Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(176)

Side by Side Diff: net/test/spawned_test_server/base_test_server.cc

Issue 1347503002: Add flags to python test server for channel id, extended master secret, and token binding (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/test/spawned_test_server/base_test_server.h" 5 #include "net/test/spawned_test_server/base_test_server.h"
6 6
7 #include <string> 7 #include <string>
8 #include <vector> 8 #include <vector>
9 9
10 #include "base/base64.h" 10 #include "base/base64.h"
(...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after
104 } 104 }
105 105
106 base::FilePath src_dir; 106 base::FilePath src_dir;
107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir)) 107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir))
108 return false; 108 return false;
109 109
110 *local_certificates_dir = src_dir.Append(certificates_dir); 110 *local_certificates_dir = src_dir.Append(certificates_dir);
111 return true; 111 return true;
112 } 112 }
113 113
114 void GetTokenBindingParams(std::vector<int> params, base::ListValue* values) {
davidben 2015/09/15 15:58:35 Perhaps just have this return a scoped_ptr<base::L
nharper 2015/09/15 23:49:19 Done.
115 for (int param : params) {
116 values->Append(new base::FundamentalValue(param));
117 }
118 }
119
114 } // namespace 120 } // namespace
115 121
116 BaseTestServer::SSLOptions::SSLOptions() 122 BaseTestServer::SSLOptions::SSLOptions()
117 : server_certificate(CERT_OK), 123 : server_certificate(CERT_OK),
118 ocsp_status(OCSP_OK), 124 ocsp_status(OCSP_OK),
119 cert_serial(0), 125 cert_serial(0),
120 request_client_certificate(false), 126 request_client_certificate(false),
121 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), 127 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY),
122 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), 128 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY),
123 record_resume(false), 129 record_resume(false),
124 tls_intolerant(TLS_INTOLERANT_NONE), 130 tls_intolerant(TLS_INTOLERANT_NONE),
125 tls_intolerance_type(TLS_INTOLERANCE_ALERT), 131 tls_intolerance_type(TLS_INTOLERANCE_ALERT),
126 fallback_scsv_enabled(false), 132 fallback_scsv_enabled(false),
127 staple_ocsp_response(false), 133 staple_ocsp_response(false),
128 ocsp_server_unavailable(false), 134 ocsp_server_unavailable(false),
129 enable_npn(false), 135 enable_npn(false),
130 alert_after_handshake(false) { 136 alert_after_handshake(false),
131 } 137 disable_channel_id(false),
138 disable_extended_master_secret(false) {}
132 139
133 BaseTestServer::SSLOptions::SSLOptions( 140 BaseTestServer::SSLOptions::SSLOptions(
134 BaseTestServer::SSLOptions::ServerCertificate cert) 141 BaseTestServer::SSLOptions::ServerCertificate cert)
135 : server_certificate(cert), 142 : server_certificate(cert),
136 ocsp_status(OCSP_OK), 143 ocsp_status(OCSP_OK),
137 cert_serial(0), 144 cert_serial(0),
138 request_client_certificate(false), 145 request_client_certificate(false),
139 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), 146 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY),
140 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), 147 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY),
141 record_resume(false), 148 record_resume(false),
(...skipping 399 matching lines...) Expand 10 before | Expand all | Expand 10 after
541 if (ssl_options_.staple_ocsp_response) 548 if (ssl_options_.staple_ocsp_response)
542 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); 549 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue());
543 if (ssl_options_.ocsp_server_unavailable) { 550 if (ssl_options_.ocsp_server_unavailable) {
544 arguments->Set("ocsp-server-unavailable", 551 arguments->Set("ocsp-server-unavailable",
545 base::Value::CreateNullValue()); 552 base::Value::CreateNullValue());
546 } 553 }
547 if (ssl_options_.enable_npn) 554 if (ssl_options_.enable_npn)
548 arguments->Set("enable-npn", base::Value::CreateNullValue()); 555 arguments->Set("enable-npn", base::Value::CreateNullValue());
549 if (ssl_options_.alert_after_handshake) 556 if (ssl_options_.alert_after_handshake)
550 arguments->Set("alert-after-handshake", base::Value::CreateNullValue()); 557 arguments->Set("alert-after-handshake", base::Value::CreateNullValue());
558
559 if (ssl_options_.disable_channel_id)
560 arguments->Set("disable-channel-id", base::Value::CreateNullValue());
561 if (ssl_options_.disable_extended_master_secret) {
562 arguments->Set("disable-extended-master-secret",
563 base::Value::CreateNullValue());
564 }
565 if (!ssl_options_.supported_token_binding_params.empty()) {
566 scoped_ptr<base::ListValue> token_binding_params(new base::ListValue());
567 GetTokenBindingParams(ssl_options_.supported_token_binding_params,
568 token_binding_params.get());
569 arguments->Set("token-binding-params", token_binding_params.release());
570 }
551 } 571 }
552 572
553 return GenerateAdditionalArguments(arguments); 573 return GenerateAdditionalArguments(arguments);
554 } 574 }
555 575
556 bool BaseTestServer::GenerateAdditionalArguments( 576 bool BaseTestServer::GenerateAdditionalArguments(
557 base::DictionaryValue* arguments) const { 577 base::DictionaryValue* arguments) const {
558 return true; 578 return true;
559 } 579 }
560 580
561 } // namespace net 581 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698