Index: net/test/spawned_test_server/base_test_server.h |
diff --git a/net/test/spawned_test_server/base_test_server.h b/net/test/spawned_test_server/base_test_server.h |
index 5c47ebc05a397568ed535ef63aeaaa82b32ac82a..a5e3287786208e98f398a1840501be418fef6928 100644 |
--- a/net/test/spawned_test_server/base_test_server.h |
+++ b/net/test/spawned_test_server/base_test_server.h |
@@ -111,6 +111,14 @@ class BaseTestServer { |
TLS_INTOLERANT_TLS1_2 = 3, // Intolerant of TLS 1.2 or higher. |
}; |
+ // Values which control how the server reacts in response to a ClientHello |
+ // it is intolerant of. |
+ enum TLSIntoleranceType { |
+ TLS_INTOLERANCE_ALERT = 0, // Send a handshake_failure alert. |
+ TLS_INTOLERANCE_CLOSE = 1, // Close the connection. |
+ TLS_INTOLERANCE_RESET = 2, // Send a TCP reset. |
+ }; |
+ |
// Initialize a new SSLOptions using CERT_OK as the certificate. |
SSLOptions(); |
@@ -171,6 +179,10 @@ class BaseTestServer { |
// negotiates an intolerant TLS version in order to test version fallback. |
TLSIntolerantLevel tls_intolerant; |
+ // If |tls_intolerant| is not TLS_INTOLERANT_NONE, how the server reacts to |
+ // an intolerant TLS version. |
+ TLSIntoleranceType tls_intolerance_type; |
+ |
// fallback_scsv_enabled, if true, causes the server to process the |
// TLS_FALLBACK_SCSV cipher suite. This cipher suite is sent by Chrome |
// when performing TLS version fallback in response to an SSL handshake |