| Index: chrome/browser/net/certificate_error_reporter_unittest.cc
|
| diff --git a/chrome/browser/net/certificate_error_reporter_unittest.cc b/chrome/browser/net/certificate_error_reporter_unittest.cc
|
| index f9054cd5cd054e625f6f477657b97bf6660bb88d..cc6fee791297d84342b26bed3394b335e7666a35 100644
|
| --- a/chrome/browser/net/certificate_error_reporter_unittest.cc
|
| +++ b/chrome/browser/net/certificate_error_reporter_unittest.cc
|
| @@ -19,7 +19,6 @@
|
| #include "chrome/browser/net/cert_logger.pb.h"
|
| #include "chrome/common/chrome_paths.h"
|
| #include "content/public/browser/browser_thread.h"
|
| -#include "crypto/curve25519.h"
|
| #include "net/base/load_flags.h"
|
| #include "net/base/network_delegate_impl.h"
|
| #include "net/base/test_data_directory.h"
|
| @@ -48,7 +47,6 @@
|
| const char kSecondRequestHostname[] = "test2.mail.google.com";
|
| const char kDummyFailureLog[] = "dummy failure log";
|
| const char kTestCertFilename[] = "test_mail_google_com.pem";
|
| -const uint32 kServerPublicKeyVersion = 1;
|
|
|
| SSLInfo GetTestSSLInfo() {
|
| SSLInfo info;
|
| @@ -85,9 +83,7 @@
|
| // |GetTestSSLInfo()|). The hostname sent in the report will be erased
|
| // from |expect_hostnames|.
|
| void CheckUploadData(URLRequest* request,
|
| - std::set<std::string>* expect_hostnames,
|
| - bool encrypted,
|
| - const uint8* server_private_key) {
|
| + std::set<std::string>* expect_hostnames) {
|
| const net::UploadDataStream* upload = request->get_upload();
|
| ASSERT_TRUE(upload);
|
| ASSERT_TRUE(upload->GetElementReaders());
|
| @@ -97,27 +93,9 @@
|
| (*upload->GetElementReaders())[0]->AsBytesReader();
|
| ASSERT_TRUE(reader);
|
| std::string upload_data(reader->bytes(), reader->length());
|
| -
|
| chrome_browser_net::CertLoggerRequest uploaded_request;
|
| -#if defined(USE_OPENSSL)
|
| - if (encrypted) {
|
| - chrome_browser_net::EncryptedCertLoggerRequest encrypted_request;
|
| - encrypted_request.ParseFromString(upload_data);
|
| - EXPECT_EQ(kServerPublicKeyVersion,
|
| - encrypted_request.server_public_key_version());
|
| - EXPECT_EQ(chrome_browser_net::EncryptedCertLoggerRequest::
|
| - AEAD_ECDH_AES_128_CTR_HMAC_SHA256,
|
| - encrypted_request.algorithm());
|
| - ASSERT_TRUE(
|
| - chrome_browser_net::CertificateErrorReporter::
|
| - DecryptCertificateErrorReport(server_private_key, encrypted_request,
|
| - &uploaded_request));
|
| - } else {
|
| - ASSERT_TRUE(uploaded_request.ParseFromString(upload_data));
|
| - }
|
| -#else
|
| - ASSERT_TRUE(uploaded_request.ParseFromString(upload_data));
|
| -#endif
|
| +
|
| + uploaded_request.ParseFromString(upload_data);
|
|
|
| EXPECT_EQ(1u, expect_hostnames->count(uploaded_request.hostname()));
|
| expect_hostnames->erase(uploaded_request.hostname());
|
| @@ -138,11 +116,7 @@
|
| : url_request_destroyed_callback_(base::Bind(&base::DoNothing)),
|
| all_url_requests_destroyed_callback_(base::Bind(&base::DoNothing)),
|
| num_requests_(0),
|
| - expect_cookies_(false),
|
| - expect_request_encrypted_(false) {
|
| - memset(server_private_key_, 1, sizeof(server_private_key_));
|
| - crypto::curve25519::ScalarBaseMult(server_private_key_, server_public_key_);
|
| - }
|
| + expect_cookies_(false) {}
|
|
|
| ~TestCertificateErrorReporterNetworkDelegate() override {}
|
|
|
| @@ -169,10 +143,6 @@
|
| // "cookie_name=cookie_value".
|
| void set_expect_cookies(bool expect_cookies) {
|
| expect_cookies_ = expect_cookies;
|
| - }
|
| -
|
| - void set_expect_request_encrypted(bool expect_request_encrypted) {
|
| - expect_request_encrypted_ = expect_request_encrypted;
|
| }
|
|
|
| // NetworkDelegateImpl implementation
|
| @@ -192,8 +162,7 @@
|
| }
|
|
|
| std::string uploaded_request_hostname;
|
| - CheckUploadData(request, &expect_hostnames_, expect_request_encrypted_,
|
| - server_private_key_);
|
| + CheckUploadData(request, &expect_hostnames_);
|
| expect_hostnames_.erase(uploaded_request_hostname);
|
| return net::OK;
|
| }
|
| @@ -203,8 +172,6 @@
|
| if (expect_hostnames_.empty())
|
| all_url_requests_destroyed_callback_.Run();
|
| }
|
| -
|
| - const uint8* server_public_key() { return server_public_key_; }
|
|
|
| private:
|
| base::Closure url_request_destroyed_callback_;
|
| @@ -213,10 +180,6 @@
|
| GURL expect_url_;
|
| std::set<std::string> expect_hostnames_;
|
| bool expect_cookies_;
|
| - bool expect_request_encrypted_;
|
| -
|
| - uint8 server_public_key_[32];
|
| - uint8 server_private_key_[32];
|
|
|
| DISALLOW_COPY_AND_ASSIGN(TestCertificateErrorReporterNetworkDelegate);
|
| };
|
| @@ -274,24 +237,11 @@
|
| }
|
|
|
| TEST_F(CertificateErrorReporterTest, ExtendedReportingSendReportSendsRequest) {
|
| - // Data should not be encrypted when sent to an HTTPS URL.
|
| - GURL https_url = net::URLRequestMockDataJob::GetMockHttpsUrl("dummy data", 1);
|
| - CertificateErrorReporter https_reporter(
|
| - context(), https_url, CertificateErrorReporter::DO_NOT_SEND_COOKIES);
|
| - network_delegate()->set_expect_request_encrypted(false);
|
| - SendReport(&https_reporter, network_delegate(), kHostname, https_url, 0,
|
| + GURL url = net::URLRequestMockDataJob::GetMockHttpsUrl("dummy data", 1);
|
| + CertificateErrorReporter reporter(
|
| + context(), url, CertificateErrorReporter::DO_NOT_SEND_COOKIES);
|
| + SendReport(&reporter, network_delegate(), kHostname, url, 0,
|
| CertificateErrorReporter::REPORT_TYPE_EXTENDED_REPORTING);
|
| -
|
| - // Data should be encrypted when sent to an HTTP URL.
|
| - if (CertificateErrorReporter::IsHttpUploadUrlSupported()) {
|
| - GURL http_url = net::URLRequestMockDataJob::GetMockHttpUrl("dummy data", 1);
|
| - CertificateErrorReporter http_reporter(
|
| - context(), http_url, CertificateErrorReporter::DO_NOT_SEND_COOKIES,
|
| - network_delegate()->server_public_key(), kServerPublicKeyVersion);
|
| - network_delegate()->set_expect_request_encrypted(true);
|
| - SendReport(&http_reporter, network_delegate(), kHostname, http_url, 1,
|
| - CertificateErrorReporter::REPORT_TYPE_EXTENDED_REPORTING);
|
| - }
|
| }
|
|
|
| TEST_F(CertificateErrorReporterTest, SendMultipleReportsSequentially) {
|
|
|