OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/test/spawned_test_server/base_test_server.h" | 5 #include "net/test/spawned_test_server/base_test_server.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/base64.h" | 10 #include "base/base64.h" |
(...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
104 } | 104 } |
105 | 105 |
106 base::FilePath src_dir; | 106 base::FilePath src_dir; |
107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir)) | 107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir)) |
108 return false; | 108 return false; |
109 | 109 |
110 *local_certificates_dir = src_dir.Append(certificates_dir); | 110 *local_certificates_dir = src_dir.Append(certificates_dir); |
111 return true; | 111 return true; |
112 } | 112 } |
113 | 113 |
114 void GetTokenBindingParams(std::vector<int> params, base::ListValue* values) { | |
davidben
2015/09/15 15:58:35
Perhaps just have this return a scoped_ptr<base::L
nharper
2015/09/15 23:49:19
Done.
| |
115 for (int param : params) { | |
116 values->Append(new base::FundamentalValue(param)); | |
117 } | |
118 } | |
119 | |
114 } // namespace | 120 } // namespace |
115 | 121 |
116 BaseTestServer::SSLOptions::SSLOptions() | 122 BaseTestServer::SSLOptions::SSLOptions() |
117 : server_certificate(CERT_OK), | 123 : server_certificate(CERT_OK), |
118 ocsp_status(OCSP_OK), | 124 ocsp_status(OCSP_OK), |
119 cert_serial(0), | 125 cert_serial(0), |
120 request_client_certificate(false), | 126 request_client_certificate(false), |
121 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), | 127 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), |
122 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), | 128 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), |
123 record_resume(false), | 129 record_resume(false), |
124 tls_intolerant(TLS_INTOLERANT_NONE), | 130 tls_intolerant(TLS_INTOLERANT_NONE), |
125 tls_intolerance_type(TLS_INTOLERANCE_ALERT), | 131 tls_intolerance_type(TLS_INTOLERANCE_ALERT), |
126 fallback_scsv_enabled(false), | 132 fallback_scsv_enabled(false), |
127 staple_ocsp_response(false), | 133 staple_ocsp_response(false), |
128 ocsp_server_unavailable(false), | 134 ocsp_server_unavailable(false), |
129 enable_npn(false), | 135 enable_npn(false), |
130 alert_after_handshake(false) { | 136 alert_after_handshake(false), |
131 } | 137 disable_channel_id(false), |
138 disable_extended_master_secret(false) {} | |
132 | 139 |
133 BaseTestServer::SSLOptions::SSLOptions( | 140 BaseTestServer::SSLOptions::SSLOptions( |
134 BaseTestServer::SSLOptions::ServerCertificate cert) | 141 BaseTestServer::SSLOptions::ServerCertificate cert) |
135 : server_certificate(cert), | 142 : server_certificate(cert), |
136 ocsp_status(OCSP_OK), | 143 ocsp_status(OCSP_OK), |
137 cert_serial(0), | 144 cert_serial(0), |
138 request_client_certificate(false), | 145 request_client_certificate(false), |
139 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), | 146 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), |
140 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), | 147 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), |
141 record_resume(false), | 148 record_resume(false), |
(...skipping 399 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
541 if (ssl_options_.staple_ocsp_response) | 548 if (ssl_options_.staple_ocsp_response) |
542 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); | 549 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); |
543 if (ssl_options_.ocsp_server_unavailable) { | 550 if (ssl_options_.ocsp_server_unavailable) { |
544 arguments->Set("ocsp-server-unavailable", | 551 arguments->Set("ocsp-server-unavailable", |
545 base::Value::CreateNullValue()); | 552 base::Value::CreateNullValue()); |
546 } | 553 } |
547 if (ssl_options_.enable_npn) | 554 if (ssl_options_.enable_npn) |
548 arguments->Set("enable-npn", base::Value::CreateNullValue()); | 555 arguments->Set("enable-npn", base::Value::CreateNullValue()); |
549 if (ssl_options_.alert_after_handshake) | 556 if (ssl_options_.alert_after_handshake) |
550 arguments->Set("alert-after-handshake", base::Value::CreateNullValue()); | 557 arguments->Set("alert-after-handshake", base::Value::CreateNullValue()); |
558 | |
559 if (ssl_options_.disable_channel_id) | |
560 arguments->Set("disable-channel-id", base::Value::CreateNullValue()); | |
561 if (ssl_options_.disable_extended_master_secret) { | |
562 arguments->Set("disable-extended-master-secret", | |
563 base::Value::CreateNullValue()); | |
564 } | |
565 if (!ssl_options_.supported_token_binding_params.empty()) { | |
566 scoped_ptr<base::ListValue> token_binding_params(new base::ListValue()); | |
567 GetTokenBindingParams(ssl_options_.supported_token_binding_params, | |
568 token_binding_params.get()); | |
569 arguments->Set("token-binding-params", token_binding_params.release()); | |
570 } | |
551 } | 571 } |
552 | 572 |
553 return GenerateAdditionalArguments(arguments); | 573 return GenerateAdditionalArguments(arguments); |
554 } | 574 } |
555 | 575 |
556 bool BaseTestServer::GenerateAdditionalArguments( | 576 bool BaseTestServer::GenerateAdditionalArguments( |
557 base::DictionaryValue* arguments) const { | 577 base::DictionaryValue* arguments) const { |
558 return true; | 578 return true; |
559 } | 579 } |
560 | 580 |
561 } // namespace net | 581 } // namespace net |
OLD | NEW |