Handle TLS-intolerant servers by retrying with TLS 1.0
turned off.
R=darin
BUG=3001
Review URL: http://codereview.chromium.org/5617
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@3017 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/net/base/ssl_client_socket_unittest.cc b/net/base/ssl_client_socket_unittest.cc
index b29a7626..2aba7ab7 100644
--- a/net/base/ssl_client_socket_unittest.cc
+++ b/net/base/ssl_client_socket_unittest.cc
@@ -14,6 +14,9 @@
namespace {
+const unsigned int kDefaultSSLVersionMask = net::SSLClientSocket::SSL3 |
+ net::SSLClientSocket::TLS1;
+
class SSLClientSocketTest : public testing::Test {
};
@@ -31,7 +34,8 @@
int rv = resolver.Resolve(hostname, 443, &addr, NULL);
EXPECT_EQ(net::OK, rv);
- net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname);
+ net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname,
+ kDefaultSSLVersionMask);
EXPECT_FALSE(sock.IsConnected());
@@ -62,7 +66,8 @@
rv = callback.WaitForResult();
EXPECT_EQ(rv, net::OK);
- net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname);
+ net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname,
+ kDefaultSSLVersionMask);
rv = sock.Connect(&callback);
if (rv != net::OK) {
@@ -105,7 +110,8 @@
int rv = resolver.Resolve(hostname, 443, &addr, NULL);
EXPECT_EQ(rv, net::OK);
- net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname);
+ net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname,
+ kDefaultSSLVersionMask);
rv = sock.Connect(&callback);
if (rv != net::OK) {
@@ -148,7 +154,8 @@
int rv = resolver.Resolve(hostname, 443, &addr, NULL);
EXPECT_EQ(rv, net::OK);
- net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname);
+ net::SSLClientSocket sock(new net::TCPClientSocket(addr), hostname,
+ kDefaultSSLVersionMask);
rv = sock.Connect(&callback);
if (rv != net::OK) {