| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index 80b8fcd56d684b422b2538f4e521a696099277a6..0fce7f0ca3762f56fd719892e0daa2039daad276 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -85,7 +85,6 @@
|
| #include "net/socket/ssl_client_socket.h"
|
| #include "net/ssl/channel_id_service.h"
|
| #include "net/ssl/default_channel_id_store.h"
|
| -#include "net/ssl/ssl_cipher_suite_names.h"
|
| #include "net/ssl/ssl_connection_status_flags.h"
|
| #include "net/ssl/ssl_server_config.h"
|
| #include "net/ssl/token_binding.h"
|
| @@ -123,7 +122,6 @@
|
| #if defined(OS_WIN)
|
| #include "base/win/scoped_com_initializer.h"
|
| #include "base/win/scoped_comptr.h"
|
| -#include "base/win/windows_version.h"
|
| #endif
|
|
|
| using base::ASCIIToUTF16;
|
| @@ -8806,55 +8804,6 @@ TEST_F(HTTPSRequestTest, SSLSessionCacheShardTest) {
|
| }
|
| }
|
|
|
| -#if defined(OS_WIN)
|
| -
|
| -namespace {
|
| -
|
| -bool IsECDSACipherSuite(uint16_t cipher_suite) {
|
| - const char* key_exchange;
|
| - const char* cipher;
|
| - const char* mac;
|
| - bool is_aead;
|
| - SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, cipher_suite);
|
| - return std::string(key_exchange).find("ECDSA") != std::string::npos;
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -// Test that ECDSA is disabled on Windows XP, where ECDSA certificates cannot be
|
| -// verified.
|
| -TEST_F(HTTPSRequestTest, DisableECDSAOnXP) {
|
| - if (base::win::GetVersion() >= base::win::VERSION_VISTA) {
|
| - LOG(INFO) << "Skipping test on this version.";
|
| - return;
|
| - }
|
| -
|
| - EmbeddedTestServer test_server(net::EmbeddedTestServer::TYPE_HTTPS);
|
| - test_server.ServeFilesFromSourceDirectory("net/data/ssl");
|
| - ASSERT_TRUE(test_server.Start());
|
| -
|
| - TestDelegate d;
|
| - std::unique_ptr<URLRequest> r(default_context_.CreateRequest(
|
| - test_server.GetURL("/client-cipher-list"), DEFAULT_PRIORITY, &d));
|
| - r->Start();
|
| - EXPECT_TRUE(r->is_pending());
|
| -
|
| - base::RunLoop().Run();
|
| -
|
| - EXPECT_EQ(1, d.response_started_count());
|
| - std::vector<std::string> lines = base::SplitString(
|
| - d.data_received(), "\n", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
|
| -
|
| - for (size_t i = 0; i < lines.size(); i++) {
|
| - int cipher_suite;
|
| - ASSERT_TRUE(base::StringToInt(lines[i], &cipher_suite));
|
| - EXPECT_FALSE(IsECDSACipherSuite(cipher_suite))
|
| - << "ClientHello advertised " << cipher_suite;
|
| - }
|
| -}
|
| -
|
| -#endif // OS_WIN
|
| -
|
| class FallbackTestURLRequestContext : public TestURLRequestContext {
|
| public:
|
| explicit FallbackTestURLRequestContext(bool delay_initialization)
|
| @@ -9312,12 +9261,7 @@ static bool SystemUsesChromiumEVMetadata() {
|
| }
|
|
|
| static bool SystemSupportsOCSP() {
|
| -#if defined(USE_OPENSSL_CERTS)
|
| - // http://crbug.com/117478 - OpenSSL does not support OCSP.
|
| - return false;
|
| -#elif defined(OS_WIN)
|
| - return base::win::GetVersion() >= base::win::VERSION_VISTA;
|
| -#elif defined(OS_ANDROID)
|
| +#if defined(OS_ANDROID)
|
| // TODO(jnd): http://crbug.com/117478 - EV verification is not yet supported.
|
| return false;
|
| #else
|
| @@ -9326,10 +9270,8 @@ static bool SystemSupportsOCSP() {
|
| }
|
|
|
| static bool SystemSupportsOCSPStapling() {
|
| -#if defined(USE_NSS_CERTS)
|
| +#if defined(USE_NSS_CERTS) || defined(OS_WIN)
|
| return true;
|
| -#elif defined(OS_WIN)
|
| - return base::win::GetVersion() >= base::win::VERSION_VISTA;
|
| #else
|
| return false;
|
| #endif
|
|
|