| Index: net/test/base_test_server.cc
|
| diff --git a/net/test/base_test_server.cc b/net/test/base_test_server.cc
|
| index e672f19207355171bdd30a2fe7e8ce98c8560213..7ca7f7ffc550715557ea48060cb06d25896c3484 100644
|
| --- a/net/test/base_test_server.cc
|
| +++ b/net/test/base_test_server.cc
|
| @@ -339,9 +339,7 @@ bool BaseTestServer::GenerateArguments(base::DictionaryValue* arguments) const {
|
| if (VLOG_IS_ON(1) || log_to_console_)
|
| arguments->Set("log-to-console", base::Value::CreateNullValue());
|
|
|
| - if (type_ == TYPE_HTTPS) {
|
| - arguments->Set("https", base::Value::CreateNullValue());
|
| -
|
| + if (UsingSSL(type_)) {
|
| // Check the certificate arguments of the HTTPS server.
|
| FilePath certificate_path(certificates_dir_);
|
| FilePath certificate_file(ssl_options_.GetCertificateFile());
|
| @@ -356,10 +354,6 @@ bool BaseTestServer::GenerateArguments(base::DictionaryValue* arguments) const {
|
| arguments->SetString("cert-and-key-file", certificate_path.value());
|
| }
|
|
|
| - std::string ocsp_arg = ssl_options_.GetOCSPArgument();
|
| - if (!ocsp_arg.empty())
|
| - arguments->SetString("ocsp", ocsp_arg);
|
| -
|
| // Check the client certificate related arguments.
|
| if (ssl_options_.request_client_certificate)
|
| arguments->Set("ssl-client-auth", base::Value::CreateNullValue());
|
| @@ -378,6 +372,14 @@ bool BaseTestServer::GenerateArguments(base::DictionaryValue* arguments) const {
|
|
|
| if (ssl_client_certs->GetSize())
|
| arguments->Set("ssl-client-ca", ssl_client_certs.release());
|
| + }
|
| +
|
| + if (type_ == TYPE_HTTPS) {
|
| + arguments->Set("https", base::Value::CreateNullValue());
|
| +
|
| + std::string ocsp_arg = ssl_options_.GetOCSPArgument();
|
| + if (!ocsp_arg.empty())
|
| + arguments->SetString("ocsp", ocsp_arg);
|
|
|
| // Check bulk cipher argument.
|
| scoped_ptr<base::ListValue> bulk_cipher_values(new base::ListValue());
|
|
|