OLD | NEW |
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/test/spawned_test_server/base_test_server.h" | 5 #include "net/test/spawned_test_server/base_test_server.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 #include <vector> | 8 #include <vector> |
9 | 9 |
10 #include "base/base64.h" | 10 #include "base/base64.h" |
(...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
63 | 63 |
64 void GetCiphersList(int cipher, base::ListValue* values) { | 64 void GetCiphersList(int cipher, base::ListValue* values) { |
65 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4) | 65 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_RC4) |
66 values->Append(new base::StringValue("rc4")); | 66 values->Append(new base::StringValue("rc4")); |
67 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128) | 67 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128) |
68 values->Append(new base::StringValue("aes128")); | 68 values->Append(new base::StringValue("aes128")); |
69 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256) | 69 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES256) |
70 values->Append(new base::StringValue("aes256")); | 70 values->Append(new base::StringValue("aes256")); |
71 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES) | 71 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_3DES) |
72 values->Append(new base::StringValue("3des")); | 72 values->Append(new base::StringValue("3des")); |
| 73 if (cipher & BaseTestServer::SSLOptions::BULK_CIPHER_AES128GCM) |
| 74 values->Append(new base::StringValue("aes128gcm")); |
73 } | 75 } |
74 | 76 |
75 base::StringValue* GetTLSIntoleranceType( | 77 base::StringValue* GetTLSIntoleranceType( |
76 BaseTestServer::SSLOptions::TLSIntoleranceType type) { | 78 BaseTestServer::SSLOptions::TLSIntoleranceType type) { |
77 switch (type) { | 79 switch (type) { |
78 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_ALERT: | 80 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_ALERT: |
79 return new base::StringValue("alert"); | 81 return new base::StringValue("alert"); |
80 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE: | 82 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_CLOSE: |
81 return new base::StringValue("close"); | 83 return new base::StringValue("close"); |
82 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_RESET: | 84 case BaseTestServer::SSLOptions::TLS_INTOLERANCE_RESET: |
(...skipping 407 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
490 | 492 |
491 return GenerateAdditionalArguments(arguments); | 493 return GenerateAdditionalArguments(arguments); |
492 } | 494 } |
493 | 495 |
494 bool BaseTestServer::GenerateAdditionalArguments( | 496 bool BaseTestServer::GenerateAdditionalArguments( |
495 base::DictionaryValue* arguments) const { | 497 base::DictionaryValue* arguments) const { |
496 return true; | 498 return true; |
497 } | 499 } |
498 | 500 |
499 } // namespace net | 501 } // namespace net |
OLD | NEW |