| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 16e03f7eb8ba554787ea52761a49f5467591d9a9..d14f1fdbb1df0c1ed68b40b68f6773b72e8380f1 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -2351,6 +2351,33 @@ TEST(SSLClientSocket, ClearSessionCache) {
|
| SSLClientSocket::ClearSessionCache();
|
| }
|
|
|
| +TEST(SSLClientSocket, SerializeNextProtos) {
|
| + NextProtoVector next_protos;
|
| + next_protos.push_back(kProtoHTTP11);
|
| + next_protos.push_back(kProtoSPDY31);
|
| + static std::vector<uint8_t> serialized =
|
| + SSLClientSocket::SerializeNextProtos(next_protos, true);
|
| + ASSERT_EQ(18u, serialized.size());
|
| + EXPECT_EQ(8, serialized[0]); // length("http/1.1")
|
| + EXPECT_EQ('h', serialized[1]);
|
| + EXPECT_EQ('t', serialized[2]);
|
| + EXPECT_EQ('t', serialized[3]);
|
| + EXPECT_EQ('p', serialized[4]);
|
| + EXPECT_EQ('/', serialized[5]);
|
| + EXPECT_EQ('1', serialized[6]);
|
| + EXPECT_EQ('.', serialized[7]);
|
| + EXPECT_EQ('1', serialized[8]);
|
| + EXPECT_EQ(8, serialized[9]); // length("spdy/3.1")
|
| + EXPECT_EQ('s', serialized[10]);
|
| + EXPECT_EQ('p', serialized[11]);
|
| + EXPECT_EQ('d', serialized[12]);
|
| + EXPECT_EQ('y', serialized[13]);
|
| + EXPECT_EQ('/', serialized[14]);
|
| + EXPECT_EQ('3', serialized[15]);
|
| + EXPECT_EQ('.', serialized[16]);
|
| + EXPECT_EQ('1', serialized[17]);
|
| +}
|
| +
|
| // Test that the server certificates are properly retrieved from the underlying
|
| // SSL stack.
|
| TEST_F(SSLClientSocketTest, VerifyServerChainProperlyOrdered) {
|
| @@ -2889,7 +2916,7 @@ TEST_F(SSLClientSocketFalseStartTest,
|
| SpawnedTestServer::SSLOptions::KEY_EXCHANGE_DHE_RSA;
|
| server_options.enable_npn = true;
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
| monitor_handshake_callback_ = true;
|
| fail_handshake_after_false_start_ = true;
|
| ASSERT_NO_FATAL_FAILURE(TestFalseStart(server_options, client_config, true));
|
| @@ -2904,7 +2931,7 @@ TEST_F(SSLClientSocketFalseStartTest,
|
| SpawnedTestServer::SSLOptions::KEY_EXCHANGE_DHE_RSA;
|
| server_options.enable_npn = true;
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
| monitor_handshake_callback_ = true;
|
| ASSERT_NO_FATAL_FAILURE(TestFalseStart(server_options, client_config, true));
|
| ASSERT_TRUE(ran_handshake_completion_callback_);
|
| @@ -2918,7 +2945,7 @@ TEST_F(SSLClientSocketFalseStartTest, FalseStartEnabled) {
|
| SpawnedTestServer::SSLOptions::KEY_EXCHANGE_DHE_RSA;
|
| server_options.enable_npn = true;
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
| ASSERT_NO_FATAL_FAILURE(
|
| TestFalseStart(server_options, client_config, true));
|
| }
|
| @@ -2941,7 +2968,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoForwardSecrecy) {
|
| SpawnedTestServer::SSLOptions::KEY_EXCHANGE_RSA;
|
| server_options.enable_npn = true;
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
| ASSERT_NO_FATAL_FAILURE(
|
| TestFalseStart(server_options, client_config, false));
|
| }
|
| @@ -2954,7 +2981,7 @@ TEST_F(SSLClientSocketFalseStartTest, SessionResumption) {
|
| SpawnedTestServer::SSLOptions::KEY_EXCHANGE_DHE_RSA;
|
| server_options.enable_npn = true;
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
|
|
| // Let a full handshake complete with False Start.
|
| ASSERT_NO_FATAL_FAILURE(
|
| @@ -2987,7 +3014,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBeforeFinish) {
|
| ASSERT_TRUE(StartTestServer(server_options));
|
|
|
| SSLConfig client_config;
|
| - client_config.next_protos.push_back("http/1.1");
|
| + client_config.next_protos.push_back(kProtoHTTP11);
|
|
|
| // Start a handshake up to the server Finished message.
|
| TestCompletionCallback callback;
|
|
|