OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ | 5 #ifndef NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |
6 #define NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ | 6 #define NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 #include <utility> | 9 #include <utility> |
10 #include <vector> | 10 #include <vector> |
(...skipping 153 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
164 | 164 |
165 // If true, pass the --https-record-resume argument to testserver.py which | 165 // If true, pass the --https-record-resume argument to testserver.py which |
166 // causes it to log session cache actions and echo the log on | 166 // causes it to log session cache actions and echo the log on |
167 // /ssl-session-cache. | 167 // /ssl-session-cache. |
168 bool record_resume; | 168 bool record_resume; |
169 | 169 |
170 // If not TLS_INTOLERANT_NONE, the server will abort any handshake that | 170 // If not TLS_INTOLERANT_NONE, the server will abort any handshake that |
171 // negotiates an intolerant TLS version in order to test version fallback. | 171 // negotiates an intolerant TLS version in order to test version fallback. |
172 TLSIntolerantLevel tls_intolerant; | 172 TLSIntolerantLevel tls_intolerant; |
173 | 173 |
| 174 // If true, the server will simulate intolerance with a TCP reset rather |
| 175 // than a handshake_failure alert. |
| 176 bool reset_on_intolerance; |
| 177 |
174 // fallback_scsv_enabled, if true, causes the server to process the | 178 // fallback_scsv_enabled, if true, causes the server to process the |
175 // TLS_FALLBACK_SCSV cipher suite. This cipher suite is sent by Chrome | 179 // TLS_FALLBACK_SCSV cipher suite. This cipher suite is sent by Chrome |
176 // when performing TLS version fallback in response to an SSL handshake | 180 // when performing TLS version fallback in response to an SSL handshake |
177 // failure. If this option is enabled then the server will reject fallback | 181 // failure. If this option is enabled then the server will reject fallback |
178 // connections. | 182 // connections. |
179 bool fallback_scsv_enabled; | 183 bool fallback_scsv_enabled; |
180 | 184 |
181 // Temporary glue for testing: validation of SCTs is application-controlled | 185 // Temporary glue for testing: validation of SCTs is application-controlled |
182 // and can be appropriately mocked out, so sending fake data here does not | 186 // and can be appropriately mocked out, so sending fake data here does not |
183 // affect handshaking behaviour. | 187 // affect handshaking behaviour. |
(...skipping 113 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
297 bool log_to_console_; | 301 bool log_to_console_; |
298 | 302 |
299 scoped_ptr<ScopedPortException> allowed_port_; | 303 scoped_ptr<ScopedPortException> allowed_port_; |
300 | 304 |
301 DISALLOW_COPY_AND_ASSIGN(BaseTestServer); | 305 DISALLOW_COPY_AND_ASSIGN(BaseTestServer); |
302 }; | 306 }; |
303 | 307 |
304 } // namespace net | 308 } // namespace net |
305 | 309 |
306 #endif // NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ | 310 #endif // NET_TEST_SPAWNED_TEST_SERVER_BASE_TEST_SERVER_H_ |
OLD | NEW |