OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/test/spawned_test_server/base_test_server.h" | 5 #include "net/test/spawned_test_server/base_test_server.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/base64.h" | 10 #include "base/base64.h" |
(...skipping 417 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
428 } | 428 } |
429 | 429 |
430 if (type_ == TYPE_HTTPS) { | 430 if (type_ == TYPE_HTTPS) { |
431 arguments->Set("https", base::Value::CreateNullValue()); | 431 arguments->Set("https", base::Value::CreateNullValue()); |
432 | 432 |
433 std::string ocsp_arg = ssl_options_.GetOCSPArgument(); | 433 std::string ocsp_arg = ssl_options_.GetOCSPArgument(); |
434 if (!ocsp_arg.empty()) | 434 if (!ocsp_arg.empty()) |
435 arguments->SetString("ocsp", ocsp_arg); | 435 arguments->SetString("ocsp", ocsp_arg); |
436 | 436 |
437 if (ssl_options_.cert_serial != 0) { | 437 if (ssl_options_.cert_serial != 0) { |
438 arguments->Set("cert-serial", | 438 arguments->SetInteger("cert-serial", ssl_options_.cert_serial); |
439 base::Value::CreateIntegerValue(ssl_options_.cert_serial)); | |
440 } | 439 } |
441 | 440 |
442 // Check key exchange argument. | 441 // Check key exchange argument. |
443 scoped_ptr<base::ListValue> key_exchange_values(new base::ListValue()); | 442 scoped_ptr<base::ListValue> key_exchange_values(new base::ListValue()); |
444 GetKeyExchangesList(ssl_options_.key_exchanges, key_exchange_values.get()); | 443 GetKeyExchangesList(ssl_options_.key_exchanges, key_exchange_values.get()); |
445 if (key_exchange_values->GetSize()) | 444 if (key_exchange_values->GetSize()) |
446 arguments->Set("ssl-key-exchange", key_exchange_values.release()); | 445 arguments->Set("ssl-key-exchange", key_exchange_values.release()); |
447 // Check bulk cipher argument. | 446 // Check bulk cipher argument. |
448 scoped_ptr<base::ListValue> bulk_cipher_values(new base::ListValue()); | 447 scoped_ptr<base::ListValue> bulk_cipher_values(new base::ListValue()); |
449 GetCiphersList(ssl_options_.bulk_ciphers, bulk_cipher_values.get()); | 448 GetCiphersList(ssl_options_.bulk_ciphers, bulk_cipher_values.get()); |
450 if (bulk_cipher_values->GetSize()) | 449 if (bulk_cipher_values->GetSize()) |
451 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release()); | 450 arguments->Set("ssl-bulk-cipher", bulk_cipher_values.release()); |
452 if (ssl_options_.record_resume) | 451 if (ssl_options_.record_resume) |
453 arguments->Set("https-record-resume", base::Value::CreateNullValue()); | 452 arguments->Set("https-record-resume", base::Value::CreateNullValue()); |
454 if (ssl_options_.tls_intolerant != SSLOptions::TLS_INTOLERANT_NONE) { | 453 if (ssl_options_.tls_intolerant != SSLOptions::TLS_INTOLERANT_NONE) { |
455 arguments->Set("tls-intolerant", | 454 arguments->SetInteger("tls-intolerant", ssl_options_.tls_intolerant); |
456 new base::FundamentalValue(ssl_options_.tls_intolerant)); | |
457 arguments->Set("tls-intolerance-type", GetTLSIntoleranceType( | 455 arguments->Set("tls-intolerance-type", GetTLSIntoleranceType( |
458 ssl_options_.tls_intolerance_type)); | 456 ssl_options_.tls_intolerance_type)); |
459 } | 457 } |
460 if (ssl_options_.fallback_scsv_enabled) | 458 if (ssl_options_.fallback_scsv_enabled) |
461 arguments->Set("fallback-scsv", base::Value::CreateNullValue()); | 459 arguments->Set("fallback-scsv", base::Value::CreateNullValue()); |
462 if (!ssl_options_.signed_cert_timestamps_tls_ext.empty()) { | 460 if (!ssl_options_.signed_cert_timestamps_tls_ext.empty()) { |
463 std::string b64_scts_tls_ext; | 461 std::string b64_scts_tls_ext; |
464 base::Base64Encode(ssl_options_.signed_cert_timestamps_tls_ext, | 462 base::Base64Encode(ssl_options_.signed_cert_timestamps_tls_ext, |
465 &b64_scts_tls_ext); | 463 &b64_scts_tls_ext); |
466 arguments->SetString("signed-cert-timestamps-tls-ext", b64_scts_tls_ext); | 464 arguments->SetString("signed-cert-timestamps-tls-ext", b64_scts_tls_ext); |
467 } | 465 } |
468 if (ssl_options_.staple_ocsp_response) | 466 if (ssl_options_.staple_ocsp_response) |
469 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); | 467 arguments->Set("staple-ocsp-response", base::Value::CreateNullValue()); |
470 if (ssl_options_.enable_npn) | 468 if (ssl_options_.enable_npn) |
471 arguments->Set("enable-npn", base::Value::CreateNullValue()); | 469 arguments->Set("enable-npn", base::Value::CreateNullValue()); |
472 } | 470 } |
473 | 471 |
474 return GenerateAdditionalArguments(arguments); | 472 return GenerateAdditionalArguments(arguments); |
475 } | 473 } |
476 | 474 |
477 bool BaseTestServer::GenerateAdditionalArguments( | 475 bool BaseTestServer::GenerateAdditionalArguments( |
478 base::DictionaryValue* arguments) const { | 476 base::DictionaryValue* arguments) const { |
479 return true; | 477 return true; |
480 } | 478 } |
481 | 479 |
482 } // namespace net | 480 } // namespace net |
OLD | NEW |