| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index 58597fe023721172a8fec5245ce3f6f26ee13997..c3bc1668ec97f1eada6ef0a59ebc98846d48405c 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -7686,10 +7686,10 @@ TEST_F(HTTPSFallbackTest, TLSv1FallbackReset) {
|
| TEST_F(HTTPSFallbackTest, FallbackSCSV) {
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| - // Configure HTTPS server to be intolerant of TLS >= 1.0 in order to trigger
|
| + // Configure HTTPS server to be intolerant of TLS >= 1.1 in order to trigger
|
| // a version fallback.
|
| ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| + SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1;
|
| // Have the server process TLS_FALLBACK_SCSV so that version fallback
|
| // connections are rejected.
|
| ssl_options.fallback_scsv_enabled = true;
|
| @@ -7708,10 +7708,10 @@ TEST_F(HTTPSFallbackTest, FallbackSCSV) {
|
| TEST_F(HTTPSFallbackTest, FallbackSCSVClosed) {
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| - // Configure HTTPS server to be intolerant of TLS >= 1.0 in order to trigger
|
| + // Configure HTTPS server to be intolerant of TLS >= 1.1 in order to trigger
|
| // a version fallback.
|
| ssl_options.tls_intolerant =
|
| - SpawnedTestServer::SSLOptions::TLS_INTOLERANT_ALL;
|
| + SpawnedTestServer::SSLOptions::TLS_INTOLERANT_TLS1_1;
|
| ssl_options.tls_intolerance_type =
|
| SpawnedTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE;
|
| // Have the server process TLS_FALLBACK_SCSV so that version fallback
|
|
|