| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 3df20bbc42d366cb96be51ae7940bfcd38787d4b..a581c1aad967059837e6613d6c15988ae9eb67db 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -283,6 +283,56 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) {
|
| EXPECT_FALSE(sock->IsConnected());
|
| }
|
|
|
| +// Connect using a certificate to a server that has TLS-SRP enabled. Tests that
|
| +// when we set use_tls_auth=false in SSL config, it doesn't attempt TLS-SRP
|
| +// auth.
|
| +TEST_F(SSLClientSocketTest, ConnectUsingCertWithTLSAuthDisabled) {
|
| + net::TestServer::HTTPSOptions https_options;
|
| + https_options.use_tls_srp = true;
|
| + net::TestServer test_server(https_options, FilePath());
|
| + ASSERT_TRUE(test_server.Start());
|
| +
|
| + net::AddressList addr;
|
| + ASSERT_TRUE(test_server.GetAddressList(&addr));
|
| +
|
| + TestCompletionCallback callback;
|
| + net::CapturingNetLog log(net::CapturingNetLog::kUnbounded);
|
| + net::ClientSocket* transport = new net::TCPClientSocket(
|
| + addr, &log, net::NetLog::Source());
|
| + int rv = transport->Connect(&callback);
|
| + if (rv == net::ERR_IO_PENDING)
|
| + rv = callback.WaitForResult();
|
| + EXPECT_EQ(net::OK, rv);
|
| +
|
| + // Disable TLS-SRP
|
| + net::SSLConfig ssl_config = kDefaultSSLConfig;
|
| + ssl_config.use_tls_auth = false;
|
| +
|
| + scoped_ptr<net::SSLClientSocket> sock(
|
| + socket_factory_->CreateSSLClientSocket(
|
| + transport, test_server.host_port_pair(), ssl_config,
|
| + NULL, cert_verifier_.get()));
|
| +
|
| + EXPECT_FALSE(sock->IsConnected());
|
| +
|
| + rv = sock->Connect(&callback);
|
| +
|
| + net::CapturingNetLog::EntryList entries;
|
| + log.GetEntries(&entries);
|
| + EXPECT_TRUE(net::LogContainsBeginEvent(
|
| + entries, 5, net::NetLog::TYPE_SSL_CONNECT));
|
| + if (rv == net::ERR_IO_PENDING)
|
| + rv = callback.WaitForResult();
|
| + EXPECT_EQ(net::OK, rv);
|
| +
|
| + EXPECT_TRUE(sock->IsConnected());
|
| + log.GetEntries(&entries);
|
| + EXPECT_TRUE(LogContainsSSLConnectEndEvent(entries, -1));
|
| +
|
| + sock->Disconnect();
|
| + EXPECT_FALSE(sock->IsConnected());
|
| +}
|
| +
|
| // TODO(wtc): Add unit tests for IsConnectedAndIdle:
|
| // - Server closes an SSL connection (with a close_notify alert message).
|
| // - Server closes the underlying TCP connection directly.
|
|
|