fix failing ConnectWithRevocation_ServerCertWithoutContext_NoStapleOcsp failures #83013
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was mismatch between the test and product. When context is created from certificate internally, the code defaults to OCSP processing
runtime/src/libraries/System.Net.Security/src/System/Net/Security/SslStreamCertificateContext.cs
Lines 21 to 24 in 4eca676
(negative false -> oof ;( )
So the server would provide OCSP response and based on the timing the test would succeed or fail.
I was thinking about deleting the test but I decided to keep it and modify the behavior instead.
This would IMHO preserve legacy behavior. When single certificate is used it would act as it always did - e.g. no OCSP.
When
SslStreamCertificateContext
is created and provided by user we would take is as intention to reuse it over time and we would handle TLS resume & OCSP. This is currently recommended use as it also offers other performance benefits.fixes #70981