summaryrefslogtreecommitdiffstats
path: root/remoting
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-15 22:44:30 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-03-15 22:44:30 +0000
commit526b3f20f632e243bc8145cb2f152d50841f9dc3 (patch)
treedd5a8957e1f417389b7e8776f1373118db03554b /remoting
parentf64da26e69609ca3a4a9250847d9b1c731171c6d (diff)
downloadchromium_src-526b3f20f632e243bc8145cb2f152d50841f9dc3.zip
chromium_src-526b3f20f632e243bc8145cb2f152d50841f9dc3.tar.gz
chromium_src-526b3f20f632e243bc8145cb2f152d50841f9dc3.tar.bz2
Add an SSLConfig option to explicit disable NSSHttpIO.
This appears to be the least-bad solution to the problem that remoting can't run SSL sockets on an IO MessageLoop. See linked bug for details. BUG=118247 TEST=remoting_unittests Review URL: http://codereview.chromium.org/9702075 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@127015 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'remoting')
-rw-r--r--remoting/protocol/authenticator_test_base.h2
-rw-r--r--remoting/protocol/ssl_hmac_channel_authenticator.cc3
-rw-r--r--remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc2
3 files changed, 4 insertions, 3 deletions
diff --git a/remoting/protocol/authenticator_test_base.h b/remoting/protocol/authenticator_test_base.h
index 6233423..cf2a73e 100644
--- a/remoting/protocol/authenticator_test_base.h
+++ b/remoting/protocol/authenticator_test_base.h
@@ -49,7 +49,7 @@ class AuthenticatorTestBase : public testing::Test {
void OnClientConnected(net::Error error,
scoped_ptr<net::StreamSocket> socket);
- MessageLoopForIO message_loop_;
+ MessageLoop message_loop_;
scoped_ptr<crypto::RSAPrivateKey> private_key_;
std::string host_cert_;
diff --git a/remoting/protocol/ssl_hmac_channel_authenticator.cc b/remoting/protocol/ssl_hmac_channel_authenticator.cc
index 0fba849..99df767 100644
--- a/remoting/protocol/ssl_hmac_channel_authenticator.cc
+++ b/remoting/protocol/ssl_hmac_channel_authenticator.cc
@@ -97,8 +97,9 @@ void SslHmacChannelAuthenticator::SecureAndAuthenticate(
// because we use self-signed certs. Disable it so that the SSL
// layer doesn't try to initialize OCSP (OCSP works only on the IO
// thread).
- ssl_config.allowed_bad_certs.push_back(cert_and_status);
+ ssl_config.cert_io_enabled = false;
ssl_config.rev_checking_enabled = false;
+ ssl_config.allowed_bad_certs.push_back(cert_and_status);
net::HostPortPair host_and_port(kSslFakeHostName, 0);
net::SSLClientSocketContext context;
diff --git a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
index 7084163..5af5299 100644
--- a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
+++ b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
@@ -104,7 +104,7 @@ class SslHmacChannelAuthenticatorTest : public testing::Test {
client_socket_ = socket.Pass();
}
- MessageLoopForIO message_loop_;
+ MessageLoop message_loop_;
scoped_ptr<crypto::RSAPrivateKey> private_key_;
std::string host_cert_;