summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorthomasvl@chromium.org <thomasvl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-03-06 19:59:26 +0000
committerthomasvl@chromium.org <thomasvl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-03-06 19:59:26 +0000
commit7d1359b37c0fcec34e11e55159c0aa9421b91c62 (patch)
tree0d060e2c24c22f30099fc13b12778bbfc42b89a8
parent63f3e1d4a52b91470609455d59b3b4ef8f81b3ad (diff)
downloadchromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.zip
chromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.tar.gz
chromium_src-7d1359b37c0fcec34e11e55159c0aa9421b91c62.tar.bz2
fixes for python 2.6 warnings in the testserver.
BUG=8300 Review URL: http://codereview.chromium.org/40235 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@11142 0039d316-1c4b-4281-b951-d872f2087c98
-rw-r--r--net/tools/testserver/testserver.py20
1 files changed, 13 insertions, 7 deletions
diff --git a/net/tools/testserver/testserver.py b/net/tools/testserver/testserver.py
index d0e7927..2d89733 100644
--- a/net/tools/testserver/testserver.py
+++ b/net/tools/testserver/testserver.py
@@ -15,7 +15,6 @@ To shut it down properly, visit localhost:8888/kill.
import base64
import BaseHTTPServer
import cgi
-import md5
import optparse
import os
import re
@@ -27,6 +26,13 @@ import tlslite
import tlslite.api
import pyftpdlib.ftpserver
+try:
+ import hashlib
+ _new_md5 = hashlib.md5
+except ImportError:
+ import md5
+ _new_md5 = md5.new
+
SERVER_HTTP = 0
SERVER_FTP = 1
@@ -729,10 +735,10 @@ class TestPageHandler(BaseHTTPServer.BaseHTTPRequestHandler):
stale = True
self.server.nonce_time = time.time()
self.server.nonce = \
- md5.new(time.ctime(self.server.nonce_time) + 'privatekey').hexdigest()
+ _new_md5(time.ctime(self.server.nonce_time) + 'privatekey').hexdigest()
nonce = self.server.nonce
- opaque = md5.new('opaque').hexdigest()
+ opaque = _new_md5('opaque').hexdigest()
password = 'secret'
realm = 'testrealm'
@@ -754,13 +760,13 @@ class TestPageHandler(BaseHTTPServer.BaseHTTPRequestHandler):
# Check the 'response' value and make sure it matches our magic hash.
# See http://www.ietf.org/rfc/rfc2617.txt
- hash_a1 = md5.new(':'.join([pairs['username'], realm, password])).hexdigest()
- hash_a2 = md5.new(':'.join([self.command, pairs['uri']])).hexdigest()
+ hash_a1 = _new_md5(':'.join([pairs['username'], realm, password])).hexdigest()
+ hash_a2 = _new_md5(':'.join([self.command, pairs['uri']])).hexdigest()
if 'qop' in pairs and 'nc' in pairs and 'cnonce' in pairs:
- response = md5.new(':'.join([hash_a1, nonce, pairs['nc'],
+ response = _new_md5(':'.join([hash_a1, nonce, pairs['nc'],
pairs['cnonce'], pairs['qop'], hash_a2])).hexdigest()
else:
- response = md5.new(':'.join([hash_a1, nonce, hash_a2])).hexdigest()
+ response = _new_md5(':'.join([hash_a1, nonce, hash_a2])).hexdigest()
if pairs['response'] != response:
raise Exception('wrong password')