diff options
author | thomasvl@chromium.org <thomasvl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-03-06 19:59:26 +0000 |
---|---|---|
committer | thomasvl@chromium.org <thomasvl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-03-06 19:59:26 +0000 |
commit | 7d1359b37c0fcec34e11e55159c0aa9421b91c62 (patch) | |
tree | 0d060e2c24c22f30099fc13b12778bbfc42b89a8 | |
parent | 63f3e1d4a52b91470609455d59b3b4ef8f81b3ad (diff) | |
download | chromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.zip chromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.tar.gz chromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.tar.bz2 |
fixes for python 2.6 warnings in the testserver.
BUG=8300
Review URL: http://codereview.chromium.org/40235
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@11142 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r-- | net/tools/testserver/testserver.py | 20 |
1 files changed, 13 insertions, 7 deletions
diff --git a/net/tools/testserver/testserver.py b/net/tools/testserver/testserver.py index d0e7927..2d89733 100644 --- a/net/tools/testserver/testserver.py +++ b/net/tools/testserver/testserver.py @@ -15,7 +15,6 @@ To shut it down properly, visit localhost:8888/kill. import base64 import BaseHTTPServer import cgi -import md5 import optparse import os import re @@ -27,6 +26,13 @@ import tlslite import tlslite.api import pyftpdlib.ftpserver +try: + import hashlib + _new_md5 = hashlib.md5 +except ImportError: + import md5 + _new_md5 = md5.new + SERVER_HTTP = 0 SERVER_FTP = 1 @@ -729,10 +735,10 @@ class TestPageHandler(BaseHTTPServer.BaseHTTPRequestHandler): stale = True self.server.nonce_time = time.time() self.server.nonce = \ - md5.new(time.ctime(self.server.nonce_time) + 'privatekey').hexdigest() + _new_md5(time.ctime(self.server.nonce_time) + 'privatekey').hexdigest() nonce = self.server.nonce - opaque = md5.new('opaque').hexdigest() + opaque = _new_md5('opaque').hexdigest() password = 'secret' realm = 'testrealm' @@ -754,13 +760,13 @@ class TestPageHandler(BaseHTTPServer.BaseHTTPRequestHandler): # Check the 'response' value and make sure it matches our magic hash. # See http://www.ietf.org/rfc/rfc2617.txt - hash_a1 = md5.new(':'.join([pairs['username'], realm, password])).hexdigest() - hash_a2 = md5.new(':'.join([self.command, pairs['uri']])).hexdigest() + hash_a1 = _new_md5(':'.join([pairs['username'], realm, password])).hexdigest() + hash_a2 = _new_md5(':'.join([self.command, pairs['uri']])).hexdigest() if 'qop' in pairs and 'nc' in pairs and 'cnonce' in pairs: - response = md5.new(':'.join([hash_a1, nonce, pairs['nc'], + response = _new_md5(':'.join([hash_a1, nonce, pairs['nc'], pairs['cnonce'], pairs['qop'], hash_a2])).hexdigest() else: - response = md5.new(':'.join([hash_a1, nonce, hash_a2])).hexdigest() + response = _new_md5(':'.join([hash_a1, nonce, hash_a2])).hexdigest() if pairs['response'] != response: raise Exception('wrong password') |