| Index: net/test/spawned_test_server/base_test_server.h
|
| diff --git a/net/test/spawned_test_server/base_test_server.h b/net/test/spawned_test_server/base_test_server.h
|
| index 5c47ebc05a397568ed535ef63aeaaa82b32ac82a..a5e3287786208e98f398a1840501be418fef6928 100644
|
| --- a/net/test/spawned_test_server/base_test_server.h
|
| +++ b/net/test/spawned_test_server/base_test_server.h
|
| @@ -111,6 +111,14 @@ class BaseTestServer {
|
| TLS_INTOLERANT_TLS1_2 = 3, // Intolerant of TLS 1.2 or higher.
|
| };
|
|
|
| + // Values which control how the server reacts in response to a ClientHello
|
| + // it is intolerant of.
|
| + enum TLSIntoleranceType {
|
| + TLS_INTOLERANCE_ALERT = 0, // Send a handshake_failure alert.
|
| + TLS_INTOLERANCE_CLOSE = 1, // Close the connection.
|
| + TLS_INTOLERANCE_RESET = 2, // Send a TCP reset.
|
| + };
|
| +
|
| // Initialize a new SSLOptions using CERT_OK as the certificate.
|
| SSLOptions();
|
|
|
| @@ -171,6 +179,10 @@ class BaseTestServer {
|
| // negotiates an intolerant TLS version in order to test version fallback.
|
| TLSIntolerantLevel tls_intolerant;
|
|
|
| + // If |tls_intolerant| is not TLS_INTOLERANT_NONE, how the server reacts to
|
| + // an intolerant TLS version.
|
| + TLSIntoleranceType tls_intolerance_type;
|
| +
|
| // fallback_scsv_enabled, if true, causes the server to process the
|
| // TLS_FALLBACK_SCSV cipher suite. This cipher suite is sent by Chrome
|
| // when performing TLS version fallback in response to an SSL handshake
|
|
|