summaryrefslogtreecommitdiffstats
path: root/net/test/spawned_test_server
diff options
context:
space:
mode:
authorszym@chromium.org <szym@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-13 20:27:14 +0000
committerszym@chromium.org <szym@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2013-12-13 20:27:14 +0000
commit09ac0db93bf70afdb1e7fece9048fd48841b4151 (patch)
treed9fdef93c041fc74cf71bed04edd4a7fc130b224 /net/test/spawned_test_server
parent8393c30362716313ccc200e7c11c761eb0a42982 (diff)
downloadchromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.zip
chromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.tar.gz
chromium_src-09ac0db93bf70afdb1e7fece9048fd48841b4151.tar.bz2
Revert of https://codereview.chromium.org/92443002/
Reason for revert: Does not compile on CrOS amd64 net/cert/ct_objects_extractor_nss.cc:528:66: error: narrowing conversion (...) from 'std::basic_string<char>::size_type {aka long unsigned int}' to 'unsigned int' inside { } is ill-formed in C++11 [-Werror=narrowing] ocsp_response.data())), ocsp_response.size() }; TBR=wtc@chromium.org,rsleevi@chromium.org,ekasper@google.com NOTREECHECKS=true NOTRY=true Review URL: https://codereview.chromium.org/108113006 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@240731 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/test/spawned_test_server')
-rw-r--r--net/test/spawned_test_server/base_test_server.cc17
-rw-r--r--net/test/spawned_test_server/base_test_server.h9
2 files changed, 9 insertions, 17 deletions
diff --git a/net/test/spawned_test_server/base_test_server.cc b/net/test/spawned_test_server/base_test_server.cc
index ac37c70..3b06a0a 100644
--- a/net/test/spawned_test_server/base_test_server.cc
+++ b/net/test/spawned_test_server/base_test_server.cc
@@ -61,8 +61,7 @@ BaseTestServer::SSLOptions::SSLOptions()
bulk_ciphers(SSLOptions::BULK_CIPHER_ANY),
record_resume(false),
tls_intolerant(TLS_INTOLERANT_NONE),
- fallback_scsv_enabled(false),
- staple_ocsp_response(false) {}
+ fallback_scsv_enabled(false) {}
BaseTestServer::SSLOptions::SSLOptions(
BaseTestServer::SSLOptions::ServerCertificate cert)
@@ -73,8 +72,7 @@ BaseTestServer::SSLOptions::SSLOptions(
bulk_ciphers(SSLOptions::BULK_CIPHER_ANY),
record_resume(false),
tls_intolerant(TLS_INTOLERANT_NONE),
- fallback_scsv_enabled(false),
- staple_ocsp_response(false) {}
+ fallback_scsv_enabled(false) {}
BaseTestServer::SSLOptions::~SSLOptions() {}
@@ -402,14 +400,11 @@ bool BaseTestServer::GenerateArguments(base::DictionaryValue* arguments) const {
}
if (ssl_options_.fallback_scsv_enabled)
arguments->Set("fallback-scsv", base::Value::CreateNullValue());
- if (!ssl_options_.signed_cert_timestamps_tls_ext.empty()) {
- std::string b64_scts_tls_ext;
- base::Base64Encode(ssl_options_.signed_cert_timestamps_tls_ext,
- &b64_scts_tls_ext);
- arguments->SetString("signed-cert-timestamps-tls-ext", b64_scts_tls_ext);
+ if (!ssl_options_.signed_cert_timestamps.empty()) {
+ std::string b64_scts;
+ base::Base64Encode(ssl_options_.signed_cert_timestamps, &b64_scts);
+ arguments->SetString("signed-cert-timestamps", b64_scts);
}
- if (ssl_options_.staple_ocsp_response)
- arguments->Set("staple-ocsp-response", base::Value::CreateNullValue());
}
return GenerateAdditionalArguments(arguments);
diff --git a/net/test/spawned_test_server/base_test_server.h b/net/test/spawned_test_server/base_test_server.h
index fb8d6ed..bb82ed0 100644
--- a/net/test/spawned_test_server/base_test_server.h
+++ b/net/test/spawned_test_server/base_test_server.h
@@ -155,16 +155,13 @@ class BaseTestServer {
// connections.
bool fallback_scsv_enabled;
+ // (Fake) SignedCertificateTimestampList (as a raw binary string) to send in
+ // a TLS extension.
// Temporary glue for testing: validation of SCTs is application-controlled
// and can be appropriately mocked out, so sending fake data here does not
// affect handshaking behaviour.
// TODO(ekasper): replace with valid SCT files for test certs.
- // (Fake) SignedCertificateTimestampList (as a raw binary string) to send in
- // a TLS extension.
- std::string signed_cert_timestamps_tls_ext;
-
- // Whether to staple the OCSP response.
- bool staple_ocsp_response;
+ std::string signed_cert_timestamps;
};
// Pass as the 'host' parameter during construction to server on 127.0.0.1