| Index: net/base/x509_certificate_unittest.cc
|
| diff --git a/net/base/x509_certificate_unittest.cc b/net/base/x509_certificate_unittest.cc
|
| index 03c696ab203e41f1d4461390e641b916c5bbbcbc..63eec153e0c6be74f7744b8a4f772f90f25fa69a 100644
|
| --- a/net/base/x509_certificate_unittest.cc
|
| +++ b/net/base/x509_certificate_unittest.cc
|
| @@ -108,7 +108,7 @@ TEST(X509CertificateTest, GoogleCertParsing) {
|
|
|
| ASSERT_NE(static_cast<X509Certificate*>(NULL), google_cert);
|
|
|
| - const X509Certificate::Principal& subject = google_cert->subject();
|
| + const CertPrincipal& subject = google_cert->subject();
|
| EXPECT_EQ("www.google.com", subject.common_name);
|
| EXPECT_EQ("Mountain View", subject.locality_name);
|
| EXPECT_EQ("California", subject.state_or_province_name);
|
| @@ -119,7 +119,7 @@ TEST(X509CertificateTest, GoogleCertParsing) {
|
| EXPECT_EQ(0U, subject.organization_unit_names.size());
|
| EXPECT_EQ(0U, subject.domain_components.size());
|
|
|
| - const X509Certificate::Principal& issuer = google_cert->issuer();
|
| + const CertPrincipal& issuer = google_cert->issuer();
|
| EXPECT_EQ("Thawte SGC CA", issuer.common_name);
|
| EXPECT_EQ("", issuer.locality_name);
|
| EXPECT_EQ("", issuer.state_or_province_name);
|
| @@ -137,7 +137,7 @@ TEST(X509CertificateTest, GoogleCertParsing) {
|
| const Time& valid_expiry = google_cert->valid_expiry();
|
| EXPECT_EQ(1269728407, valid_expiry.ToDoubleT()); // Mar 27 22:20:07 2010 GMT
|
|
|
| - const X509Certificate::Fingerprint& fingerprint = google_cert->fingerprint();
|
| + const SHA1Fingerprint& fingerprint = google_cert->fingerprint();
|
| for (size_t i = 0; i < 20; ++i)
|
| EXPECT_EQ(google_fingerprint[i], fingerprint.data[i]);
|
|
|
| @@ -162,7 +162,7 @@ TEST(X509CertificateTest, WebkitCertParsing) {
|
|
|
| ASSERT_NE(static_cast<X509Certificate*>(NULL), webkit_cert);
|
|
|
| - const X509Certificate::Principal& subject = webkit_cert->subject();
|
| + const CertPrincipal& subject = webkit_cert->subject();
|
| EXPECT_EQ("Cupertino", subject.locality_name);
|
| EXPECT_EQ("California", subject.state_or_province_name);
|
| EXPECT_EQ("US", subject.country_name);
|
| @@ -173,7 +173,7 @@ TEST(X509CertificateTest, WebkitCertParsing) {
|
| EXPECT_EQ("Mac OS Forge", subject.organization_unit_names[0]);
|
| EXPECT_EQ(0U, subject.domain_components.size());
|
|
|
| - const X509Certificate::Principal& issuer = webkit_cert->issuer();
|
| + const CertPrincipal& issuer = webkit_cert->issuer();
|
| EXPECT_EQ("Go Daddy Secure Certification Authority", issuer.common_name);
|
| EXPECT_EQ("Scottsdale", issuer.locality_name);
|
| EXPECT_EQ("Arizona", issuer.state_or_province_name);
|
| @@ -193,7 +193,7 @@ TEST(X509CertificateTest, WebkitCertParsing) {
|
| const Time& valid_expiry = webkit_cert->valid_expiry();
|
| EXPECT_EQ(1300491319, valid_expiry.ToDoubleT()); // Mar 18 23:35:19 2011 GMT
|
|
|
| - const X509Certificate::Fingerprint& fingerprint = webkit_cert->fingerprint();
|
| + const SHA1Fingerprint& fingerprint = webkit_cert->fingerprint();
|
| for (size_t i = 0; i < 20; ++i)
|
| EXPECT_EQ(webkit_fingerprint[i], fingerprint.data[i]);
|
|
|
| @@ -218,7 +218,7 @@ TEST(X509CertificateTest, ThawteCertParsing) {
|
|
|
| ASSERT_NE(static_cast<X509Certificate*>(NULL), thawte_cert);
|
|
|
| - const X509Certificate::Principal& subject = thawte_cert->subject();
|
| + const CertPrincipal& subject = thawte_cert->subject();
|
| EXPECT_EQ("www.thawte.com", subject.common_name);
|
| EXPECT_EQ("Mountain View", subject.locality_name);
|
| EXPECT_EQ("California", subject.state_or_province_name);
|
| @@ -229,7 +229,7 @@ TEST(X509CertificateTest, ThawteCertParsing) {
|
| EXPECT_EQ(0U, subject.organization_unit_names.size());
|
| EXPECT_EQ(0U, subject.domain_components.size());
|
|
|
| - const X509Certificate::Principal& issuer = thawte_cert->issuer();
|
| + const CertPrincipal& issuer = thawte_cert->issuer();
|
| EXPECT_EQ("thawte Extended Validation SSL CA", issuer.common_name);
|
| EXPECT_EQ("", issuer.locality_name);
|
| EXPECT_EQ("", issuer.state_or_province_name);
|
| @@ -249,7 +249,7 @@ TEST(X509CertificateTest, ThawteCertParsing) {
|
| const Time& valid_expiry = thawte_cert->valid_expiry();
|
| EXPECT_EQ(1263772799, valid_expiry.ToDoubleT()); // Jan 17 23:59:59 2010 GMT
|
|
|
| - const X509Certificate::Fingerprint& fingerprint = thawte_cert->fingerprint();
|
| + const SHA1Fingerprint& fingerprint = thawte_cert->fingerprint();
|
| for (size_t i = 0; i < 20; ++i)
|
| EXPECT_EQ(thawte_fingerprint[i], fingerprint.data[i]);
|
|
|
| @@ -281,7 +281,7 @@ TEST(X509CertificateTest, PaypalNullCertParsing) {
|
|
|
| ASSERT_NE(static_cast<X509Certificate*>(NULL), paypal_null_cert);
|
|
|
| - const X509Certificate::Fingerprint& fingerprint =
|
| + const SHA1Fingerprint& fingerprint =
|
| paypal_null_cert->fingerprint();
|
| for (size_t i = 0; i < 20; ++i)
|
| EXPECT_EQ(paypal_null_fingerprint[i], fingerprint.data[i]);
|
| @@ -309,7 +309,7 @@ TEST(X509CertificateTest, UnoSoftCertParsing) {
|
|
|
| ASSERT_NE(static_cast<X509Certificate*>(NULL), unosoft_hu_cert);
|
|
|
| - const X509Certificate::Fingerprint& fingerprint =
|
| + const SHA1Fingerprint& fingerprint =
|
| unosoft_hu_cert->fingerprint();
|
| for (size_t i = 0; i < 20; ++i)
|
| EXPECT_EQ(unosoft_hu_fingerprint[i], fingerprint.data[i]);
|
| @@ -438,31 +438,31 @@ TEST(X509CertificateTest, Policy) {
|
| scoped_refptr<X509Certificate> webkit_cert = X509Certificate::CreateFromBytes(
|
| reinterpret_cast<const char*>(webkit_der), sizeof(webkit_der));
|
|
|
| - X509Certificate::Policy policy;
|
| + CertPolicy policy;
|
|
|
| - EXPECT_EQ(policy.Check(google_cert.get()), X509Certificate::Policy::UNKNOWN);
|
| - EXPECT_EQ(policy.Check(webkit_cert.get()), X509Certificate::Policy::UNKNOWN);
|
| + EXPECT_EQ(policy.Check(google_cert.get()), CertPolicy::UNKNOWN);
|
| + EXPECT_EQ(policy.Check(webkit_cert.get()), CertPolicy::UNKNOWN);
|
| EXPECT_FALSE(policy.HasAllowedCert());
|
| EXPECT_FALSE(policy.HasDeniedCert());
|
|
|
| policy.Allow(google_cert.get());
|
|
|
| - EXPECT_EQ(policy.Check(google_cert.get()), X509Certificate::Policy::ALLOWED);
|
| - EXPECT_EQ(policy.Check(webkit_cert.get()), X509Certificate::Policy::UNKNOWN);
|
| + EXPECT_EQ(policy.Check(google_cert.get()), CertPolicy::ALLOWED);
|
| + EXPECT_EQ(policy.Check(webkit_cert.get()), CertPolicy::UNKNOWN);
|
| EXPECT_TRUE(policy.HasAllowedCert());
|
| EXPECT_FALSE(policy.HasDeniedCert());
|
|
|
| policy.Deny(google_cert.get());
|
|
|
| - EXPECT_EQ(policy.Check(google_cert.get()), X509Certificate::Policy::DENIED);
|
| - EXPECT_EQ(policy.Check(webkit_cert.get()), X509Certificate::Policy::UNKNOWN);
|
| + EXPECT_EQ(policy.Check(google_cert.get()), CertPolicy::DENIED);
|
| + EXPECT_EQ(policy.Check(webkit_cert.get()), CertPolicy::UNKNOWN);
|
| EXPECT_FALSE(policy.HasAllowedCert());
|
| EXPECT_TRUE(policy.HasDeniedCert());
|
|
|
| policy.Allow(webkit_cert.get());
|
|
|
| - EXPECT_EQ(policy.Check(google_cert.get()), X509Certificate::Policy::DENIED);
|
| - EXPECT_EQ(policy.Check(webkit_cert.get()), X509Certificate::Policy::ALLOWED);
|
| + EXPECT_EQ(policy.Check(google_cert.get()), CertPolicy::DENIED);
|
| + EXPECT_EQ(policy.Check(webkit_cert.get()), CertPolicy::ALLOWED);
|
| EXPECT_TRUE(policy.HasAllowedCert());
|
| EXPECT_TRUE(policy.HasDeniedCert());
|
| }
|
|
|