| Index: chrome/browser/chromeos/login/profile_auth_data_unittest.cc
|
| diff --git a/chrome/browser/chromeos/login/profile_auth_data_unittest.cc b/chrome/browser/chromeos/login/profile_auth_data_unittest.cc
|
| index d2385fae0a544d97b1e50a3f9d4c4f74c3458d61..50fc4ca56dde574744db6b05d9f42b291195034f 100644
|
| --- a/chrome/browser/chromeos/login/profile_auth_data_unittest.cc
|
| +++ b/chrome/browser/chromeos/login/profile_auth_data_unittest.cc
|
| @@ -27,6 +27,7 @@
|
| #include "net/http/http_transaction_factory.h"
|
| #include "net/ssl/channel_id_service.h"
|
| #include "net/ssl/channel_id_store.h"
|
| +#include "net/test/channel_id_test_util.h"
|
| #include "net/url_request/url_request_context.h"
|
| #include "net/url_request/url_request_context_getter.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| @@ -51,10 +52,6 @@ const char kGAIACookieDomain[] = "google.com";
|
| const char kSAMLIdPCookieDomain[] = "example.com";
|
|
|
| const char kChannelIDServerIdentifier[] = "server";
|
| -const char kChannelIDPrivateKey1[] = "private key 1";
|
| -const char kChannelIDPrivateKey2[] = "private key 2";
|
| -const char kChannelIDCert1[] = "cert 1";
|
| -const char kChannelIDCert2[] = "cert 2";
|
|
|
| } // namespace
|
|
|
| @@ -75,15 +72,17 @@ class ProfileAuthDataTest : public testing::Test {
|
| void VerifyTransferredUserProxyAuthEntry();
|
| void VerifyUserCookies(const std::string& expected_gaia_cookie_value,
|
| const std::string& expected_saml_idp_cookie_value);
|
| - void VerifyUserChannelID(const std::string& expected_private_key,
|
| - const std::string& expected_cert);
|
| + void VerifyUserChannelID(crypto::ECPrivateKey* expected_key);
|
| +
|
| + protected:
|
| + scoped_ptr<crypto::ECPrivateKey> channel_id_key1_;
|
| + scoped_ptr<crypto::ECPrivateKey> channel_id_key2_;
|
|
|
| private:
|
| void PopulateBrowserContext(content::BrowserContext* browser_context,
|
| const std::string& proxy_auth_password,
|
| const std::string& cookie_value,
|
| - const std::string& channel_id_private_key,
|
| - const std::string& channel_id_cert);
|
| + scoped_ptr<crypto::ECPrivateKey> channel_id_key);
|
|
|
| net::URLRequestContext* GetRequestContext(
|
| content::BrowserContext* browser_context);
|
| @@ -108,19 +107,17 @@ class ProfileAuthDataTest : public testing::Test {
|
| };
|
|
|
| void ProfileAuthDataTest::SetUp() {
|
| - PopulateBrowserContext(&login_browser_context_,
|
| - kProxyAuthPassword1,
|
| + channel_id_key1_.reset(crypto::ECPrivateKey::Create());
|
| + channel_id_key2_.reset(crypto::ECPrivateKey::Create());
|
| + PopulateBrowserContext(&login_browser_context_, kProxyAuthPassword1,
|
| kCookieValue1,
|
| - kChannelIDPrivateKey1,
|
| - kChannelIDCert1);
|
| + make_scoped_ptr(channel_id_key1_->Copy()));
|
| }
|
|
|
| void ProfileAuthDataTest::PopulateUserBrowserContext() {
|
| - PopulateBrowserContext(&user_browser_context_,
|
| - kProxyAuthPassword2,
|
| + PopulateBrowserContext(&user_browser_context_, kProxyAuthPassword2,
|
| kCookieValue2,
|
| - kChannelIDPrivateKey2,
|
| - kChannelIDCert2);
|
| + make_scoped_ptr(channel_id_key2_->Copy()));
|
| }
|
|
|
| void ProfileAuthDataTest::Transfer(
|
| @@ -190,22 +187,19 @@ void ProfileAuthDataTest::VerifyUserCookies(
|
| }
|
|
|
| void ProfileAuthDataTest::VerifyUserChannelID(
|
| - const std::string& expected_private_key,
|
| - const std::string& expected_cert) {
|
| + crypto::ECPrivateKey* expected_key) {
|
| net::ChannelIDStore::ChannelIDList user_channel_ids = GetUserChannelIDs();
|
| ASSERT_EQ(1u, user_channel_ids.size());
|
| net::ChannelIDStore::ChannelID* channel_id = &user_channel_ids.front();
|
| EXPECT_EQ(kChannelIDServerIdentifier, channel_id->server_identifier());
|
| - EXPECT_EQ(expected_private_key, channel_id->private_key());
|
| - EXPECT_EQ(expected_cert, channel_id->cert());
|
| + EXPECT_TRUE(net::KeysEqual(expected_key, channel_id->key()));
|
| }
|
|
|
| void ProfileAuthDataTest::PopulateBrowserContext(
|
| content::BrowserContext* browser_context,
|
| const std::string& proxy_auth_password,
|
| const std::string& cookie_value,
|
| - const std::string& channel_id_private_key,
|
| - const std::string& channel_id_cert) {
|
| + scoped_ptr<crypto::ECPrivateKey> channel_id_key) {
|
| GetProxyAuth(browser_context)->Add(
|
| GURL(kProxyAuthURL),
|
| kProxyAuthRealm,
|
| @@ -233,11 +227,9 @@ void ProfileAuthDataTest::PopulateBrowserContext(
|
| false, net::COOKIE_PRIORITY_DEFAULT));
|
| cookies->ImportCookies(cookie_list);
|
|
|
| - GetChannelIDs(browser_context)->SetChannelID(kChannelIDServerIdentifier,
|
| - base::Time(),
|
| - base::Time(),
|
| - channel_id_private_key,
|
| - channel_id_cert);
|
| + GetChannelIDs(browser_context)
|
| + ->SetChannelID(make_scoped_ptr(new net::ChannelIDStore::ChannelID(
|
| + kChannelIDServerIdentifier, base::Time(), channel_id_key.Pass())));
|
| }
|
|
|
| net::URLRequestContext* ProfileAuthDataTest::GetRequestContext(
|
| @@ -296,7 +288,7 @@ TEST_F(ProfileAuthDataTest, TransferOnFirstLoginWithNewProfile) {
|
|
|
| VerifyTransferredUserProxyAuthEntry();
|
| VerifyUserCookies(kCookieValue1, kCookieValue1);
|
| - VerifyUserChannelID(kChannelIDPrivateKey1, kChannelIDCert1);
|
| + VerifyUserChannelID(channel_id_key1_.get());
|
| }
|
|
|
| // Verifies that even if the transfer of auth cookies and channel IDs on first
|
| @@ -309,7 +301,7 @@ TEST_F(ProfileAuthDataTest, TransferOnFirstLoginWithExistingProfile) {
|
|
|
| VerifyTransferredUserProxyAuthEntry();
|
| VerifyUserCookies(kCookieValue2, kCookieValue2);
|
| - VerifyUserChannelID(kChannelIDPrivateKey2, kChannelIDCert2);
|
| + VerifyUserChannelID(channel_id_key2_.get());
|
| }
|
|
|
| // Verifies that when the transfer of auth cookies set by a SAML IdP on
|
| @@ -322,7 +314,7 @@ TEST_F(ProfileAuthDataTest, TransferOnSubsequentLogin) {
|
|
|
| VerifyTransferredUserProxyAuthEntry();
|
| VerifyUserCookies(kCookieValue2, kCookieValue1);
|
| - VerifyUserChannelID(kChannelIDPrivateKey2, kChannelIDCert2);
|
| + VerifyUserChannelID(channel_id_key2_.get());
|
| }
|
|
|
| } // namespace chromeos
|
|
|