| Index: chrome/browser/policy/test/policy_testserver.py
|
| diff --git a/chrome/browser/policy/test/policy_testserver.py b/chrome/browser/policy/test/policy_testserver.py
|
| index 62ba27c6a5f5501cb2fc1abcf31e8c8a2ec10ce7..11ee592e787603f9947bf4197d0b44c8245b1cd0 100644
|
| --- a/chrome/browser/policy/test/policy_testserver.py
|
| +++ b/chrome/browser/policy/test/policy_testserver.py
|
| @@ -819,7 +819,8 @@ class PolicyRequestHandler(BaseHTTPServer.BaseHTTPRequestHandler):
|
| # Don't do key rotations for these messages.
|
| fetch_response.ClearField('new_public_key')
|
| fetch_response.ClearField('new_public_key_signature')
|
| - fetch_response.ClearField('new_public_key_verification_signature')
|
| + fetch_response.ClearField(
|
| + 'new_public_key_verification_signature_deprecated')
|
|
|
| def ProcessCloudPolicy(self, msg, token_info, response, username=None):
|
| """Handles a cloud policy request. (New protocol for policy requests.)
|
| @@ -950,7 +951,8 @@ class PolicyRequestHandler(BaseHTTPServer.BaseHTTPRequestHandler):
|
| if verification_sig:
|
| assert len(verification_sig) == 256, \
|
| 'bad signature size: %d' % len(verification_sig)
|
| - response.new_public_key_verification_signature = verification_sig
|
| + response.new_public_key_verification_signature_deprecated = (
|
| + verification_sig)
|
|
|
| if req_key:
|
| response.new_public_key_signature = (
|
| @@ -1403,7 +1405,7 @@ class PolicyServerRunner(testserver_base.TestServerRunner):
|
| 'in the same location: <filename>.sig and if '
|
| 'present will add the signature to the '
|
| 'policy blob as appropriate via the '
|
| - 'new_public_key_verification_signature '
|
| + 'new_public_key_verification_signature_deprecated '
|
| 'field.')
|
| self.option_parser.add_option('--log-level', dest='log_level',
|
| default='WARN',
|
|
|