823675fdbb7f974b8e2fa9fbb71774b32487582d |
23-Oct-2014 |
Narayan Kamath <narayan@google.com> |
Deprecate more apache-http. bug: 18067888 Change-Id: I50511d53dfc9ae236dfb1646c55a5dd7fa15d7b2
ndroidHttpClient.java
|
e2dd396cef8c3b1c22b799ac931e207fdc729154 |
17-Jun-2014 |
Brian Carlstrom <bdc@google.com> |
Remove Change-Id: Ia2fa4ebae090838c2bf7bc96edc38a85fe3059dd
ertificateChainValidator.java
elegatingSSLSession.java
elegatingSocketWrapper.java
509TrustManagerExtensions.java
|
ed99dc89c32830cffe7a3912b2026942910c4c8f |
31-Mar-2014 |
Brian Carlstrom <bdc@google.com> |
am 7156b7c6: am b11952d6: am e3434fc4: Merge "Improve detail message for X509TrustManagerExtensions argument validation" * commit '7156b7c65d6f158c4898a93f8e2cea0bf94791d1': Improve detail message for X509TrustManagerExtensions argument validation
|
ff9ca781d0db5f81c3e703641fc7b9a34936a328 |
31-Mar-2014 |
Brian Carlstrom <bdc@google.com> |
Improve detail message for X509TrustManagerExtensions argument validation Bug: 13728564 Change-Id: I03d08babcdc0d11baff5e76a339b4285e92edee8
509TrustManagerExtensions.java
|
0072a417f1672098f3abb6a4b7203463ccea4dd3 |
27-Mar-2014 |
Kenny Root <kroot@google.com> |
am 1dc1d6b2: am 5b93685a: am 57f2764b: Merge "CertificateChainValidator: initialize TrustManagerFactory" * commit '1dc1d6b22deb38d78960f3ce89f94e536610492e': CertificateChainValidator: initialize TrustManagerFactory
|
587a9455ded22165127e1a91cba5057f7c59a6fc |
26-Mar-2014 |
Kenny Root <kroot@google.com> |
CertificateChainValidator: initialize TrustManagerFactory Need to call TrustManagerFactory#init before use. I suspect this class isn't used anywhere since this hasn't caused a problem yet. Change-Id: I17425d0bba4795d71960062361a755830abba7de
ertificateChainValidator.java
|
6ab41d71eb9acbe07257c6cf208d662de82cc22e |
25-Mar-2014 |
Kenny Root <kroot@google.com> |
am 266de3ef: am dd3e6399: am c1d863e7: am 77ceb5e8: Merge "Use X509ExtendedTrustManager and not Conscrypt" * commit '266de3efcd4b57ba3b301d87ff0fb692090d9a95': Use X509ExtendedTrustManager and not Conscrypt
|
da776c872e8880b48dfac4a9e9a2d90e398e4608 |
24-Mar-2014 |
Kenny Root <kroot@google.com> |
Use X509ExtendedTrustManager and not Conscrypt This allows the new X509ExtendedTrustManager to be used instead of Conscrypt directly. Bug: 13103812 Change-Id: I736f475342395f26657f2371828a6d3a0065a50a
ertificateChainValidator.java
elegatingSSLSession.java
elegatingSocketWrapper.java
509TrustManagerExtensions.java
|
f96bfe86a68bfd0491a76cf6dfa515dc58f027bb |
24-Mar-2014 |
Alex Klyubin <klyubin@google.com> |
am 7ae93b1d: am 92ec0a0c: am d8c32164: am 88517170: Merge "Adjust to the change in the private SSLParameterImpl API." * commit '7ae93b1d0cd1eb43b5fc8248dfc2703608a461f3': Adjust to the change in the private SSLParameterImpl API.
|
a2507e876421ce5276c63a7437a2a668da124563 |
21-Mar-2014 |
Alex Klyubin <klyubin@google.com> |
Adjust to the change in the private SSLParameterImpl API. Conscrypt's SSLParameterImpl getDefaultTrustManager was renamed to getDefaultX509TrustManager. Bug: 13563574 Change-Id: I601c651d631f5a2e4a04d21941186553988e5286
ertificateChainValidator.java
|
3554740951b91b1487e72c2d2208302c29d43613 |
11-Dec-2013 |
William Luh <williamluh@google.com> |
Merge "Expose new API for querying whether a certificate was user added."
|
6090995951c6e2e4dcf38102f01793f8a94166e1 |
19-Nov-2013 |
John Spurlock <jspurlock@google.com> |
Remove unused imports from frameworks/base. Change-Id: Ia1f99bd2c1105b0b0f70aa614f1f4a67b2840906
ndroidHttpClientConnection.java
onnection.java
onnectionThread.java
ttpConnection.java
ttpResponseCache.java
ttpsConnection.java
equest.java
equestQueue.java
|
d96371521299627c8be59e0d9d5b42a61d0720be |
19-Nov-2013 |
William Luh <williamluh@google.com> |
Expose new API for querying whether a certificate was user added. Bug: 11257762 Change-Id: I0087048189f71b76761e7e95f98261c02bf73967
509TrustManagerExtensions.java
|
635011173ebaa6cc35d1fca82276197cad866ba2 |
19-Nov-2013 |
William Luh <williamluh@google.com> |
Revert "Expose new API for querying whether a certificate was user added." This reverts commit 60b96502b39d221afb43ff7e8a49a19a2fb3c2e0. Change-Id: Ie1c2ee4c983c4d6b0c086f252a191b3c60e50b9c
509TrustManagerExtensions.java
|
60b96502b39d221afb43ff7e8a49a19a2fb3c2e0 |
05-Nov-2013 |
William Luh <williamluh@google.com> |
Expose new API for querying whether a certificate was user added. Bug: 11257762 Change-Id: Icb23ac4f452528751988db708f7588ef45d23c26
509TrustManagerExtensions.java
|
cb64d430627b71221c588ef5f23599dd34a89ee9 |
02-Aug-2013 |
Elliott Hughes <enh@google.com> |
If frameworks wants ASCII casing, it should explicity ask for it. http://elliotth.blogspot.com/2012/01/beware-convenience-methods.html Bug: https://code.google.com/p/android/issues/detail?id=58359 Change-Id: Iaab02e718a7be7bda22e626dca05d79bfd2a8fc4
ttpAuthHeader.java
ttpsConnection.java
|
03a152d7e72f05456a463f2709ce787119e86f03 |
18-Jul-2013 |
Elliott Hughes <enh@google.com> |
am 15cb526e: Merge "Fix import after okhttp update." * commit '15cb526ece1420b1ae2061e20fd0982d82b41aae': Fix import after okhttp update.
|
c0bb16673e697f76ee987648ceb828e15ae0ca06 |
18-Jul-2013 |
Narayan Kamath <narayan@google.com> |
Fix import after okhttp update. OkResponseCache moved packages in change 62321. Change-Id: I2c08c4586405e767d1931ebc5f185c7916850fa1
ttpResponseCache.java
|
372d21ad69a43e3d0a26b23f45351511ed88e9e6 |
13-Jun-2013 |
Narayan Kamath <narayan@google.com> |
am 6706ca96: Merge "Update HttpResponseCache to use the new cache API." * commit '6706ca96b21ebbd620fb597a23e8180f76bb37cf': Update HttpResponseCache to use the new cache API.
|
68a3cd7955479d3f77fe3facd20c5ded7dafc68e |
06-Jun-2013 |
Narayan Kamath <narayan@google.com> |
Update HttpResponseCache to use the new cache API. The new API was introduced in https://android-review.googlesource.com/#/c/59985/ Change-Id: Ie64de7fc64b818bebf1077dff407813865769387
ttpResponseCache.java
|
e9ae6822a80cb1f3bd13c785f1727c03d35da52e |
30-Apr-2013 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 1f6e789b to jb-mr2-dev-plus-aosp Change-Id: I06c05d637613215b6d83df3e29cd495f6a5a0176
|
12e752225aa96888358294be0d725d499a1c9f03 |
24-Apr-2013 |
Kenny Root <kroot@google.com> |
Track change to JSSE provider Change-Id: I35e824e47ad758ab6408e91e2ba5dcda053a82f5
ertificateChainValidator.java
ttpsConnection.java
509TrustManagerExtensions.java
|
d334cb13d694a4f1c6b885070ec48033366a4b37 |
29-Apr-2013 |
Kenny Root <kroot@google.com> |
am d152f7ec: Merge "Don\'t use X509CertImpl directly" * commit 'd152f7ec1ae43d77ff8e2206724ce71da3da9913': Don't use X509CertImpl directly
|
28b1f0ee02e14241ffb81f431fc54053771c1c90 |
24-Apr-2013 |
Kenny Root <kroot@google.com> |
Don't use X509CertImpl directly Change-Id: Ibabee35c90c2636c6f362e4d778d6795a0cef6c2
ertificateChainValidator.java
|
3c7df09d4dd00fb23da888726182f00788957cd9 |
03-Apr-2013 |
Brian Carlstrom <bdc@google.com> |
am 6fdcb168: Merge "Adjust the HttpResponseCache for OkHttp." * commit '6fdcb168a7a0a4f508063019ca4d2ec35458f892': Adjust the HttpResponseCache for OkHttp.
|
dea64ad715c121bfc5cd1881abc51fac9b1d04d6 |
30-Mar-2013 |
jwilson <jwilson@squareup.com> |
Adjust the HttpResponseCache for OkHttp. Change-Id: I2a80f3c3f30a3d15673d797fa3d1211286f75030
ttpResponseCache.java
|
305efe23a326d0f886d3cf66ea05dfbd30e714e2 |
05-Jan-2013 |
Brian Carlstrom <bdc@google.com> |
am 498eaf58: am bc7d5a55: am 537fb0af: Merge "Use most specific attributes for distinguished name display" * commit '498eaf58ad399e42cf7b3aca020b828c35023288': Use most specific attributes for distinguished name display
|
91154ce658483488a1390e3da58cc2950fb02acb |
22-Dec-2012 |
Brian Carlstrom <bdc@google.com> |
Use most specific attributes for distinguished name display Bug: 7894348 Bug: http://code.google.com/p/android/issues/detail?id=41662 Change-Id: I8048a53b8a9a17b384f12b6a4f40071bb3dd3e04
slCertificate.java
|
7905db94add8bab7709fe5426f383e12b1b47fe9 |
29-Nov-2012 |
Elliott Hughes <enh@google.com> |
am 878da653: am 9ed4abd8: Merge "Fix AndroidHttpClient documentation error." * commit '878da6532836ec09f6d27e8f5af79444c79e78b6': Fix AndroidHttpClient documentation error.
|
d2dcd7ada3e864de879dd64fbebd3a857b1bc181 |
29-Nov-2012 |
Elliott Hughes <enh@google.com> |
Fix AndroidHttpClient documentation error. AndroidHttpClient doesn't let the user add HttpRequestInterceptor classes. Bug: http://code.google.com/p/android/issues/detail?id=37294 Change-Id: I66f6581fa321dc16ddfe35c8f4242bc31f79bdfa
ndroidHttpClient.java
|
77c2655adb1cfd017f1f41aad2974620c2f02903 |
14-Nov-2012 |
Maurice Chu <mochu@google.com> |
Add method name to curl output Backporting change made to AndroidHttpClient.java from CL I0f3819e84542023fca65ec4a29534ef32e877570. Bug: 7499444 Change-Id: Ie67d2917fa378afb00ec4bd7c3de238f48f7c6af
ndroidHttpClient.java
|
58ed5d748c0b9b64845975ef5844ad313de7c3f6 |
07-Nov-2012 |
Kenny Root <kroot@google.com> |
am 768d9e1a: Merge "Correct executable bit for source files" * commit '768d9e1a72ceee7d4a5f608776b87b62d6ce4a04': Correct executable bit for source files
|
3a084af2e90849aaa8beb3a610189e3399c63ea0 |
07-Nov-2012 |
Kenny Root <kroot@google.com> |
Correct executable bit for source files Many media files and source code files were marked as executable in Git. Remove those. Also a shell script and python script were not marked as executable. Change-Id: Ieb51bafb46c895a21d2e83696f5a901ba752b2c5
ackage.html
|
992f238d13fff7c21b60ef6958784a4ed2156784 |
26-Sep-2012 |
Brian Carlstrom <bdc@google.com> |
Reverting public setSoWriteTimeout This reverts fd901f735c858af8ec8884b2e7ab71a46a9639e6 and 5e21bf934b2a71b595deb9856a2044eea4dbce86 Bug: 7237764 Bug: 6693087 Change-Id: I7cc9657e4df219481eb33de803081a01b13ee0f2
ndroidHttpClient.java
|
fd901f735c858af8ec8884b2e7ab71a46a9639e6 |
26-Sep-2012 |
Alon Albert <aalbert@google.com> |
Add a static generator that takes a Socket Write Timeout Argumanet Use it from AndroidHttpClient Bug: 6693087 Change-Id: I08648e441a6431d0944caaec0db516a26671f2a5
ndroidHttpClient.java
|
8071124375e336b98de45b44b9884c92cdfd9bd8 |
19-Sep-2012 |
Andy Stadler <stadler@google.com> |
Move X509TrustManagerExtensions to correct directory Also removed unused imports. Original Change-Id: If117ffd2240a7bf3437115f3cf2f766c4e249600 Change-Id: I66886ee9792c23a1e421022fd1f675fdf35ea049
509TrustManagerExtensions.java
|
f743e54f2d761c742d99ac868705818616dcf74f |
15-Sep-2012 |
Geremy Condra <gcondra@google.com> |
Change verifyServerDomainAndCertificates to pass in a hostname. This is required for cert pinning. Change-Id: I16041f17e97d9ae592a2b809f6a8164268338d1b
ertificateChainValidator.java
|
f76a50ce8fdc6aea22cabc77b2977a1a15a79630 |
09-Mar-2012 |
Ken Wakasa <kwakasa@google.com> |
Fix obvious typos under frameworks/base/core Change-Id: Ia5fc3db1bb51824e7523885553be926bcc42d736
slError.java
|
866666071bc49bd0c4fcd1776c9d9036d4e29fec |
08-Mar-2012 |
Brian Carlstrom <bdc@google.com> |
Tracking changes to SSLParametersImpl.getDefaultTrustManager() Change-Id: I0bcf2bbcd2581f6b66e08d1c6f0de24bf8d34199
ertificateChainValidator.java
|
93ba4fedebb78ba47c24e8472c8960ea8fdc933a |
14-Feb-2012 |
Selim Gurun <sgurun@google.com> |
Act on credential storage updates. Bug: 6009802 Cherry pick fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1 Listen to credential storage updates and clean state when necessary. Change-Id: I2c63e6771e9373da8b39781fdcf3d21583c4e3b2
ertificateChainValidator.java
|
d8d6afdc068e8aa31fddd06f5946311d2b961026 |
16-Feb-2012 |
Selim Gurun <sgurun@google.com> |
Merge "Revert "Act on credential storage updates.""
|
43e41580e4c700e970cc5e62180a767ab424da6d |
16-Feb-2012 |
Selim Gurun <sgurun@google.com> |
Revert "Act on credential storage updates." This reverts commit fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1
ertificateChainValidator.java
|
e83b83fe20aa89f9bf730bb07006890f6c65e89c |
16-Feb-2012 |
Selim Gurun <sgurun@google.com> |
Merge "Act on credential storage updates."
|
18c227ba72406c0b69ce9925a80113060d870256 |
15-Feb-2012 |
Jesse Wilson <jessewilson@google.com> |
Implement the (hidden) ExtendedResponseCache interface. Bug: http://code.google.com/p/android/issues/detail?id=25418 Change-Id: I4b20d576bac7036f94e57db7124de44f5b8d75be
ttpResponseCache.java
|
fcd93b72a3dde2b20fa0d8b04d3f47311b0856a1 |
14-Feb-2012 |
Selim Gurun <sgurun@google.com> |
Act on credential storage updates. Bug: 6009802 Listen to credential storage updates and clean state when necessary. Change-Id: I48f2e7d6e036882c2b4a29fbd357ca018fd4e4c7
ertificateChainValidator.java
|
52cd299eef703030f8fcf7a92f413791301771cc |
27-Dec-2011 |
Jesse Wilson <jessewilson@google.com> |
Move the frameworks/base hostname verifier into libcore. Part 2/2 Bug: http://b/5619726 Change-Id: I165eb3befcef104ff56ffb466c87c60b632f3194
ertificateChainValidator.java
|
8543b5480d9c261e72965f64a7bc918eb183ea25 |
15-Dec-2011 |
Jesse Wilson <jessewilson@google.com> |
Give a reflection example for installing the HTTP response cache. From the Android developers blog, http://android-developers.blogspot.com/2011/09/androids-http-clients.html Change-Id: Iff0a06fb7b0b8c085b9f16e85b30db44c889235e
ttpResponseCache.java
|
518f72ca38f4a5e1dfcfade6b40e4fd082dd9fd8 |
05-Oct-2011 |
Steve Block <steveblock@google.com> |
Fix SslError.getPrimaryError() to return -1 if the set of errors is empty Also fix a couple of buggy asserts. Bug: 5416594 Change-Id: I0e7e2548886af5fc0b8c20f70a3040d2c5bc68ea
slError.java
|
fa03f9a3460a695337231df3195271060a1b4a06 |
05-Oct-2011 |
Steve Block <steveblock@google.com> |
Fix BrowserFrame to construct SslError using the full URL, rather than the host https://android-git.corp.google.com/g/#/c/133348 changed BrowserFrame to construct the SslError using only the host. This was done so that we match on just the host component of the URL when re-using previous decisions in case of an SSL error. It also means that the browser displays only the host when it shows the SSL error dialog. This change fixes BrowserFrame to pass the full URL to SslError. We modify SslCertLookupTable to keep the existing behaviour regarding matching on only the host component. There's no need to change Browser to continue displaying only the host as I think this change was an unintentional side-effect. Also remove dead code-path in BrowserFrame.reportSslCertError(). This method is used only with the Chromium HTTP stack. This code was added in https://android-git.corp.google.com/g/#/c/121023. No functional change. Bug: 5410252 Change-Id: Ief2dbf4558095fb6fa7ab0caac7d37fa4f640b66
slError.java
|
9e334dbc308da119c7902a4badd2424adc5e9fb9 |
03-Oct-2011 |
Steve Block <steveblock@google.com> |
Clean up SslError - Don't use runtime exceptions for programming errors - Avoid code duplication - Tweak JavaDoc for public API Bug: 5248376 Change-Id: I5a88e5d444094efd44cce323e92f279840cf857f
slError.java
|
1abd5b3e6f11ef9d7076685c56ef942fa0dd77e4 |
12-Jul-2011 |
Kristian Monsen <kristianm@google.com> |
Part of fix for bug 4997380: Some error types unknown to SslError Mapping chromium error codes from net/base/net_error_list.h to SslError codes. Change-Id: Ie4f98974e23969c3b5ae1f8c4413772cf93603b9
slError.java
|
7b91b31e28097b468db4cc2c6ac1a8e4064d8027 |
13-Jul-2011 |
Elliott Hughes <enh@google.com> |
Fix typo in AndroidHttpClient JavaDoc. Bug: http://code.google.com/p/android/issues/detail?id=14788 Change-Id: I7465c6c42e7b208efc9c954ac46c1b683676106e
ndroidHttpClient.java
|
4a06281052e42c09062050abd7fa3de3249c088c |
06-Jul-2011 |
Brian Carlstrom <bdc@google.com> |
Adding additional details to ssl_certificate view Change-Id: I3da80988b749fe60174c3c8df856d714ede518ba
slCertificate.java
|
5bb9b19c5a3f3cf292f812ff5b9f9b8bcc88e5af |
28-Jun-2011 |
Huahui Wu <hwu@google.com> |
2nd try: Gets the URL that has a cert error and carrys it in SslError. Identical to https://android-git.corp.google.com/g/#change,117828 which was reverted since its collaborative CL broke the build. Change-Id: I5fa7d3e9b6026639bf72530ff5b449e36f802914
slError.java
|
899639dd44a9bedc807be6b712c35e7300e01026 |
28-Jun-2011 |
Huahui Wu <hwu@google.com> |
Merge "Revert "Gets the URL that has a cert error and carrys it in SslError.""
|
2e029c67a8e893e91600df989bbb42272d82af21 |
28-Jun-2011 |
Huahui Wu <hwu@google.com> |
Revert "Gets the URL that has a cert error and carrys it in SslError." This reverts commit 3015516a4611db23ce56ae057d281c9328cfdf24.
slError.java
|
fa487ca830cb150be5822d8d73c3d832672f7108 |
28-Jun-2011 |
Huahui Wu <hwu@google.com> |
Merge "Gets the URL that has a cert error and carrys it in SslError."
|
3015516a4611db23ce56ae057d281c9328cfdf24 |
27-Jun-2011 |
Huahui Wu <hwu@google.com> |
Gets the URL that has a cert error and carrys it in SslError. b/2689122 SSL error shows the wrong page when triggered by an image/javascript in the page. This change receives the URL which has a cert error from webkit and carrys it in SslError. so the Browser app can show the URL in the dialog boxes. Related CLs are: webkit: https://android-git.corp.google.com/g/#change,117817 browser: https://android-git.corp.google.com/g/#change,117835 Change-Id: I65c3f038a48b6386fa93cb25a9ef70dbfb982c18
slError.java
|
6da00334478df64921b68fcbb45c9d1eef6f35bd |
27-Jun-2011 |
Brian Carlstrom <bdc@google.com> |
Moving ssl_certificate layout, resources, and helper code to SslCertificate Add IKeyChainService.deleteCaCertificate Change-Id: If42341bc732efcfe4f958c00cdd6c0fec11a3c75
slCertificate.java
|
98e8b19c7bc422600a7a27819311d0059b5af2da |
24-Jun-2011 |
Jesse Wilson <jessewilson@google.com> |
Warn about the lack of access controls for SD card HTTP caches. Change-Id: I54adc2f9b57964e15a0fc26b719729e6087b1bda http://b/4772280
ttpResponseCache.java
|
a7284f0e72745d66155e1e282fc07113332790fa |
27-May-2011 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to master Adapt to change in the way MockWebServer sets up CONNECT proxies. git cherry-pick --no-commit c7e2feee5e7908a019a0de91123c1feb9bdc38bc React to move of Base64 in libcore git cherry-pick --no-commit 119f7ebdd1f8df3a8ff8e3b8056bff725d569253 Expose and document android.net.HttpResponseCache. git cherry-pick --no-commit 7b73f0fdb8c032a65c55610541d66385bd8bcbe6) make update-api Change-Id: Ieb48b304ea38ee8c2ec01e860d99b1404583889e
ttpResponseCache.java
|
43a17654cf4bfe7f1ec22bd8b7b32daccdf27c09 |
07-Apr-2011 |
Joe Onorato <joeo@google.com> |
Remove the deprecated things from Config.java. These haven't been working since before 1.0. Change-Id: Ic2e8fa68797ea9d486f4117f3d82c98233cdab1e
eaders.java
ttpLog.java
|
79ae37086b277765001a0d2da3fd058e9fa73abf |
05-Feb-2011 |
Lorenzo Colitti <lorenzo@google.com> |
Fix IPv6->IPv4 fallback for HTTPS. Bug: http://code.google.com/p/android/issues/detail?id=8113 Change-Id: If49f4f2f8c676badbe0c44a138f4756bd8a9ac08
ttpsConnection.java
|
cc687c52a0313b3b42d2960c8ca669cf1d94aae8 |
16-Feb-2011 |
Brian Carlstrom <bdc@google.com> |
Deprecate non-X509Certificate SslCertificate constructors Change-Id: I45541c48b321fbd6054712c08d8ac64108d32674
slCertificate.java
|
929a1c219248b62778807cac8ea256c7ac0fda6a |
02-Feb-2011 |
Brian Carlstrom <bdc@google.com> |
Removing android.security.MessageDigest Bug: 3392028 Change-Id: I6b9732da17d086ba00c846c3ad1c7fb39baf9502
ertificateValidatorCache.java
equestHandle.java
|
4140faeebbfa23d56068c1862b2913fb62145f4f |
25-Jan-2011 |
Brian Carlstrom <bdc@google.com> |
Tracking jarjar of org.bouncycastle to com.android.org.bouncycastle Bug: 3086427 Change-Id: I7af99fe4c36d9a519777f0499ccab65646313879
slCertificate.java
|
4887804ea619dd98ccb52a1cd911d23c74b4b457 |
29-Dec-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am a6ac0ec3: am 69ebb984: Merge "according to rfc2617, nc-value = 8LHEX" * commit 'a6ac0ec30dfdacb7baba126b5cea69fc7097496e': according to rfc2617, nc-value = 8LHEX
|
b19c9c39949eef293dd3a271ec88d28c3ff62044 |
25-Dec-2010 |
Bin Jin <bjin1990@gmail.com> |
according to rfc2617, nc-value = 8LHEX Change-Id: I8646fd8d68cfa4786ee6fc24a757b2af93955c4b
equestHandle.java
|
4c240a2cd16962016b81081777d5b15c573fa59c |
07-Dec-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 465e88eb: am 1ee2394e: am 1d67fa5b: Merge "Changing connect and response timeout." * commit '465e88eb008408d4e655ca7bdd9c2b3ac305e54b': Changing connect and response timeout.
|
1ee2394edd4b90111f8174862c7c0f435e1a3634 |
06-Dec-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 1d67fa5b: Merge "Changing connect and response timeout." * commit '1d67fa5b110a1df21e408d450394fb62d5dc9a1e': Changing connect and response timeout.
|
d39fd5a97c6f56794a6ed7ac1dfb0bbf585becf1 |
18-Nov-2010 |
Henrik Baard <henrik.baard@sonyericsson.com> |
Changing connect and response timeout. In bad network conditions and where switches often occur between 2G and 3G the timeout of 20s is too short. Setting this timeout to 60 seconds will improve functionality in bad conditions while it will not affect functionality in good networks. This change also aligns the timeouts with the timeouts used by the Browser (Connection.java). Change-Id: I0fbe3cbfe734f8d55a41bfa5d8ab6b332a19f912
ndroidHttpClient.java
|
83d4a23c280bdcaf6c301651b76ddc6fbf08949c |
12-Nov-2010 |
Iain Merrick <husky@google.com> |
Provide default error strings in BrowserFrame.onReceivedError(). This method is called from both the Android and Chrome HTTP stacks. We want the same user-facing behaviour in each case, but the Chrome code does not have easy access to the same error message strings. Therefore, I'll have the Chrome HTTP stack provide empty strings for the descriptions. (See change I9042a2ee in external/webkit). This CL makes BrowserFrame check for empty or null strings and use the standard error messages instead. The strings were package-private, so I did a little cleaning up to make them public (but still hidden from the API). Using a switch statement instead of an array because it's more robust and should be comparably efficient. Bug: 3172265 Test: Load http://google.com:81 to force a timeout error, check that the correct message is displayed. Change-Id: I7dec8dffe8ad9e513fdb90877e0b466e707174a8
onnection.java
rrorStrings.java
ventHandler.java
|
06d8dfd5d1088f20d899b67b20df2cd741990679 |
09-Nov-2010 |
Huahui Wu <hwu@google.com> |
Merge "b/2864818 use authType for cert verification."
|
762b33f9494ba48aa1be3701d345b692e8432af9 |
09-Nov-2010 |
Jesse Wilson <jessewilson@google.com> |
am 2d2f10fa: am 28c74257: Add @Deprecated to match @deprecated where it\'s missing. * commit '2d2f10fa3412adc07a08c25ba5d2df600fb654bf': Add @Deprecated to match @deprecated where it's missing.
|
2d2f10fa3412adc07a08c25ba5d2df600fb654bf |
09-Nov-2010 |
Jesse Wilson <jessewilson@google.com> |
am 28c74257: Add @Deprecated to match @deprecated where it\'s missing. * commit '28c742573ccaeb55c16bc02fb25fdd86b8d1f76a': Add @Deprecated to match @deprecated where it's missing.
|
28c742573ccaeb55c16bc02fb25fdd86b8d1f76a |
04-Nov-2010 |
Jesse Wilson <jessewilson@google.com> |
Add @Deprecated to match @deprecated where it's missing. Change-Id: Ice95022671968386a601f32df7850f9baa1d2dd0
slCertificate.java
|
8234bdb36a951c1265b2bc702c06bab09509a615 |
09-Nov-2010 |
Huahui Wu <hwu@google.com> |
b/2864818 use authType for cert verification. Change-Id: I2a3cb963165a7e2e4e72a1d398205b31f769cafa
ertificateChainValidator.java
|
85ffa26f67efad30912e1561b5123b6f8f5827ee |
08-Nov-2010 |
Huahui Wu <hwu@google.com> |
Expose the cert validator to JNI. Change-Id: Ie31919e762b1f528b319c251ccfd891dd7738544
ertificateChainValidator.java
|
02ca44b13c7aa66f99242dbcb07feac877153754 |
22-Oct-2010 |
Brian Carlstrom <bdc@google.com> |
Move improved cert chain handling from CertificateChainValidator to TrustManagerImpl Bug: 2658463 Change-Id: Iaf27e6b37ad4ad3951ecccc17eab64049bbfaac0
ertificateChainValidator.java
|
eb8be973c7982fe3ece0aeaeca379c3b3cdced0c |
12-Oct-2010 |
Bjorn Bringert <bringert@android.com> |
Make fields in WebAddress private, add getters/setters Change-Id: Iceaf3d648289344e53c37273f7324a79676fbef7
equestQueue.java
|
b3f23da320991dd078b6cc55c719201cd8d7eb1c |
15-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
am e68f8b7e: am 405d4db5: Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters Merge commit 'e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0' * commit 'e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0': Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters
|
7352c8bb4242caeba47e7696541c133760cc95de |
15-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
am 0535d857: am 94126238: Merge "Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments" into gingerbread Merge commit '0535d8577fb2a3687428f462c591ae3220e1f773' * commit '0535d8577fb2a3687428f462c591ae3220e1f773': Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments
|
e68f8b7ebe898ec06d7a156964d498e3d0a2e6c0 |
14-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
am 405d4db5: Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters Merge commit '405d4db50b3db1fc5e015475218e190d193332d4' into gingerbread-plus-aosp * commit '405d4db50b3db1fc5e015475218e190d193332d4': Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters
|
405d4db50b3db1fc5e015475218e190d193332d4 |
14-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
Rename internal SSLParameters to SSLParametersImpl to avoid collision with new javax.net.ssl.SSLParameters Bug: 2672817 Change-Id: Ibe20830f024f76232f3628cfca922d49a5a06bef
ertificateChainValidator.java
|
0535d8577fb2a3687428f462c591ae3220e1f773 |
14-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
am 94126238: Merge "Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments" into gingerbread Merge commit '94126238427f04ecb86fe6832113afb2f04e89b5' into gingerbread-plus-aosp * commit '94126238427f04ecb86fe6832113afb2f04e89b5': Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments
|
2c42c8fbaf02be1f3ea6298077128d0c419526f0 |
14-Sep-2010 |
Brian Carlstrom <bdc@google.com> |
Remove SSLContextImpl.engineInit(..) that takes persistent cache arguments Bug: 2672817 Change-Id: If5f10fa16eaf5676a0c1540463759cd4e0e837de
ttpsConnection.java
|
1b7e4d5adcc2737bc11bfbf42a88a02d6df984e0 |
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
am 4ae1e382: Merge "Tracking merge of dalvik-dev to gingerbread" into gingerbread Merge commit '4ae1e382f4b6c5bb9e757f35f82ad48dc02c32af' into gingerbread-plus-aosp * commit '4ae1e382f4b6c5bb9e757f35f82ad48dc02c32af': Tracking merge of dalvik-dev to gingerbread
|
3c7c351a6217ac48b741740167c201a679a0ca65 |
05-Aug-2010 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to gingerbread git cherry-pick --no-commit f77cf7f0 git cherry-pick --no-commit c8f503b5285e30c1a881d0ba860ba9021f57d113 git cherry-pick --no-commit 570bb561 git cherry-pick --no-commit e2417541 git cherry-pick --no-commit e4d81f25bd4dc1a5c909b56ab56a56406290da30 git cherry-pick --no-commit 5e8a587d Change-Id: I101a385d43f3e0f4ce5352217f92ef67a3908c88
ttpsConnection.java
|
5e8a587d49f014fdd42403f51bbe877855e4a6b3 |
29-Jul-2010 |
Brian Carlstrom <bdc@google.com> |
Tracking merge of dalvik-dev to master Change-Id: Id4c19401ad0aa238219aaf5d9a20d2889d0a4b18
ttpsConnection.java
|
62dfcf38b5e93ecd6ea90910516c0089b7a332ea |
16-Jul-2010 |
The Android Open Source Project <initial-contribution@android.com> |
am 3b97e5a6: merge from open-source master Merge commit '3b97e5a6270f40111117c4d3f1e964154ddea0fe' * commit '3b97e5a6270f40111117c4d3f1e964154ddea0fe': Make HTTP Header class handle multiple cache-control fields.
|
c692e8c4da1c5e481ec8564839d47576e643f50c |
13-Jul-2010 |
Henrik Baard <henrik.baard@sonyericsson.com> |
Make HTTP Header class handle multiple cache-control fields. The HTTP specification states the following about the fields: Multiple message-header fields with the same field-name MAY be present in a message if and only if the entire field-value for that header field is defined as a comma-separated list [i.e., #(values)]. It MUST be possible to combine the multiple header fields into one "field-name: field-value" pair, without changing the semantics of the message, by appending each subsequent field-value to the first, each separated by a comma. The order in which header fields with the same field-name are received is therefore significant to the interpretation of the combined field value, and thus a proxy MUST NOT change the order of these field values when a message is forwarded. Change-Id: I1a6fe5cc8f541f8e80d559641d270d09eac9d85c
eaders.java
|
e4031a3780ad3560d540e87e543a316b0b50a945 |
10-Jun-2010 |
Jean-Baptiste Queru <jbq@google.com> |
am 030b0ebe: merge from froyo-plus-aosp
|
4bd6940c576a1bbf47e52607e7c06a1cb7a476dc |
08-Jun-2010 |
The Android Open Source Project <initial-contribution@android.com> |
merge from open-source master Change-Id: Id2305d345a6cc248e08c0bdc6f3c8d999cc1d861
|
d81689aefcf57cfb692b73161b1a00511a90ee1e |
04-Jun-2010 |
Alon Albert <aalbert@google.com> |
Add support for logging curl commands for binary POST data Change-Id: Ibf55b95c2ae11681b18b20ba5643057ea0083f7f
ndroidHttpClient.java
|
e103355d9332e2fab9d5c408e824ac8ab3b915a7 |
05-May-2010 |
Brian Carlstrom <bdc@google.com> |
Remove explicit SSLSocket.startHandshake When dalvik-dev merges to master, startHandshake will imply that the caller wants a fully synchronous handshake instead of using handshake cutthrough. This removes an unnecessary startHandshake from the CertificateChainValidator. core/java/android/net/http/CertificateChainValidator.java Change-Id: Ie28abd961a06b28fa780d62b0063371ef4dc1eec
ertificateChainValidator.java
|
6ead8f6771fdc80d3ac67e174066b674f688b2d6 |
24-Apr-2010 |
Grace Kloba <klobag@google.com> |
Restrict the range request to the servers claiming that they accept ranges. This may be too restrict as the spec says the server MAY set this in the response header. But this is the last minute change made in https://android-git.corp.google.com/g/#change,49444 I think it is safer to be conservative. Fix http://b/issue?id=2616477
equest.java
|
52e41583f58132ae109c632b51f8419c4c2225d6 |
22-Apr-2010 |
Grace Kloba <klobag@google.com> |
Added the subset of partial content support so that we can continue the interrupted request to support streaming the content even with a brief disconnection. Note: we don't update the headers for partial content as the headers we care should not be updated. See a list in chromium/net/http/http_response_headers.cc. We currently also don't support cache for partial content. Fix http://b/issue?id=2616477
equest.java
|
7cfa90fee54f44831ac492891d1c123601c2a262 |
08-Apr-2010 |
Jesse Wilson <jessewilson@google.com> |
Move the public method HttpDateTime.parse() into AndroidHttpClient. See bug http://b/2553589 Change-Id: Ide3399c7c63daf9c0b8c18669076f2f4d6e9a876
ndroidHttpClient.java
ttpDateTime.java
|
f1cac90c7baafa48b47c5d178dd12a75ba89af0b |
31-Mar-2010 |
Robert Greenwalt <robdroid@android.com> |
Fix HttpProxy. A key bit of code was lost in change 38/25338/5 (2009/09/17 change of RequestQueue.java) which caused us to not pick up proxy settings. Putting it back. bug:2364475 Change-Id: I1e79858f64d8e793a966ef8e6f7a0d3f2a02251f
equestQueue.java
|
c76bfa5bb5e6e9afdae571e4b98d7f3dcc9a1669 |
24-Mar-2010 |
Steve Block <steveblock@google.com> |
Fixes synchronous XHR requests which require authentication to complete synchronously Bug: 2540515 Change-Id: I58eebdf2db9388f66c75d86dc26b8055f513b038
equestHandle.java
|
60708a75120c4469dc2683485301ff9ee3b022e0 |
23-Mar-2010 |
Leon Clarke <leonclarke@google.com> |
Fix for when flash loads cached crossdomain.xml files. Cache the x-permitted-cross-domain-policies header. http://b/issue?id=2519669
eaders.java
|
5b494c1ca4c3cf0e0992c59fe34ae66c81e6dcce |
12-Mar-2010 |
Ben Murdoch <benm@google.com> |
Add an API on the Java side to allow WebKit to pause the current load. This is used when the plugin is streaming data but it's buffer is full. In that case, WebCore instructs the laoder to pause loading to give the plugin a chance to clear it's buffer and continue. Requires an external/webkit change. Change-Id: Iec96a6325d92e979cbdc53289c2a20cad940ded2
equest.java
equestHandle.java
|
dba8cb76371960457e91b31fa396478f809a5a34 |
19-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
b/2511635 Browser displays incorrect SSL cert information Two more cases of "View certificate" problems like b/2511635 One problem is that if there are multiple resources downloaded for a page. In that case the mCertificate shown ends up being from the last loaded resource instead of the main resource of the page. The solution is to only set the certificate if the LoadListener is the mIsMainResourceLoader as well as the mIsMainPageLoader. A larger problem was the fact that the EventHandler.certificate interface method (in this case the LoadListener.certificate implementation) once per https connection instead of once per request as was documented. That meant if an https connection was reused (which happens frequently on login pages such as https://www.google.com/accounts which use the POST -> redirect -> GET idiom to avoid POST data page refresh warnings) then later pages never were associated with an SslCertificate. The solution was to change EventHandler.certificate to be called once per request, specifcally before the request. This means we no longer call the certificate method in the handleSslErrorRequest case, which is okay because it includes the SslCertificate within the SslError and that is what the BrowserActivity expects. Change-Id: Icbd9bd98c89db82762d1d06de85e1cde2470300d
onnection.java
ventHandler.java
ttpsConnection.java
|
ddb42a421fe110bfce8dab1cc241ca0fc1f5290e |
03-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
Merge "Fixing spelling of intiialization to initialization in comment"
|
a5987a510187749c32f0f68f8fc54e1334f91be6 |
02-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
SslCertificate should clone Dates To avoid external tampering with Dates withing SslCertificate by code holding on to pointers to Dates used in the constructor or code mutating values returned by the accessors, we now clone Dates taking in as arguments and returned to callers.
slCertificate.java
|
37254dcdcf9f9eee9c61e124d23f2cb7114adeda |
02-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
Fixing spelling of intiialization to initialization in comment
ttpsConnection.java
|
9147a0ed64917e82c3f70632bbc3a91895cc1d55 |
02-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
SslCertificate should use Dates - fixing api for build Also fixing missing @deprecated noticed when updating API
slCertificate.java
|
445d8f159258708e084d578edaf468239d6cecc1 |
02-Mar-2010 |
Brian Carlstrom <bdc@google.com> |
SslCertificate should provide Date interface While working on out openssl code, I found a Y2k bug that the dates from invalidate certificates could be shown as 1909 instead of 2009. The reason was because SslCertificate/BrowserActivity passed the values around as Strings even though the started as Dates (from X509Certificate) and were converted backed to Dates before presentation by BrowserActivity's reformatCertificateDate. SslCertificate now maintains date fields internally as Date objects without converting them to Strings. The constructor and String accessors, which are now @deprecated, now specify the format as an ISO 8601 date string which uses 4 digit years. BrowserActivity now reformatCertificateDate is now simply formatCertificateDate and no longer has to convert from String to Date and back to String to get proper Locale formatting. CTS SslCertificateTest also updated.
slCertificate.java
|
2269d1572e5fcfb725ea55f5764d8c3280d69f6d |
25-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Re-arrange android-common so framework no longer links with it. This is the framework part, moving classes around so the framework no longer needs to link to android-common. Makes some APIs public, others that didn't need to be public are private in the framework, some small things are copied.
ndroidHttpClient.java
ertificateChainValidator.java
ttpDateTime.java
|
ea4e597a87b51b8ec19798f3fdedf74a723d75d8 |
24-Feb-2010 |
Henrik Baard <henrik.baard@sonyericsson.com> |
Fixed problem with proxy server sometimes responds with 400 Bad Request when trying to connect to a site using https. The CONNECT to the server lacks the 'host' header which is mandatory according to the specification. Some proxy servers are strictly following the specification and sends back the 400 Bad Requst error code.
ttpsConnection.java
|
c4e834dc47885c8dbd3a2911ce4b9fccde21c800 |
08-Jan-2010 |
Huahui Wu <hwu@google.com> |
Rebuild a cleaner certificates chain before validating it. This change cleans the server certificates: 1. Use the end-entity certificate as found in the chain received from the server as the end-entity cert for the newly built chain. 2. Look at the last cert in the newly built chain, specifically it's "issuer" field. If there's a cert in the chain as received with this as the "subject", and this cert hasn't yet been moved into the newly built chain, move it there (as the new last cert). Repeat this step 2 until you can't continue (because there's no matching previously unused cert left). 3. If the last certificate in the new chain has expired (and it's not the end-entity cert), remember this fact, and remove it (so that we can try if we can validating the chain for a different root). If in this case it turns out that we still can't validate the chain, it's probably the cert expiry error that should be displayed. This CL also cleans the redundant error detection code and reduces the error messages to two types, which are the only two make differences to the user: a. SSL_IDMISMATCH for name mismatch, b. SSL_UNTRUSTED for other reasons.
ertificateChainValidator.java
|
6505122dfe96322bdeac4210d313b3f043c6a29a |
27-Jan-2010 |
Brian Carlstrom <bdc@google.com> |
Issue 1597: browser crash possibly related to invalid SSL certificate
slCertificate.java
|
8f028a94fc533e75077485a7d11a04e4de820335 |
08-Jan-2010 |
Makoto Onuki <omakoto@google.com> |
Moved DomainNameChecker to android common. - Moved DomainNameChecker from android.net.http to android common, and renamed to DomainNameValidator. - Added a simplified version of DNParser, which DomainNameValidator uses instead of X509Name in order to extract Subject Name from a certificate. - Added unit tests for DomainNameChecker and DNParser. There's a suspicious comment in DomainNameChecker saying something like "X509Certificate fails to parse a certificate when a subject alt name begins with '*'". I think we should fix it if it's really the case -- otherwise certificates with the wildcard wouldn't work. I'll see if it's true after submitting this patch.
ertificateChainValidator.java
omainNameChecker.java
|
106f9b244633171ab75dd98b9761b7137c1a4705 |
05-Jan-2010 |
Grace Kloba <klobag@google.com> |
Patch from Huahui Wu. Fix http://b/issue?id=1908085
omainNameChecker.java
|
7762d93621f508f4410fd37b5bbdfec0071b0420 |
11-Dec-2009 |
Paul Westbrook <pwestbro@google.com> |
Unbundling work Moved AndroidHttpClient, Rfc822InputFilter, Rfc822Validator NumberPicker, NumberPickerButton to android-common ---
ndroidHttpClient.java
|
ddcea3d21645bb3037703c84807dae077aae62ce |
04-Dec-2009 |
Grace Kloba <klobag@google.com> |
Expose onReceivedSslError() so that the WebView client can accept the error and continue. Fix http://b/issue?id=2299152
slError.java
|
9db3d07b9620b4269ab33f78604a36327e536ce1 |
13-Nov-2009 |
Jean-Baptiste Queru <jbq@google.com> |
eclair snapshot
onnection.java
onnectionThread.java
equest.java
equestHandle.java
equestQueue.java
|
86806ce11a89260147d7c2efa2c192b711d923db |
01-Oct-2009 |
Patrick Scott <phanna@android.com> |
Process synchronous requests in the same RequestQueue. Use a dedicated Connection to process a synchronous request using the main RequestQueue and on the WebCore thread. HttpConnection, HttpsConnection, Connection: No need for ConnectionManager, just pass the proxy host to HttpsConnection. In Connection.clearPipe, empty should be set to true if the RequestFeeder does _not_ have a request for the host. I don't think that broke anything but it is incorrect. ConnectionThread: Refactor the proxy selection into ConnectionManager.getConnection RequestHandle: Add a new constructor that takes a Connection argument. Add processRequest to process a single request on that Connection. RequestQueue: Add determine host to select between the request's host and the proxy. Add queueSynchronousRequest to make a new request that operates on a private connection. Add SyncFeeder to handle RequestFeeder.requeueRequest if the request fails. Network: Use the new RequestQueue api to handle a synchronous request. Bug: 1315832
onnection.java
onnectionThread.java
ttpConnection.java
ttpsConnection.java
equestHandle.java
equestQueue.java
|
aaebc86386c8bb44c25dd06fe573e52ef6b60fbe |
16-Sep-2009 |
Patrick Scott <phanna@android.com> |
Remove the network connection logic from RequestQueue. This doesn't always work right and is causing some problems if the network comes back up without sending the broadcast.
onnection.java
equestQueue.java
|
72b1f379d5c97c8ff31d2201e78215af777d6bda |
31-Aug-2009 |
Jean-Baptiste Queru <jbq@google.com> |
donut snapshot
ertificateChainValidator.java
|
5dc0c00258f90a546efcfdeca87f8e57c5a07a54 |
21-Aug-2009 |
Bob Lee <crazybob@google.com> |
am e97c2006: Updated Browser and MCS to use shared default trust manager instead of initializing their own copies. Merge commit 'e97c2006bf7c391c933307e520a392e532aa5d6a' into eclair * commit 'e97c2006bf7c391c933307e520a392e532aa5d6a': Updated Browser and MCS to use shared default trust manager instead of initializing their own copies.
|
e97c2006bf7c391c933307e520a392e532aa5d6a |
21-Aug-2009 |
Bob Lee <crazybob@google.com> |
Updated Browser and MCS to use shared default trust manager instead of initializing their own copies.
ertificateChainValidator.java
|
ac1e59d887651220f5367cc7fa4207b34eab774d |
11-Aug-2009 |
Jean-Baptiste Queru <jbq@google.com> |
donut snapshot
ventHandler.java
ttpsConnection.java
oggingEventHandler.java
|
f6d1a5528ee626487c78f17501d61e61bbe26b10 |
03-Aug-2009 |
Grace Kloba <klobag@google.com> |
resolved conflicts for merge of b8802b21 to master
|
4c8db8a4feb2afbd9d5f94ff09c7167ca34076c4 |
31-Jul-2009 |
Grace Kloba <klobag@google.com> |
Fix #2025900. If a https request is canceled while openConnection is called and a ssl error happened, the http thread can be blocked for up to 10 min. Added code to detect this case and unlock the thread.
ventHandler.java
ttpsConnection.java
oggingEventHandler.java
|
a16de7b03a1b2fe9e5eca55ce677c121e97079f8 |
25-Jul-2009 |
Grace Kloba <klobag@google.com> |
Fix 1993520 where page cycler fails. Recover the old logic before removing network management. Remove the empty list for the host after consuming the last entry. As we should never have an empty list, it is safe to call removeFirst without checking whether it is empty. Currently, in getRequest() or removeFrist(), if we found an empty list, we remove it. Then we return null for the request even there are requests in another list. So the page stops loading until the next getRequest() or removeFirst() is called. If they are not called, those requests will never be accessed.
equestQueue.java
|
cf4550c3198d6b3d92cdc52707fe70d7cc0caa9f |
21-Jul-2009 |
Jean-Baptiste Queru <jbq@google.com> |
donut snapshot
equestHandle.java
|
c319c69b1228f5eee2f9d71a71ad021f3d8ba82b |
20-Jul-2009 |
Patrick Scott <phanna@android.com> |
Allow 205 and 305 to have content. 205 is interpreted by Safari to be like 200 and show the given content. Change canHaveResponseBody to allow 205 to have a body. 305 is a very rare server response indicating to the client to use the given Location header as a proxy and reissue the original request. Curl doesn't do anything with this header and neither does internal networking code. For now, we will just allow the response body to propagate to webcore.
equest.java
|
4a06b68c82fc011d8cd780ed7f0393d1d0617a07 |
20-Jul-2009 |
Patrick Scott <phanna@android.com> |
Correctly set the thread priority for ConnectionThreads. This does not change the actual thread priority but if the default priority changes, this will have the desired result of being slightly less favorable. I tried messing with the priorities to see if a higher or lower priority helped but it seemed to do more harm than good. It might be worth more investigation to find out where all the thread time is being spent so we can determine the correct priority.
onnectionThread.java
|
fe4fec7c66b0d956f008ead0fd899b588cfacb5d |
14-Jul-2009 |
Patrick Scott <phanna@android.com> |
Remove all our old high priority knowledge since WebCore will manage it. Also removed an unused variable in RequestQueue.java.
equest.java
equestHandle.java
equestQueue.java
|
340a1b21de7d5f650b15fab2bcda355ae9776f90 |
03-Jul-2009 |
Grace Kloba <klobag@google.com> |
Fix the performance collection in the http thread. A connection can be reused. Change the thread time collection based on per request.
onnectionThread.java
equestQueue.java
|
e10809d02cd16bb31e1e9b094c612094af08757c |
01-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 7a573862: Merge change 5720 into donut Merge commit '7a5738624fa78e328b5f36c687c20b9cf0eb5a60' * commit '7a5738624fa78e328b5f36c687c20b9cf0eb5a60': Fix #1876303. Even rfc2616 4.2 says that "Field names are case-insensitive.", servers including Google internal uses case-sensitive checking for "Cookie". So change it.
|
65c0fc4fc445374c7f6e2106e6ed3d6191e45cae |
30-Jun-2009 |
Grace Kloba <klobag@google.com> |
Fix #1876303. Even rfc2616 4.2 says that "Field names are case-insensitive.", servers including Google internal uses case-sensitive checking for "Cookie". So change it.
equestHandle.java
|
7cd64bd7e7425408f0dc7e1212e81950a7dab217 |
10-Jun-2009 |
Grace Kloba <klobag@google.com> |
Fix #1907439. If there is uncommitted content when gzipped content got EOFException, we need to commit them.
equest.java
|
843ef36f7b96cc19ea7d2996b7c8661b41ec3452 |
20-May-2009 |
Jean-Baptiste Queru <jbq@google.com> |
donut snapshot
ertificateValidatorCache.java
|
b5b33c734ab2a178f07c667a8c1daf8beab837aa |
15-May-2009 |
Patrick Scott <phanna@android.com> |
Order high priority requests in the same order they are requested. Use a class to hold the high priority requests and low priority requests. Each request is appended to the correct list in the order received. If a request needs to be requeued after an error, it is placed at the head of the corresponding list.
equestQueue.java
|
67fd6d50af256265c8103d844212934f86079815 |
15-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 1c9a92fd: Merge change 1690 into donut Merge commit '1c9a92fd9fbe192f24e53c26cddeab401cefb108' * commit '1c9a92fd9fbe192f24e53c26cddeab401cefb108': Rework some code so that it works the way it was supposed to work.
|
3537506c883cdf4f4b792590abb5a8acb937503a |
14-May-2009 |
Marco Nelissen <marcone@google.com> |
Rework some code so that it works the way it was supposed to work.
ertificateValidatorCache.java
|
45efe69f8019f9743aef4d2b4eb6acf56ea0551f |
09-May-2009 |
Grace Kloba <klobag@google.com> |
Fix #1807059. If it is "POST", always use BasicHttpEntityEnclosingRequest even bodyProvider is null. This ensures the content-type, content-encoding and content-length are set correctly.
equest.java
|
886f3d69b79748fe937725e33b8bbb3d67ab82c7 |
25-Mar-2009 |
Bob Lee <> |
Automated import from //branches/donutburger/...@141355,141355
ertificateChainValidator.java
ttpsConnection.java
|
ef0996ffa36cfe9b7927e09aece801fb4f594ced |
25-Mar-2009 |
Bob Lee <> |
Automated import from //branches/master/...@141357,141357
ertificateChainValidator.java
ttpsConnection.java
|
c2ad241504fcaa12d4579d3b0b4038d1ca8d08c9 |
20-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake_rel/...@141571
ertificateChainValidator.java
ttpsConnection.java
|
4df2423a947bcd3f024cc3d3a1a315a8dc428598 |
05-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@136594
ndroidHttpClient.java
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html
|
076357b8567458d4b6dfdcf839ef751634cd2bfb |
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@132589
ndroidHttpClient.java
ertificateChainValidator.java
|
3dec7d563a2f3e1eb967ce2054a00b6620e3558c |
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@137055
ndroidHttpClient.java
ertificateChainValidator.java
|
d24b8183b93e781080b2c16c487e60d51c12da31 |
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
ndroidHttpClient.java
equestHandle.java
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
onnection.java
eaders.java
equest.java
equestHandle.java
equestQueue.java
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
ndroidHttpClient.java
ndroidHttpClientConnection.java
ertificateChainValidator.java
ertificateValidatorCache.java
harArrayBuffers.java
onnection.java
onnectionThread.java
omainNameChecker.java
ventHandler.java
eaders.java
ttpAuthHeader.java
ttpConnection.java
ttpLog.java
ttpsConnection.java
dleCache.java
oggingEventHandler.java
equest.java
equestFeeder.java
equestHandle.java
equestQueue.java
slCertificate.java
slError.java
imer.java
ackage.html
|