

Merge commit 'e97c2006bf7c391c933307e520a392e532aa5d6a' into eclair

* commit 'e97c2006bf7c391c933307e520a392e532aa5d6a':
Updated Browser and MCS to use shared default trust manager instead of initializing their own copies.
e97c2006bf7c391c933307e520a392e532aa5d6a 21-Aug-2009 Bob Lee <crazybob@google.com> Updated Browser and MCS to use shared default trust manager instead of initializing their own copies.
ertificateChainValidator.java
ac1e59d887651220f5367cc7fa4207b34eab774d 11-Aug-2009 Jean-Baptiste Queru <jbq@google.com> donut snapshot
ventHandler.java
ttpsConnection.java
oggingEventHandler.java
f6d1a5528ee626487c78f17501d61e61bbe26b10 03-Aug-2009 Grace Kloba <klobag@google.com> resolved conflicts for merge of b8802b21 to master
4c8db8a4feb2afbd9d5f94ff09c7167ca34076c4 31-Jul-2009 Grace Kloba <klobag@google.com> Fix #2025900. If a https request is canceled while openConnection is called
and a ssl error happened, the http thread can be blocked for up to 10 min.
Added code to detect this case and unlock the thread.
ventHandler.java
ttpsConnection.java
oggingEventHandler.java
a16de7b03a1b2fe9e5eca55ce677c121e97079f8 25-Jul-2009 Grace Kloba <klobag@google.com> Fix 1993520 where page cycler fails.

Recover the old logic before removing network management. Remove the empty
list for the host after consuming the last entry. As we should never have
an empty list, it is safe to call removeFirst without checking whether it is
empty.

Currently, in getRequest() or removeFrist(), if we found an empty list, we
remove it. Then we return null for the request even there are requests in
another list. So the page stops loading until the next getRequest() or
removeFirst() is called. If they are not called, those requests will never
be accessed.
equestQueue.java
cf4550c3198d6b3d92cdc52707fe70d7cc0caa9f 21-Jul-2009 Jean-Baptiste Queru <jbq@google.com> donut snapshot
equestHandle.java
c319c69b1228f5eee2f9d71a71ad021f3d8ba82b 20-Jul-2009 Patrick Scott <phanna@android.com> Allow 205 and 305 to have content.

205 is interpreted by Safari to be like 200 and show the given content. Change
canHaveResponseBody to allow 205 to have a body.

305 is a very rare server response indicating to the client to use the given
Location header as a proxy and reissue the original request. Curl doesn't do
anything with this header and neither does internal networking code. For now,
we will just allow the response body to propagate to webcore.
equest.java
4a06b68c82fc011d8cd780ed7f0393d1d0617a07 20-Jul-2009 Patrick Scott <phanna@android.com> Correctly set the thread priority for ConnectionThreads.

This does not change the actual thread priority but if the default priority
changes, this will have the desired result of being slightly less favorable.

I tried messing with the priorities to see if a higher or lower priority helped
but it seemed to do more harm than good. It might be worth more investigation to
find out where all the thread time is being spent so we can determine the
correct priority.
onnectionThread.java
fe4fec7c66b0d956f008ead0fd899b588cfacb5d 14-Jul-2009 Patrick Scott <phanna@android.com> Remove all our old high priority knowledge since WebCore will manage it.

Also removed an unused variable in RequestQueue.java.
equest.java
equestHandle.java
equestQueue.java
340a1b21de7d5f650b15fab2bcda355ae9776f90 03-Jul-2009 Grace Kloba <klobag@google.com> Fix the performance collection in the http thread. A connection can be reused. Change the thread time collection based on per request.
onnectionThread.java
equestQueue.java
e10809d02cd16bb31e1e9b094c612094af08757c 01-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am 7a573862: Merge change 5720 into donut

Merge commit '7a5738624fa78e328b5f36c687c20b9cf0eb5a60'

* commit '7a5738624fa78e328b5f36c687c20b9cf0eb5a60':
Fix #1876303. Even rfc2616 4.2 says that "Field names are case-insensitive.", servers including Google internal uses case-sensitive checking for "Cookie". So change it.
65c0fc4fc445374c7f6e2106e6ed3d6191e45cae 30-Jun-2009 Grace Kloba <klobag@google.com> Fix #1876303. Even rfc2616 4.2 says that "Field names are case-insensitive.", servers including Google internal uses case-sensitive checking for "Cookie". So change it.
equestHandle.java
7cd64bd7e7425408f0dc7e1212e81950a7dab217 10-Jun-2009 Grace Kloba <klobag@google.com> Fix #1907439. If there is uncommitted content when gzipped content got EOFException, we need to commit them.
equest.java
843ef36f7b96cc19ea7d2996b7c8661b41ec3452 20-May-2009 Jean-Baptiste Queru <jbq@google.com> donut snapshot
ertificateValidatorCache.java
b5b33c734ab2a178f07c667a8c1daf8beab837aa 15-May-2009 Patrick Scott <phanna@android.com> Order high priority requests in the same order they are requested.

Use a class to hold the high priority requests and low priority requests. Each
request is appended to the correct list in the order received. If a request
needs to be requeued after an error, it is placed at the head of the
corresponding list.
equestQueue.java
67fd6d50af256265c8103d844212934f86079815 15-May-2009 Android (Google) Code Review <android-gerrit@google.com> am 1c9a92fd: Merge change 1690 into donut

Merge commit '1c9a92fd9fbe192f24e53c26cddeab401cefb108'

* commit '1c9a92fd9fbe192f24e53c26cddeab401cefb108':
Rework some code so that it works the way it was supposed to work.
3537506c883cdf4f4b792590abb5a8acb937503a 14-May-2009 Marco Nelissen <marcone@google.com> Rework some code so that it works the way it was supposed to work.
ertificateValidatorCache.java
45efe69f8019f9743aef4d2b4eb6acf56ea0551f 09-May-2009 Grace Kloba <klobag@google.com> Fix #1807059. If it is "POST", always use BasicHttpEntityEnclosingRequest even bodyProvider is null. This ensures the content-type, content-encoding and content-length are set correctly.
equest.java
886f3d69b79748fe937725e33b8bbb3d67ab82c7 25-Mar-2009 Bob Lee <> Automated import from //branches/donutburger/...@141355,141355
ertificateChainValidator.java
ttpsConnection.java
ef0996ffa36cfe9b7927e09aece801fb4f594ced 25-Mar-2009 Bob Lee <> Automated import from //branches/master/...@141357,141357
ertificateChainValidator.java
ttpsConnection.java
c2ad241504fcaa12d4579d3b0b4038d1ca8d08c9 20-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake_rel/...@141571
ertificateChainValidator.java
ttpsConnection.java
4df2423a947bcd3f024cc3d3a1a315a8dc428598 05-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@136594
ndroidHttpClient.java
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html
076357b8567458d4b6dfdcf839ef751634cd2bfb 03-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@132589
ndroidHttpClient.java
ertificateChainValidator.java
3dec7d563a2f3e1eb967ce2054a00b6620e3558c 03-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@137055
ndroidHttpClient.java
ertificateChainValidator.java
d24b8183b93e781080b2c16c487e60d51c12da31 11-Feb-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@130745
ndroidHttpClient.java
equestHandle.java
f013e1afd1e68af5e3b868c26a653bbfb39538f8 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
onnection.java
eaders.java
equest.java
equestHandle.java
equestQueue.java
54b6cfa9a9e5b861a9930af873580d6dc20f773c 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html