| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index 5e5cdd8f86545b6ef66112601f405c91f469e253..20687e91a887e992c923a416b7ac11a4bcabd10a 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -7896,7 +7896,6 @@ class FallbackTestURLRequestContext : public TestURLRequestContext {
|
| false /* online revocation checking */,
|
| false /* require rev. checking for local
|
| anchors */);
|
| - ssl_config_service->set_min_version(SSL_PROTOCOL_VERSION_SSL3);
|
| ssl_config_service->set_fallback_min_version(version);
|
| set_ssl_config_service(ssl_config_service);
|
| }
|
| @@ -8024,7 +8023,7 @@ TEST_F(HTTPSFallbackTest, FallbackSCSVClosed) {
|
| ExpectFailure(ERR_CONNECTION_CLOSED);
|
| }
|
|
|
| -// Tests that the SSLv3 fallback doesn't happen by default.
|
| +// Tests that the SSLv3 fallback doesn't happen.
|
| TEST_F(HTTPSFallbackTest, SSLv3Fallback) {
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| @@ -8035,39 +8034,25 @@ TEST_F(HTTPSFallbackTest, SSLv3Fallback) {
|
| ExpectFailure(ERR_SSL_VERSION_OR_CIPHER_MISMATCH);
|
| }
|
|
|
| -// Tests that the SSLv3 fallback works when explicitly enabled.
|
| -TEST_F(HTTPSFallbackTest, SSLv3FallbackEnabled) {
|
| - SpawnedTestServer::SSLOptions ssl_options(
|
| - SpawnedTestServer::SSLOptions::CERT_OK);
|
| - ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| - set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3);
|
| -
|
| - ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options));
|
| - ExpectConnection(SSL_CONNECTION_VERSION_SSL3);
|
| -}
|
| -
|
| -// Tests that the SSLv3 fallback triggers on closed connections when explicitly
|
| -// enabled.
|
| +// Tests that the TLSv1 fallback triggers on closed connections.
|
| TEST_F(HTTPSFallbackTest, SSLv3FallbackClosed) {
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| + SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1;
|
| ssl_options.tls_intolerance_type =
|
| SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE;
|
| - set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3);
|
|
|
| ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options));
|
| - ExpectConnection(SSL_CONNECTION_VERSION_SSL3);
|
| + ExpectConnection(SSL_CONNECTION_VERSION_TLS1);
|
| }
|
|
|
| -// Test that SSLv3 fallback probe connections don't cause sessions to be cached.
|
| -TEST_F(HTTPSRequestTest, SSLv3FallbackNoCache) {
|
| +// Test that fallback probe connections don't cause sessions to be cached.
|
| +TEST_F(HTTPSRequestTest, FallbackProbeNoCache) {
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| + SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1;
|
| ssl_options.tls_intolerance_type =
|
| SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE;
|
| ssl_options.record_resume = true;
|
| @@ -8080,14 +8065,14 @@ TEST_F(HTTPSRequestTest, SSLv3FallbackNoCache) {
|
|
|
| SSLClientSocket::ClearSessionCache();
|
|
|
| - // Make a connection that does a probe fallback to SSLv3 but fails because
|
| - // SSLv3 fallback is disabled. We don't wish a session for this connection to
|
| + // Make a connection that does a probe fallback to TLSv1 but fails because
|
| + // TLSv1 fallback is disabled. We don't wish a session for this connection to
|
| // be inserted locally.
|
| {
|
| TestDelegate delegate;
|
| FallbackTestURLRequestContext context(true);
|
|
|
| - context.set_fallback_min_version(SSL_PROTOCOL_VERSION_TLS1);
|
| + context.set_fallback_min_version(SSL_PROTOCOL_VERSION_TLS1_2);
|
| context.Init();
|
| scoped_ptr<URLRequest> request(context.CreateRequest(
|
| test_server.GetURL(std::string()), DEFAULT_PRIORITY, &delegate));
|
| @@ -8102,11 +8087,11 @@ TEST_F(HTTPSRequestTest, SSLv3FallbackNoCache) {
|
| request->status().error());
|
| }
|
|
|
| - // Now allow SSLv3 connections and request the session cache log.
|
| + // Now allow TLSv1 fallback connections and request the session cache log.
|
| {
|
| TestDelegate delegate;
|
| FallbackTestURLRequestContext context(true);
|
| - context.set_fallback_min_version(SSL_PROTOCOL_VERSION_SSL3);
|
| + context.set_fallback_min_version(SSL_PROTOCOL_VERSION_TLS1);
|
|
|
| context.Init();
|
| scoped_ptr<URLRequest> request(context.CreateRequest(
|
| @@ -8117,8 +8102,9 @@ TEST_F(HTTPSRequestTest, SSLv3FallbackNoCache) {
|
|
|
| EXPECT_EQ(1, delegate.response_started_count());
|
| EXPECT_NE(0, delegate.bytes_received());
|
| - EXPECT_EQ(SSL_CONNECTION_VERSION_SSL3, SSLConnectionStatusToVersion(
|
| - request->ssl_info().connection_status));
|
| + EXPECT_EQ(
|
| + SSL_CONNECTION_VERSION_TLS1,
|
| + SSLConnectionStatusToVersion(request->ssl_info().connection_status));
|
| EXPECT_TRUE(request->ssl_info().connection_status &
|
| SSL_CONNECTION_VERSION_FALLBACK);
|
|
|
| @@ -8129,23 +8115,6 @@ TEST_F(HTTPSRequestTest, SSLv3FallbackNoCache) {
|
| }
|
| }
|
|
|
| -// This test is disabled on Android because the remote test server doesn't cause
|
| -// a TCP reset.
|
| -#if !defined(OS_ANDROID)
|
| -// Tests that a reset connection does not fallback down to SSL3.
|
| -TEST_F(HTTPSFallbackTest, SSLv3NoFallbackReset) {
|
| - SpawnedTestServer::SSLOptions ssl_options(
|
| - SpawnedTestServer::SSLOptions::CERT_OK);
|
| - ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| - ssl_options.tls_intolerance_type =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_RESET;
|
| -
|
| - ASSERT_NO_FATAL_FAILURE(DoFallbackTest(ssl_options));
|
| - ExpectFailure(ERR_CONNECTION_RESET);
|
| -}
|
| -#endif // !OS_ANDROID
|
| -
|
| class HTTPSSessionTest : public testing::Test {
|
| public:
|
| HTTPSSessionTest() : default_context_(true) {
|
|
|