Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(325)

Side by Side Diff: chrome/browser/ssl/ssl_browser_tests.cc

Issue 1035023002: Adding the Finch code for the certificate error reporter experiment (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: fix resolution mix-up Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « chrome/browser/ssl/ssl_blocking_page.cc ('k') | chrome/common/chrome_switches.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/bind.h" 5 #include "base/bind.h"
6 #include "base/bind_helpers.h" 6 #include "base/bind_helpers.h"
7 #include "base/callback.h" 7 #include "base/callback.h"
8 #include "base/command_line.h" 8 #include "base/command_line.h"
9 #include "base/metrics/field_trial.h"
9 #include "base/prefs/pref_service.h" 10 #include "base/prefs/pref_service.h"
10 #include "base/strings/string_util.h" 11 #include "base/strings/string_util.h"
11 #include "base/strings/stringprintf.h" 12 #include "base/strings/stringprintf.h"
12 #include "base/strings/utf_string_conversions.h" 13 #include "base/strings/utf_string_conversions.h"
13 #include "base/time/time.h" 14 #include "base/time/time.h"
14 #include "chrome/app/chrome_command_ids.h" 15 #include "chrome/app/chrome_command_ids.h"
15 #include "chrome/browser/browser_process.h" 16 #include "chrome/browser/browser_process.h"
16 #include "chrome/browser/chrome_notification_types.h" 17 #include "chrome/browser/chrome_notification_types.h"
17 #include "chrome/browser/interstitials/security_interstitial_page_test_utils.h" 18 #include "chrome/browser/interstitials/security_interstitial_page_test_utils.h"
18 #include "chrome/browser/net/certificate_error_reporter.h" 19 #include "chrome/browser/net/certificate_error_reporter.h"
19 #include "chrome/browser/profiles/profile.h" 20 #include "chrome/browser/profiles/profile.h"
20 #include "chrome/browser/safe_browsing/ping_manager.h" 21 #include "chrome/browser/safe_browsing/ping_manager.h"
21 #include "chrome/browser/safe_browsing/safe_browsing_service.h" 22 #include "chrome/browser/safe_browsing/safe_browsing_service.h"
22 #include "chrome/browser/ssl/ssl_blocking_page.h" 23 #include "chrome/browser/ssl/ssl_blocking_page.h"
23 #include "chrome/browser/ui/browser.h" 24 #include "chrome/browser/ui/browser.h"
24 #include "chrome/browser/ui/browser_commands.h" 25 #include "chrome/browser/ui/browser_commands.h"
25 #include "chrome/browser/ui/browser_navigator.h" 26 #include "chrome/browser/ui/browser_navigator.h"
26 #include "chrome/browser/ui/browser_tabstrip.h" 27 #include "chrome/browser/ui/browser_tabstrip.h"
27 #include "chrome/browser/ui/tabs/tab_strip_model.h" 28 #include "chrome/browser/ui/tabs/tab_strip_model.h"
28 #include "chrome/common/chrome_paths.h" 29 #include "chrome/common/chrome_paths.h"
29 #include "chrome/common/chrome_switches.h" 30 #include "chrome/common/chrome_switches.h"
30 #include "chrome/common/pref_names.h" 31 #include "chrome/common/pref_names.h"
31 #include "chrome/test/base/in_process_browser_test.h" 32 #include "chrome/test/base/in_process_browser_test.h"
32 #include "chrome/test/base/ui_test_utils.h" 33 #include "chrome/test/base/ui_test_utils.h"
33 #include "components/content_settings/core/browser/host_content_settings_map.h" 34 #include "components/content_settings/core/browser/host_content_settings_map.h"
35 #include "components/variations/variations_associated_data.h"
34 #include "components/web_modal/web_contents_modal_dialog_manager.h" 36 #include "components/web_modal/web_contents_modal_dialog_manager.h"
35 #include "content/public/browser/browser_context.h" 37 #include "content/public/browser/browser_context.h"
36 #include "content/public/browser/interstitial_page.h" 38 #include "content/public/browser/interstitial_page.h"
37 #include "content/public/browser/navigation_controller.h" 39 #include "content/public/browser/navigation_controller.h"
38 #include "content/public/browser/navigation_entry.h" 40 #include "content/public/browser/navigation_entry.h"
39 #include "content/public/browser/notification_service.h" 41 #include "content/public/browser/notification_service.h"
40 #include "content/public/browser/render_frame_host.h" 42 #include "content/public/browser/render_frame_host.h"
41 #include "content/public/browser/render_view_host.h" 43 #include "content/public/browser/render_view_host.h"
42 #include "content/public/browser/render_widget_host_view.h" 44 #include "content/public/browser/render_widget_host_view.h"
43 #include "content/public/browser/web_contents.h" 45 #include "content/public/browser/web_contents.h"
(...skipping 23 matching lines...) Expand all
67 using content::InterstitialPage; 69 using content::InterstitialPage;
68 using content::NavigationController; 70 using content::NavigationController;
69 using content::NavigationEntry; 71 using content::NavigationEntry;
70 using content::SSLStatus; 72 using content::SSLStatus;
71 using content::WebContents; 73 using content::WebContents;
72 using web_modal::WebContentsModalDialogManager; 74 using web_modal::WebContentsModalDialogManager;
73 75
74 const base::FilePath::CharType kDocRoot[] = 76 const base::FilePath::CharType kDocRoot[] =
75 FILE_PATH_LITERAL("chrome/test/data"); 77 FILE_PATH_LITERAL("chrome/test/data");
76 78
79 // Const for the Finch group DontShowDontSend
80 const char kHTTPSErrorReporterFinchGroupDontShowDontSend[] =
81 "DontShowAndDontSend";
82
77 namespace { 83 namespace {
78 84
79 class ProvisionalLoadWaiter : public content::WebContentsObserver { 85 class ProvisionalLoadWaiter : public content::WebContentsObserver {
80 public: 86 public:
81 explicit ProvisionalLoadWaiter(WebContents* tab) 87 explicit ProvisionalLoadWaiter(WebContents* tab)
82 : WebContentsObserver(tab), waiting_(false), seen_(false) {} 88 : WebContentsObserver(tab), waiting_(false), seen_(false) {}
83 89
84 void Wait() { 90 void Wait() {
85 if (seen_) 91 if (seen_)
86 return; 92 return;
(...skipping 379 matching lines...) Expand 10 before | Expand all | Expand 10 after
466 472
467 if (expect_report == CertificateReporting::CERT_REPORT_EXPECTED) { 473 if (expect_report == CertificateReporting::CERT_REPORT_EXPECTED) {
468 // Check that the mock reporter received a request to send a report. 474 // Check that the mock reporter received a request to send a report.
469 EXPECT_EQ(https_server_expired_.GetURL("/").host(), 475 EXPECT_EQ(https_server_expired_.GetURL("/").host(),
470 reporter_->latest_hostname_reported()); 476 reporter_->latest_hostname_reported());
471 } else { 477 } else {
472 EXPECT_EQ(std::string(), reporter_->latest_hostname_reported()); 478 EXPECT_EQ(std::string(), reporter_->latest_hostname_reported());
473 } 479 }
474 } 480 }
475 481
482 // Helper function to set the Finch options
483 void SetCertReportingFinchConfig(const std::string& group_name,
484 const std::string& param_value) {
485 base::FieldTrialList::CreateFieldTrial(
486 kHTTPSErrorReporterFinchExperimentName, group_name);
487 if (!param_value.empty()) {
488 std::map<std::string, std::string> params;
489 params[kHTTPSErrorReporterFinchParamName] = param_value;
490 variations::AssociateVariationParams(
491 kHTTPSErrorReporterFinchExperimentName, group_name, params);
492 }
493 }
494
495 // Helper function to set the Finch options in case we have no parameter
496 void SetCertReportingFinchConfig(const std::string& group_name) {
497 SetCertReportingFinchConfig(group_name, std::string());
498 }
499
476 net::SpawnedTestServer https_server_; 500 net::SpawnedTestServer https_server_;
477 net::SpawnedTestServer https_server_expired_; 501 net::SpawnedTestServer https_server_expired_;
478 net::SpawnedTestServer https_server_mismatched_; 502 net::SpawnedTestServer https_server_mismatched_;
479 net::SpawnedTestServer wss_server_expired_; 503 net::SpawnedTestServer wss_server_expired_;
480 504
481 private: 505 private:
482 typedef net::SpawnedTestServer::SSLOptions SSLOptions; 506 typedef net::SpawnedTestServer::SSLOptions SSLOptions;
483 CertificateReporting::MockReporter* reporter_; 507 CertificateReporting::MockReporter* reporter_;
484 508
485 DISALLOW_COPY_AND_ASSIGN(SSLUITest); 509 DISALLOW_COPY_AND_ASSIGN(SSLUITest);
(...skipping 25 matching lines...) Expand all
511 535
512 void SetUpCommandLine(base::CommandLine* command_line) override { 536 void SetUpCommandLine(base::CommandLine* command_line) override {
513 // Browser will ignore certificate errors on localhost. 537 // Browser will ignore certificate errors on localhost.
514 command_line->AppendSwitch(switches::kAllowInsecureLocalhost); 538 command_line->AppendSwitch(switches::kAllowInsecureLocalhost);
515 } 539 }
516 }; 540 };
517 541
518 class SSLUITestWithExtendedReporting : public SSLUITest { 542 class SSLUITestWithExtendedReporting : public SSLUITest {
519 public: 543 public:
520 SSLUITestWithExtendedReporting() : SSLUITest() {} 544 SSLUITestWithExtendedReporting() : SSLUITest() {}
521
522 void SetUpCommandLine(base::CommandLine* command_line) override {
523 // Enable a checkbox on SSL interstitials that allows users to opt
524 // in to reporting invalid certificate chains.
525 command_line->AppendSwitch(switches::kEnableInvalidCertCollection);
526 }
527 }; 545 };
528 546
529 // Visits a regular page over http. 547 // Visits a regular page over http.
530 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) { 548 IN_PROC_BROWSER_TEST_F(SSLUITest, TestHTTP) {
531 ASSERT_TRUE(test_server()->Start()); 549 ASSERT_TRUE(test_server()->Start());
532 550
533 ui_test_utils::NavigateToURL(browser(), 551 ui_test_utils::NavigateToURL(browser(),
534 test_server()->GetURL("files/ssl/google.html")); 552 test_server()->GetURL("files/ssl/google.html"));
535 553
536 CheckUnauthenticatedState( 554 CheckUnauthenticatedState(
(...skipping 579 matching lines...) Expand 10 before | Expand all | Expand 10 after
1116 &replacement_path)); 1134 &replacement_path));
1117 1135
1118 // Load a page that displays insecure content. 1136 // Load a page that displays insecure content.
1119 ui_test_utils::NavigateToURL(browser(), 1137 ui_test_utils::NavigateToURL(browser(),
1120 https_server_.GetURL(replacement_path)); 1138 https_server_.GetURL(replacement_path));
1121 1139
1122 CheckAuthenticatedState(browser()->tab_strip_model()->GetActiveWebContents(), 1140 CheckAuthenticatedState(browser()->tab_strip_model()->GetActiveWebContents(),
1123 AuthState::DISPLAYED_INSECURE_CONTENT); 1141 AuthState::DISPLAYED_INSECURE_CONTENT);
1124 } 1142 }
1125 1143
1126 // Test that when the checkbox is checked and the user proceeds through 1144 // User proceeds, checkbox is shown and checked, Finch parameter is set
1127 // the interstitial, the FraudulentCertificateReporter sees a request to 1145 // -> we expect a report.
1128 // send a report. 1146 IN_PROC_BROWSER_TEST_F(
1129 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, 1147 SSLUITestWithExtendedReporting,
1130 TestBrokenHTTPSProceedWithReporting) { 1148 TestBrokenHTTPSProceedWithShowYesCheckYesParamYesReportYes) {
1149 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1150 "1.0");
1131 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN, 1151 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1132 CertificateReporting::SSL_INTERSTITIAL_PROCEED, 1152 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1133 CertificateReporting::CERT_REPORT_EXPECTED, 1153 CertificateReporting::CERT_REPORT_EXPECTED,
1134 browser()); 1154 browser());
1135 } 1155 }
1136 1156
1137 // Test that when the checkbox is checked and the user goes back (does 1157 // User goes back, checkbox is shown and checked, Finch parameter is set
1138 // not proceed through the interstitial), the 1158 // -> we expect a report.
1139 // FraudulentCertificateReporter sees a request to send a report. 1159 IN_PROC_BROWSER_TEST_F(
1140 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, 1160 SSLUITestWithExtendedReporting,
1141 TestBrokenHTTPSGoBackWithReporting) { 1161 TestBrokenHTTPSGoBackWithShowYesCheckYesParamYesReportYes) {
1162 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1163 "1.0");
1142 TestBrokenHTTPSReporting( 1164 TestBrokenHTTPSReporting(
1143 CertificateReporting::EXTENDED_REPORTING_OPT_IN, 1165 CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1144 CertificateReporting::SSL_INTERSTITIAL_DO_NOT_PROCEED, 1166 CertificateReporting::SSL_INTERSTITIAL_DO_NOT_PROCEED,
1145 CertificateReporting::CERT_REPORT_EXPECTED, browser()); 1167 CertificateReporting::CERT_REPORT_EXPECTED, browser());
1146 } 1168 }
1147 1169
1148 // Test that when the checkbox is not checked and the user proceeds 1170 // User proceeds, checkbox is shown but unchecked, Finch parameter is set
1149 // through the interstitial, the FraudulentCertificateReporter does not 1171 // -> we expect no report.
1150 // see a request to send a report. 1172 IN_PROC_BROWSER_TEST_F(
1151 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, 1173 SSLUITestWithExtendedReporting,
1152 TestBrokenHTTPSProceedWithNoReporting) { 1174 TestBrokenHTTPSProceedWithShowYesCheckNoParamYesReportNo) {
1175 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1176 "1.0");
1153 TestBrokenHTTPSReporting( 1177 TestBrokenHTTPSReporting(
1154 CertificateReporting::EXTENDED_REPORTING_DO_NOT_OPT_IN, 1178 CertificateReporting::EXTENDED_REPORTING_DO_NOT_OPT_IN,
1155 CertificateReporting::SSL_INTERSTITIAL_PROCEED, 1179 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1156 CertificateReporting::CERT_REPORT_NOT_EXPECTED, browser()); 1180 CertificateReporting::CERT_REPORT_NOT_EXPECTED, browser());
1157 } 1181 }
1158 1182
1159 // Test that when the checkbox is not checked and the user does not proceed 1183 // User goes back, checkbox is shown but unchecked, Finch parameter is set
1160 // through the interstitial, the FraudulentCertificateReporter does not 1184 // -> we expect no report.
1161 // see a request to send a report.
1162 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, 1185 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting,
1163 TestBrokenHTTPSGoBackWithNoReporting) { 1186 TestBrokenHTTPSGoBackShowYesCheckNoParamYesReportNo) {
1187 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1188 "1.0");
1164 TestBrokenHTTPSReporting( 1189 TestBrokenHTTPSReporting(
1165 CertificateReporting::EXTENDED_REPORTING_DO_NOT_OPT_IN, 1190 CertificateReporting::EXTENDED_REPORTING_DO_NOT_OPT_IN,
1166 CertificateReporting::SSL_INTERSTITIAL_DO_NOT_PROCEED, 1191 CertificateReporting::SSL_INTERSTITIAL_DO_NOT_PROCEED,
1167 CertificateReporting::CERT_REPORT_NOT_EXPECTED, browser()); 1192 CertificateReporting::CERT_REPORT_NOT_EXPECTED, browser());
1168 } 1193 }
1169 1194
1170 // Test that when the command-line switch for reporting invalid cert 1195 // User proceeds, checkbox is shown and checked, Finch parameter is not
1171 // chains is not enabled, reports don't get sent, even if the opt-in 1196 // set -> we expect no report.
1172 // preference is set. (i.e. if a user enables invalid cert collection in 1197 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting,
1173 // chrome://flags, checks the box on an interstitial, and then disables 1198 TestBrokenHTTPSProceedShowYesCheckYesParamNoReportNo) {
1174 // the flag in chrome://flags, reports shouldn't be sent on the next 1199 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1175 // interstitial). 1200 "-1.0");
1176 IN_PROC_BROWSER_TEST_F(SSLUITest, TestBrokenHTTPSNoReportingWithoutSwitch) {
1177 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN, 1201 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1178 CertificateReporting::SSL_INTERSTITIAL_PROCEED, 1202 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1179 CertificateReporting::CERT_REPORT_NOT_EXPECTED, 1203 CertificateReporting::CERT_REPORT_NOT_EXPECTED,
1180 browser()); 1204 browser());
1181 } 1205 }
1182 1206
1183 // Test that reports don't get sent in incognito mode even if the opt-in 1207 // User goes back, checkbox is shown and checked, Finch parameter is not set
1184 // preference is set and the command-line switch is enabled. 1208 // -> we expect no report.
1185 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting, 1209 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting,
1186 TestBrokenHTTPSNoReportingInIncognito) { 1210 TestBrokenHTTPSGoBackShowYesCheckYesParamNoReportNo) {
1211 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1212 "-1.0");
1213 TestBrokenHTTPSReporting(
1214 CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1215 CertificateReporting::SSL_INTERSTITIAL_DO_NOT_PROCEED,
1216 CertificateReporting::CERT_REPORT_NOT_EXPECTED, browser());
1217 }
1218
1219 // User proceeds, checkbox is not shown but checked -> we expect no report
1220 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting,
1221 TestBrokenHTTPSProceedShowNoCheckYesReportNo) {
1222 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupDontShowDontSend);
1223 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1224 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1225 CertificateReporting::CERT_REPORT_NOT_EXPECTED,
1226 browser());
1227 }
1228
1229 // Browser is incognito, user proceeds, checkbox is shown and checked, Finch
1230 // parameter is set -> we expect no report
1231 IN_PROC_BROWSER_TEST_F(SSLUITestWithExtendedReporting,
1232 TestBrokenHTTPSInIncognitoReportNo) {
1233 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1234 "1.0");
1187 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN, 1235 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1188 CertificateReporting::SSL_INTERSTITIAL_PROCEED, 1236 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1189 CertificateReporting::CERT_REPORT_NOT_EXPECTED, 1237 CertificateReporting::CERT_REPORT_NOT_EXPECTED,
1190 CreateIncognitoBrowser()); 1238 CreateIncognitoBrowser());
1191 } 1239 }
1192 1240
1241 // User proceeds, checkbox is shown and checked, Finch parameter is invalid
1242 // -> we expect no report.
1243 IN_PROC_BROWSER_TEST_F(
1244 SSLUITestWithExtendedReporting,
1245 TestBrokenHTTPSProceedWithShowYesCheckYesParamInvalidReportNo) {
1246 SetCertReportingFinchConfig(kHTTPSErrorReporterFinchGroupShowPossiblySend,
1247 "abcdef");
1248 TestBrokenHTTPSReporting(CertificateReporting::EXTENDED_REPORTING_OPT_IN,
1249 CertificateReporting::SSL_INTERSTITIAL_PROCEED,
1250 CertificateReporting::CERT_REPORT_NOT_EXPECTED,
1251 browser());
1252 }
1253
1193 // Visits a page that runs insecure content and tries to suppress the insecure 1254 // Visits a page that runs insecure content and tries to suppress the insecure
1194 // content warnings by randomizing location.hash. 1255 // content warnings by randomizing location.hash.
1195 // Based on http://crbug.com/8706 1256 // Based on http://crbug.com/8706
1196 IN_PROC_BROWSER_TEST_F(SSLUITest, 1257 IN_PROC_BROWSER_TEST_F(SSLUITest,
1197 TestRunsInsecuredContentRandomizeHash) { 1258 TestRunsInsecuredContentRandomizeHash) {
1198 ASSERT_TRUE(test_server()->Start()); 1259 ASSERT_TRUE(test_server()->Start());
1199 ASSERT_TRUE(https_server_.Start()); 1260 ASSERT_TRUE(https_server_.Start());
1200 1261
1201 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL( 1262 ui_test_utils::NavigateToURL(browser(), https_server_.GetURL(
1202 "files/ssl/page_runs_insecure_content.html")); 1263 "files/ssl/page_runs_insecure_content.html"));
(...skipping 949 matching lines...) Expand 10 before | Expand all | Expand 10 after
2152 2213
2153 // Visit a page over https that contains a frame with a redirect. 2214 // Visit a page over https that contains a frame with a redirect.
2154 2215
2155 // XMLHttpRequest insecure content in synchronous mode. 2216 // XMLHttpRequest insecure content in synchronous mode.
2156 2217
2157 // XMLHttpRequest insecure content in asynchronous mode. 2218 // XMLHttpRequest insecure content in asynchronous mode.
2158 2219
2159 // XMLHttpRequest over bad ssl in synchronous mode. 2220 // XMLHttpRequest over bad ssl in synchronous mode.
2160 2221
2161 // XMLHttpRequest over OK ssl in synchronous mode. 2222 // XMLHttpRequest over OK ssl in synchronous mode.
OLDNEW
« no previous file with comments | « chrome/browser/ssl/ssl_blocking_page.cc ('k') | chrome/common/chrome_switches.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698