| Index: net/quic/quic_crypto_server_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_server_stream_test.cc b/net/quic/quic_crypto_server_stream_test.cc
|
| index 0d5991145f9d3f04d6168ad1208fd30897dc23c0..a5bf5538bfa50a2e2295031e59aa71efb8ebfe07 100644
|
| --- a/net/quic/quic_crypto_server_stream_test.cc
|
| +++ b/net/quic/quic_crypto_server_stream_test.cc
|
| @@ -105,9 +105,11 @@ class QuicCryptoServerStreamTest : public ::testing::TestWithParam<bool> {
|
| &server_connection_, &server_session);
|
| CHECK(server_session);
|
| server_session_.reset(server_session);
|
| + CryptoTestUtils::FakeServerOptions options;
|
| + options.token_binding_enabled = true;
|
| CryptoTestUtils::SetupCryptoServerConfigForTest(
|
| server_connection_->clock(), server_connection_->random_generator(),
|
| - server_session_->config(), &server_crypto_config_);
|
| + server_session_->config(), &server_crypto_config_, options);
|
| }
|
|
|
| QuicCryptoServerStream* server_stream() {
|
| @@ -422,6 +424,24 @@ TEST_P(QuicCryptoServerStreamTest, DoesPeerSupportStatelessRejects) {
|
| QuicCryptoServerStreamPeer::DoesPeerSupportStatelessRejects(message_));
|
| }
|
|
|
| +TEST_P(QuicCryptoServerStreamTest, TokenBindingNegotiated) {
|
| + client_options_.token_binding_enabled = true;
|
| + CompleteCryptoHandshake();
|
| + EXPECT_EQ(
|
| + kP256,
|
| + server_stream()->crypto_negotiated_params().token_binding_key_param);
|
| + EXPECT_TRUE(server_stream()->encryption_established());
|
| + EXPECT_TRUE(server_stream()->handshake_confirmed());
|
| +}
|
| +
|
| +TEST_P(QuicCryptoServerStreamTest, NoTokenBindingWithoutClientSupport) {
|
| + CompleteCryptoHandshake();
|
| + EXPECT_EQ(
|
| + 0u, server_stream()->crypto_negotiated_params().token_binding_key_param);
|
| + EXPECT_TRUE(server_stream()->encryption_established());
|
| + EXPECT_TRUE(server_stream()->handshake_confirmed());
|
| +}
|
| +
|
| } // namespace
|
|
|
| } // namespace test
|
|
|