Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/browser/net/pref_proxy_config_service.h" | |
| 6 | |
| 7 #include "base/message_loop.h" | |
| 8 #include "base/values.h" | |
| 9 #include "chrome/browser/net/ssl_config_service_manager.h" | |
| 10 #include "chrome/common/pref_names.h" | |
| 11 #include "chrome/test/testing_pref_service.h" | |
| 12 #include "content/browser/browser_thread.h" | |
| 13 #include "net/base/ssl_config_service.h" | |
| 14 #include "testing/gtest/include/gtest/gtest.h" | |
| 15 | |
| 16 using base::ListValue; | |
| 17 using base::Value; | |
| 18 using net::SSLConfig; | |
| 19 using net::SSLConfigService; | |
| 20 | |
| 21 class SSLConfigServiceManagerPrefTest : public testing::Test { | |
| 22 public: | |
| 23 SSLConfigServiceManagerPrefTest() {} | |
| 24 | |
| 25 virtual void SetUp() { | |
| 26 message_loop_.reset(new MessageLoop()); | |
| 27 ui_thread_.reset( | |
| 28 new BrowserThread(BrowserThread::UI, message_loop_.get())); | |
|
battre
2011/07/22 08:44:04
nit: single line (also below)
Ryan Sleevi
2011/07/23 04:55:41
Single line is 81 characters, hence the wrapping.
| |
| 29 io_thread_.reset( | |
| 30 new BrowserThread(BrowserThread::IO, message_loop_.get())); | |
| 31 pref_service_.reset(new TestingPrefService()); | |
| 32 SSLConfigServiceManager::RegisterPrefs(pref_service_.get()); | |
| 33 } | |
| 34 | |
| 35 virtual void TearDown() { | |
| 36 pref_service_.reset(); | |
| 37 io_thread_.reset(); | |
| 38 ui_thread_.reset(); | |
| 39 message_loop_.reset(); | |
| 40 } | |
| 41 | |
| 42 protected: | |
| 43 scoped_ptr<MessageLoop> message_loop_; | |
| 44 scoped_ptr<BrowserThread> ui_thread_; | |
| 45 scoped_ptr<BrowserThread> io_thread_; | |
| 46 scoped_ptr<TestingPrefService> pref_service_; | |
| 47 }; | |
| 48 | |
| 49 // Test that cipher suites can be disabled. "Good" refers to the fact that | |
| 50 // every value is expected to be successfully parsed into a cipher suite. | |
| 51 TEST_F(SSLConfigServiceManagerPrefTest, GoodDisabledCipherSuites) { | |
| 52 scoped_ptr<SSLConfigServiceManager> config_manager( | |
| 53 SSLConfigServiceManager::CreateDefaultManager(pref_service_.get())); | |
| 54 ASSERT_TRUE(config_manager.get()); | |
| 55 scoped_refptr<SSLConfigService> config_service(config_manager->Get()); | |
| 56 ASSERT_TRUE(config_service.get()); | |
| 57 | |
| 58 SSLConfig old_config; | |
| 59 config_service->GetSSLConfig(&old_config); | |
| 60 EXPECT_TRUE(old_config.disabled_cipher_suites.empty()); | |
| 61 | |
| 62 ListValue* list_value = new ListValue(); | |
| 63 list_value->Append(Value::CreateStringValue("0x0004")); | |
| 64 list_value->Append(Value::CreateStringValue("0x0005")); | |
| 65 pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value); | |
| 66 | |
| 67 // Pump the message loop to notify the SSLConfigServiceManagerPref that the | |
| 68 // preferences changed. | |
| 69 message_loop_->RunAllPending(); | |
| 70 | |
| 71 SSLConfig config; | |
| 72 config_service->GetSSLConfig(&config); | |
| 73 | |
| 74 EXPECT_NE(old_config.disabled_cipher_suites, config.disabled_cipher_suites); | |
| 75 ASSERT_EQ(2u, config.disabled_cipher_suites.size()); | |
| 76 EXPECT_EQ(0x0004, config.disabled_cipher_suites[0]); | |
| 77 EXPECT_EQ(0x0005, config.disabled_cipher_suites[1]); | |
| 78 } | |
| 79 | |
| 80 // Test that cipher suites can be disabled. "Bad" refers to the fact that | |
| 81 // there are one or more non-cipher suite strings in the preference. They | |
| 82 // should be ignored. | |
| 83 TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) { | |
| 84 scoped_ptr<SSLConfigServiceManager> config_manager( | |
| 85 SSLConfigServiceManager::CreateDefaultManager(pref_service_.get())); | |
| 86 ASSERT_TRUE(config_manager.get()); | |
| 87 scoped_refptr<SSLConfigService> config_service(config_manager->Get()); | |
| 88 ASSERT_TRUE(config_service.get()); | |
| 89 | |
| 90 SSLConfig old_config; | |
| 91 config_service->GetSSLConfig(&old_config); | |
| 92 EXPECT_TRUE(old_config.disabled_cipher_suites.empty()); | |
| 93 | |
| 94 ListValue* list_value = new ListValue(); | |
| 95 list_value->Append(Value::CreateStringValue("0x0004")); | |
| 96 list_value->Append(Value::CreateStringValue("TLS_NOT_WITH_A_CIPHER_SUITE")); | |
| 97 list_value->Append(Value::CreateStringValue("0x0005")); | |
| 98 list_value->Append(Value::CreateStringValue("0xBEEFY")); | |
| 99 pref_service_->SetUserPref(prefs::kCipherSuiteBlacklist, list_value); | |
| 100 | |
| 101 // Pump the message loop to notify the SSLConfigServiceManagerPref that the | |
| 102 // preferences changed. | |
| 103 message_loop_->RunAllPending(); | |
| 104 | |
| 105 SSLConfig config; | |
| 106 config_service->GetSSLConfig(&config); | |
| 107 | |
| 108 EXPECT_NE(old_config.disabled_cipher_suites, config.disabled_cipher_suites); | |
| 109 ASSERT_EQ(2u, config.disabled_cipher_suites.size()); | |
| 110 EXPECT_EQ(0x0004, config.disabled_cipher_suites[0]); | |
| 111 EXPECT_EQ(0x0005, config.disabled_cipher_suites[1]); | |
| 112 } | |
| OLD | NEW |