| Index: chrome/browser/chromeos/cros/onc_network_parser_unittest.cc
|
| diff --git a/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc b/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc
|
| index fb63bb4414edf17cce19b1080637761f0faa65c2..696bbc3dc5b137a2043bbffaa715a498e2e1b96d 100644
|
| --- a/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc
|
| +++ b/chrome/browser/chromeos/cros/onc_network_parser_unittest.cc
|
| @@ -469,7 +469,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkWifi1) {
|
| " }"
|
| " }]"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| EXPECT_EQ(0, parser.GetCertificatesSize());
|
| @@ -487,6 +487,46 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkWifi1) {
|
| CheckStringProperty(wifi, PROPERTY_INDEX_PASSPHRASE, "pass");
|
| }
|
|
|
| +TEST_F(OncNetworkParserTest, TestLoadEncryptedOnc) {
|
| + std::string test_blob(
|
| + "{"
|
| + " \"Cipher\": \"AES256\","
|
| + " \"Ciphertext\": \"eQ9/r6v29/83M745aa0JllEj4lklt3Nfy4kPPvXgjBt1eTBy"
|
| + "xXB+FnsdvL6Uca5JBU5aROxfiol2+ZZOkxPmUNNIFZj70pkdqOGVe09ncf0aVBDsAa27"
|
| + "veGIG8rG/VQTTbAo7d8QaxdNNbZvwQVkdsAXawzPCu7zSh4NF/hDnDbYjbN/JEm1NzvW"
|
| + "gEjeOfqnnw3PnGUYCArIaRsKq9uD0a1NccU+16ZSzyDhX724JNrJjsuxohotk5YXsCK0"
|
| + "lP7ZXuXj+nSR0aRIETSQ+eqGhrew2octLXq8cXK05s6ZuVAc0mFKPkntSI/fzBACuPi4"
|
| + "ZaGd3YEYiKzNOgKJ+qEwgoE39xp0EXMZOZyjMOAtA6e1ZZDQGWG7vKdTLmLKNztHGrXv"
|
| + "lZkyEf1RDs10YgkwwLgUhm0yBJ+eqbxO/RiBXz7O2/UVOkkkVcmeI6yh3BdL6HIYsMMy"
|
| + "gnZa5WRkd/2/EudoqEnjcqUyGsL+YUqV6KRTC0PH+z7zSwvFs2KygrSM7SIAZM2yiQHT"
|
| + "QACkA/YCJDwACkkQOBFnRWTWiX0xmN55WMbgrs/wqJ4zGC9LgdAInOBlc3P+76+i7QLa"
|
| + "NjMovQ==\","
|
| + " \"HMAC\": \"3ylRy5InlhVzFGakJ/9lvGSyVH0=\","
|
| + " \"HMACMethod\": \"SHA1\","
|
| + " \"IV\": \"hcm6OENfqG6C/TVO6p5a8g==\","
|
| + " \"Iterations\": 20000,"
|
| + " \"Salt\": \"/3O73QadCzA=\","
|
| + " \"Stretch\": \"PBKDF2\","
|
| + " \"Type\": \"EncryptedConfiguration\""
|
| + "}");
|
| + OncNetworkParser parser(test_blob,
|
| + "test0000",
|
| + NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + ASSERT_TRUE(parser.parse_error().empty());
|
| + EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| + EXPECT_EQ(0, parser.GetCertificatesSize());
|
| + scoped_ptr<Network> network(parser.ParseNetwork(0));
|
| + ASSERT_TRUE(network.get());
|
| +
|
| + EXPECT_EQ(network->type(), chromeos::TYPE_WIFI);
|
| + WifiNetwork* wifi = static_cast<WifiNetwork*>(network.get());
|
| + EXPECT_EQ(wifi->encryption(), chromeos::SECURITY_NONE);
|
| + EXPECT_EQ(wifi->name(), "WirelessNetwork");
|
| + EXPECT_EQ(wifi->auto_connect(), false);
|
| + EXPECT_EQ(wifi->passphrase(), "");
|
| +}
|
| +
|
| +
|
| TEST_F(OncNetworkParserTest, TestCreateNetworkWifiEAP1) {
|
| std::string test_blob(
|
| "{"
|
| @@ -504,7 +544,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkWifiEAP1) {
|
| " }"
|
| " }]"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| EXPECT_EQ(0, parser.GetCertificatesSize());
|
| @@ -543,7 +583,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkWifiEAP2) {
|
| " }"
|
| " }]"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| EXPECT_EQ(0, parser.GetCertificatesSize());
|
| @@ -582,7 +622,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkUnknownFields) {
|
| " },"
|
| " }]"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| scoped_ptr<Network> network(parser.ParseNetwork(0));
|
| ASSERT_TRUE(network.get());
|
|
|
| @@ -599,7 +639,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkOpenVPN) {
|
| " \"NetworkConfigurations\": [") +
|
| std::string(kNetworkConfigurationOpenVPN) + std::string(
|
| " ]}"));
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| EXPECT_EQ(0, parser.GetCertificatesSize());
|
| @@ -678,7 +718,7 @@ TEST_F(OncNetworkParserTest, TestCreateNetworkL2TPIPsec) {
|
| " ],"
|
| " \"Certificates\": []"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetNetworkConfigsSize());
|
| EXPECT_EQ(0, parser.GetCertificatesSize());
|
| @@ -709,7 +749,7 @@ TEST_F(OncNetworkParserTest, TestAddClientCertificate) {
|
| " ],"
|
| "}");
|
| std::string test_guid("{f998f760-272b-6939-4c2beffe428697ac}");
|
| - OncNetworkParser parser(certificate_json,
|
| + OncNetworkParser parser(certificate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| @@ -774,7 +814,7 @@ TEST_F(OncNetworkParserTest, TestReplaceClientCertificate) {
|
| std::string test_guid("{f998f760-272b-6939-4c2beffe428697ac}");
|
| {
|
| // First we import a certificate.
|
| - OncNetworkParser parser(certificate_json,
|
| + OncNetworkParser parser(certificate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| @@ -793,7 +833,7 @@ TEST_F(OncNetworkParserTest, TestReplaceClientCertificate) {
|
| {
|
| // Now we import a new certificate with the same GUID as the
|
| // first. It should replace the old one.
|
| - OncNetworkParser parser(certificate_alternate_json,
|
| + OncNetworkParser parser(certificate_alternate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
| scoped_refptr<net::X509Certificate> cert = parser.ParseCertificate(0).get();
|
| @@ -815,7 +855,7 @@ TEST_F(OncNetworkParserTest, TestAddServerCertificate) {
|
| " ],"
|
| "}");
|
| std::string test_guid("{f998f760-272b-6939-4c2beffe428697aa}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| scoped_refptr<net::X509Certificate> cert = parser.ParseCertificate(0).get();
|
| @@ -856,7 +896,7 @@ TEST_F(OncNetworkParserTest, TestReplaceServerCertificate) {
|
| std::string test_guid("{f998f760-272b-6939-4c2beffe428697aa}");
|
| {
|
| // First we import a certificate.
|
| - OncNetworkParser parser(certificate_json,
|
| + OncNetworkParser parser(certificate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| @@ -875,7 +915,7 @@ TEST_F(OncNetworkParserTest, TestReplaceServerCertificate) {
|
| {
|
| // Now we import a new certificate with the same GUID as the
|
| // first. It should replace the old one.
|
| - OncNetworkParser parser(certificate_alternate_json,
|
| + OncNetworkParser parser(certificate_alternate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
| scoped_refptr<net::X509Certificate> cert = parser.ParseCertificate(0).get();
|
| @@ -898,7 +938,7 @@ TEST_F(OncNetworkParserTest, TestAddAuthorityCertificate) {
|
| " ],"
|
| "}");
|
| std::string test_guid("{f998f760-272b-6939-4c2beffe428697ab}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "", NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| scoped_refptr<net::X509Certificate> cert = parser.ParseCertificate(0).get();
|
| @@ -938,7 +978,7 @@ TEST_F(OncNetworkParserTest, TestReplaceAuthorityCertificate) {
|
|
|
| {
|
| // First we import an authority certificate.
|
| - OncNetworkParser parser(authority_json,
|
| + OncNetworkParser parser(authority_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
|
|
| @@ -957,7 +997,7 @@ TEST_F(OncNetworkParserTest, TestReplaceAuthorityCertificate) {
|
| {
|
| // Now we import a new authority certificate with the same GUID as the
|
| // first. It should replace the old one.
|
| - OncNetworkParser parser(authority_alternate_json,
|
| + OncNetworkParser parser(authority_alternate_json, "",
|
| NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| ASSERT_EQ(1, parser.GetCertificatesSize());
|
| scoped_refptr<net::X509Certificate> cert = parser.ParseCertificate(0).get();
|
| @@ -982,7 +1022,8 @@ TEST_F(OncNetworkParserTest, TestNetworkAndCertificate) {
|
| std::string(kCertificateWebAuthority) +
|
| " ],"
|
| "}");
|
| - OncNetworkParser parser(test_blob, NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
| + OncNetworkParser parser(test_blob, "",
|
| + NetworkUIData::ONC_SOURCE_USER_IMPORT);
|
|
|
| EXPECT_EQ(1, parser.GetCertificatesSize());
|
| EXPECT_TRUE(parser.ParseCertificate(0));
|
|
|