| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/test/spawned_test_server/base_test_server.h" | 5 #include "net/test/spawned_test_server/base_test_server.h" |
| 6 | 6 |
| 7 #include <string> | 7 #include <string> |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/base64.h" | 10 #include "base/base64.h" |
| (...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 104 } | 104 } |
| 105 | 105 |
| 106 base::FilePath src_dir; | 106 base::FilePath src_dir; |
| 107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir)) | 107 if (!PathService::Get(base::DIR_SOURCE_ROOT, &src_dir)) |
| 108 return false; | 108 return false; |
| 109 | 109 |
| 110 *local_certificates_dir = src_dir.Append(certificates_dir); | 110 *local_certificates_dir = src_dir.Append(certificates_dir); |
| 111 return true; | 111 return true; |
| 112 } | 112 } |
| 113 | 113 |
| 114 scoped_ptr<base::ListValue> GetTokenBindingParams(std::vector<int> params) { | |
| 115 scoped_ptr<base::ListValue> values(new base::ListValue()); | |
| 116 for (int param : params) { | |
| 117 values->Append(new base::FundamentalValue(param)); | |
| 118 } | |
| 119 return values; | |
| 120 } | |
| 121 | |
| 122 } // namespace | 114 } // namespace |
| 123 | 115 |
| 124 BaseTestServer::SSLOptions::SSLOptions() | 116 BaseTestServer::SSLOptions::SSLOptions() |
| 125 : server_certificate(CERT_OK), | 117 : server_certificate(CERT_OK), |
| 126 ocsp_status(OCSP_OK), | 118 ocsp_status(OCSP_OK), |
| 127 cert_serial(0), | 119 cert_serial(0), |
| 128 request_client_certificate(false), | 120 request_client_certificate(false), |
| 129 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), | 121 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), |
| 130 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), | 122 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), |
| 131 record_resume(false), | 123 record_resume(false), |
| 132 tls_intolerant(TLS_INTOLERANT_NONE), | 124 tls_intolerant(TLS_INTOLERANT_NONE), |
| 133 tls_intolerance_type(TLS_INTOLERANCE_ALERT), | 125 tls_intolerance_type(TLS_INTOLERANCE_ALERT), |
| 134 fallback_scsv_enabled(false), | 126 fallback_scsv_enabled(false), |
| 135 staple_ocsp_response(false), | 127 staple_ocsp_response(false), |
| 136 ocsp_server_unavailable(false), | 128 ocsp_server_unavailable(false), |
| 137 enable_npn(false), | 129 enable_npn(false), |
| 138 alert_after_handshake(false), | 130 alert_after_handshake(false) { |
| 139 disable_channel_id(false), | 131 } |
| 140 disable_extended_master_secret(false) {} | |
| 141 | 132 |
| 142 BaseTestServer::SSLOptions::SSLOptions( | 133 BaseTestServer::SSLOptions::SSLOptions( |
| 143 BaseTestServer::SSLOptions::ServerCertificate cert) | 134 BaseTestServer::SSLOptions::ServerCertificate cert) |
| 144 : server_certificate(cert), | 135 : server_certificate(cert), |
| 145 ocsp_status(OCSP_OK), | 136 ocsp_status(OCSP_OK), |
| 146 cert_serial(0), | 137 cert_serial(0), |
| 147 request_client_certificate(false), | 138 request_client_certificate(false), |
| 148 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), | 139 key_exchanges(SSLOptions::KEY_EXCHANGE_ANY), |
| 149 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), | 140 bulk_ciphers(SSLOptions::BULK_CIPHER_ANY), |
| 150 record_resume(false), | 141 record_resume(false), |
| (...skipping 399 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 550 if (ssl_options_.staple_ocsp_response) | 541 if (ssl_options_.staple_ocsp_response) |
| 551 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); | 542 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); |
| 552 if (ssl_options_.ocsp_server_unavailable) { | 543 if (ssl_options_.ocsp_server_unavailable) { |
| 553 arguments->Set("ocsp-server-unavailable", | 544 arguments->Set("ocsp-server-unavailable", |
| 554 base::Value::CreateNullValue()); | 545 base::Value::CreateNullValue()); |
| 555 } | 546 } |
| 556 if (ssl_options_.enable_npn) | 547 if (ssl_options_.enable_npn) |
| 557 arguments->Set("enable-npn", base::Value::CreateNullValue()); | 548 arguments->Set("enable-npn", base::Value::CreateNullValue()); |
| 558 if (ssl_options_.alert_after_handshake) | 549 if (ssl_options_.alert_after_handshake) |
| 559 arguments->Set("alert-after-handshake", base::Value::CreateNullValue()); | 550 arguments->Set("alert-after-handshake", base::Value::CreateNullValue()); |
| 560 | |
| 561 if (ssl_options_.disable_channel_id) | |
| 562 arguments->Set("disable-channel-id", base::Value::CreateNullValue()); | |
| 563 if (ssl_options_.disable_extended_master_secret) { | |
| 564 arguments->Set("disable-extended-master-secret", | |
| 565 base::Value::CreateNullValue()); | |
| 566 } | |
| 567 if (!ssl_options_.supported_token_binding_params.empty()) { | |
| 568 scoped_ptr<base::ListValue> token_binding_params(new base::ListValue()); | |
| 569 arguments->Set( | |
| 570 "token-binding-params", | |
| 571 GetTokenBindingParams(ssl_options_.supported_token_binding_params)); | |
| 572 } | |
| 573 } | 551 } |
| 574 | 552 |
| 575 return GenerateAdditionalArguments(arguments); | 553 return GenerateAdditionalArguments(arguments); |
| 576 } | 554 } |
| 577 | 555 |
| 578 bool BaseTestServer::GenerateAdditionalArguments( | 556 bool BaseTestServer::GenerateAdditionalArguments( |
| 579 base::DictionaryValue* arguments) const { | 557 base::DictionaryValue* arguments) const { |
| 580 return true; | 558 return true; |
| 581 } | 559 } |
| 582 | 560 |
| 583 } // namespace net | 561 } // namespace net |
| OLD | NEW |