Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(58)

Side by Side Diff: net/cert/cert_verify_proc_unittest.cc

Issue 1082123003: Rename USE_NSS to USE_NSS_CERTS. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@use-nss-certs
Patch Set: rebase Created 5 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/cert/cert_verify_proc.cc ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/cert_verify_proc.h" 5 #include "net/cert/cert_verify_proc.h"
6 6
7 #include <vector> 7 #include <vector>
8 8
9 #include "base/callback_helpers.h" 9 #include "base/callback_helpers.h"
10 #include "base/files/file_path.h" 10 #include "base/files/file_path.h"
(...skipping 194 matching lines...) Expand 10 before | Expand all | Expand 10 after
205 EXPECT_EQ(paypal_null_fingerprint[i], fingerprint.data[i]); 205 EXPECT_EQ(paypal_null_fingerprint[i], fingerprint.data[i]);
206 206
207 int flags = 0; 207 int flags = 0;
208 CertVerifyResult verify_result; 208 CertVerifyResult verify_result;
209 int error = Verify(paypal_null_cert.get(), 209 int error = Verify(paypal_null_cert.get(),
210 "www.paypal.com", 210 "www.paypal.com",
211 flags, 211 flags,
212 NULL, 212 NULL,
213 empty_cert_list_, 213 empty_cert_list_,
214 &verify_result); 214 &verify_result);
215 #if defined(USE_NSS) || defined(OS_IOS) || defined(OS_ANDROID) 215 #if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_ANDROID)
216 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); 216 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
217 #else 217 #else
218 // TOOD(bulach): investigate why macosx and win aren't returning 218 // TOOD(bulach): investigate why macosx and win aren't returning
219 // ERR_CERT_INVALID or ERR_CERT_COMMON_NAME_INVALID. 219 // ERR_CERT_INVALID or ERR_CERT_COMMON_NAME_INVALID.
220 EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error); 220 EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
221 #endif 221 #endif
222 // Either the system crypto library should correctly report a certificate 222 // Either the system crypto library should correctly report a certificate
223 // name mismatch, or our certificate blacklist should cause us to report an 223 // name mismatch, or our certificate blacklist should cause us to report an
224 // invalid certificate. 224 // invalid certificate.
225 #if defined(USE_NSS) || defined(OS_WIN) || defined(OS_IOS) 225 #if defined(USE_NSS_CERTS) || defined(OS_WIN) || defined(OS_IOS)
226 EXPECT_TRUE(verify_result.cert_status & 226 EXPECT_TRUE(verify_result.cert_status &
227 (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID)); 227 (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
228 #endif 228 #endif
229 } 229 }
230 230
231 // A regression test for http://crbug.com/31497. 231 // A regression test for http://crbug.com/31497.
232 #if defined(OS_ANDROID) 232 #if defined(OS_ANDROID)
233 // Disabled on Android, as the Android verification libraries require an 233 // Disabled on Android, as the Android verification libraries require an
234 // explicit policy to be specified, even when anyPolicy is permitted. 234 // explicit policy to be specified, even when anyPolicy is permitted.
235 #define MAYBE_IntermediateCARequireExplicitPolicy \ 235 #define MAYBE_IntermediateCARequireExplicitPolicy \
(...skipping 511 matching lines...) Expand 10 before | Expand all | Expand 10 after
747 // This certificate has two errors: "invalid key usage" and "untrusted CA". 747 // This certificate has two errors: "invalid key usage" and "untrusted CA".
748 // However, OpenSSL returns only one (the latter), and we can't detect 748 // However, OpenSSL returns only one (the latter), and we can't detect
749 // the other errors. 749 // the other errors.
750 EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error); 750 EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
751 #else 751 #else
752 EXPECT_EQ(ERR_CERT_INVALID, error); 752 EXPECT_EQ(ERR_CERT_INVALID, error);
753 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID); 753 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID);
754 #endif 754 #endif
755 // TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors 755 // TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors
756 // from NSS. 756 // from NSS.
757 #if !defined(USE_NSS) && !defined(OS_IOS) && !defined(OS_ANDROID) 757 #if !defined(USE_NSS_CERTS) && !defined(OS_IOS) && !defined(OS_ANDROID)
758 // The certificate is issued by an unknown CA. 758 // The certificate is issued by an unknown CA.
759 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID); 759 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
760 #endif 760 #endif
761 } 761 }
762 762
763 // Basic test for returning the chain in CertVerifyResult. Note that the 763 // Basic test for returning the chain in CertVerifyResult. Note that the
764 // returned chain may just be a reflection of the originally supplied chain; 764 // returned chain may just be a reflection of the originally supplied chain;
765 // that is, if any errors occur, the default chain returned is an exact copy 765 // that is, if any errors occur, the default chain returned is an exact copy
766 // of the certificate to be verified. The remaining VerifyReturn* tests are 766 // of the certificate to be verified. The remaining VerifyReturn* tests are
767 // used to ensure that the actual, verified chain is being returned by 767 // used to ensure that the actual, verified chain is being returned by
(...skipping 391 matching lines...) Expand 10 before | Expand all | Expand 10 after
1159 empty_cert_list_, 1159 empty_cert_list_,
1160 &verify_result); 1160 &verify_result);
1161 EXPECT_EQ(OK, error); 1161 EXPECT_EQ(OK, error);
1162 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); 1162 EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status);
1163 1163
1164 TestRootCerts::GetInstance()->Clear(); 1164 TestRootCerts::GetInstance()->Clear();
1165 EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty()); 1165 EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty());
1166 } 1166 }
1167 #endif 1167 #endif
1168 1168
1169 #if defined(USE_NSS) || defined(OS_IOS) || defined(OS_WIN) || defined(OS_MACOSX) 1169 #if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) || \
1170 defined(OS_MACOSX)
1170 // Test that CRLSets are effective in making a certificate appear to be 1171 // Test that CRLSets are effective in making a certificate appear to be
1171 // revoked. 1172 // revoked.
1172 TEST_F(CertVerifyProcTest, CRLSet) { 1173 TEST_F(CertVerifyProcTest, CRLSet) {
1173 CertificateList ca_cert_list = 1174 CertificateList ca_cert_list =
1174 CreateCertificateListFromFile(GetTestCertsDirectory(), 1175 CreateCertificateListFromFile(GetTestCertsDirectory(),
1175 "root_ca_cert.pem", 1176 "root_ca_cert.pem",
1176 X509Certificate::FORMAT_AUTO); 1177 X509Certificate::FORMAT_AUTO);
1177 ASSERT_EQ(1U, ca_cert_list.size()); 1178 ASSERT_EQ(1U, ca_cert_list.size());
1178 ScopedTestRoot test_root(ca_cert_list[0].get()); 1179 ScopedTestRoot test_root(ca_cert_list[0].get());
1179 1180
(...skipping 233 matching lines...) Expand 10 before | Expand all | Expand 10 after
1413 "weak_digest_sha1_ee.pem", EXPECT_MD5 | EXPECT_SHA1 }, 1414 "weak_digest_sha1_ee.pem", EXPECT_MD5 | EXPECT_SHA1 },
1414 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) 1415 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN)
1415 // MD4 is not supported by OS X / NSS 1416 // MD4 is not supported by OS X / NSS
1416 { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", 1417 { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem",
1417 "weak_digest_sha1_ee.pem", EXPECT_MD4 | EXPECT_SHA1 }, 1418 "weak_digest_sha1_ee.pem", EXPECT_MD4 | EXPECT_SHA1 },
1418 #endif 1419 #endif
1419 { "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem", 1420 { "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem",
1420 "weak_digest_sha1_ee.pem", EXPECT_MD2 | EXPECT_SHA1 }, 1421 "weak_digest_sha1_ee.pem", EXPECT_MD2 | EXPECT_SHA1 },
1421 }; 1422 };
1422 // Disabled on NSS - MD4 is not supported, and MD2 and MD5 are disabled. 1423 // Disabled on NSS - MD4 is not supported, and MD2 and MD5 are disabled.
1423 #if defined(USE_NSS) || defined(OS_IOS) 1424 #if defined(USE_NSS_CERTS) || defined(OS_IOS)
1424 #define MAYBE_VerifyIntermediate DISABLED_VerifyIntermediate 1425 #define MAYBE_VerifyIntermediate DISABLED_VerifyIntermediate
1425 #else 1426 #else
1426 #define MAYBE_VerifyIntermediate VerifyIntermediate 1427 #define MAYBE_VerifyIntermediate VerifyIntermediate
1427 #endif 1428 #endif
1428 WRAPPED_INSTANTIATE_TEST_CASE_P( 1429 WRAPPED_INSTANTIATE_TEST_CASE_P(
1429 MAYBE_VerifyIntermediate, 1430 MAYBE_VerifyIntermediate,
1430 CertVerifyProcWeakDigestTest, 1431 CertVerifyProcWeakDigestTest,
1431 testing::ValuesIn(kVerifyIntermediateCATestData)); 1432 testing::ValuesIn(kVerifyIntermediateCATestData));
1432 1433
1433 // The signature algorithm of end-entity should be properly detected. 1434 // The signature algorithm of end-entity should be properly detected.
1434 const WeakDigestTestData kVerifyEndEntityTestData[] = { 1435 const WeakDigestTestData kVerifyEndEntityTestData[] = {
1435 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", 1436 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem",
1436 "weak_digest_md5_ee.pem", EXPECT_MD5 | EXPECT_SHA1 }, 1437 "weak_digest_md5_ee.pem", EXPECT_MD5 | EXPECT_SHA1 },
1437 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) 1438 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN)
1438 // MD4 is not supported by OS X / NSS 1439 // MD4 is not supported by OS X / NSS
1439 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", 1440 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem",
1440 "weak_digest_md4_ee.pem", EXPECT_MD4 | EXPECT_SHA1 }, 1441 "weak_digest_md4_ee.pem", EXPECT_MD4 | EXPECT_SHA1 },
1441 #endif 1442 #endif
1442 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", 1443 { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem",
1443 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_SHA1 }, 1444 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_SHA1 },
1444 }; 1445 };
1445 // Disabled on NSS - NSS caches chains/signatures in such a way that cannot 1446 // Disabled on NSS - NSS caches chains/signatures in such a way that cannot
1446 // be cleared until NSS is cleanly shutdown, which is not presently supported 1447 // be cleared until NSS is cleanly shutdown, which is not presently supported
1447 // in Chromium. 1448 // in Chromium.
1448 #if defined(USE_NSS) || defined(OS_IOS) 1449 #if defined(USE_NSS_CERTS) || defined(OS_IOS)
1449 #define MAYBE_VerifyEndEntity DISABLED_VerifyEndEntity 1450 #define MAYBE_VerifyEndEntity DISABLED_VerifyEndEntity
1450 #else 1451 #else
1451 #define MAYBE_VerifyEndEntity VerifyEndEntity 1452 #define MAYBE_VerifyEndEntity VerifyEndEntity
1452 #endif 1453 #endif
1453 WRAPPED_INSTANTIATE_TEST_CASE_P(MAYBE_VerifyEndEntity, 1454 WRAPPED_INSTANTIATE_TEST_CASE_P(MAYBE_VerifyEndEntity,
1454 CertVerifyProcWeakDigestTest, 1455 CertVerifyProcWeakDigestTest,
1455 testing::ValuesIn(kVerifyEndEntityTestData)); 1456 testing::ValuesIn(kVerifyEndEntityTestData));
1456 1457
1457 // Incomplete chains should still report the status of the intermediate. 1458 // Incomplete chains should still report the status of the intermediate.
1458 const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = { 1459 const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = {
1459 { NULL, "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem", 1460 { NULL, "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem",
1460 EXPECT_MD5 | EXPECT_SHA1 }, 1461 EXPECT_MD5 | EXPECT_SHA1 },
1461 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) 1462 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN)
1462 // MD4 is not supported by OS X / NSS 1463 // MD4 is not supported by OS X / NSS
1463 { NULL, "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem", 1464 { NULL, "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem",
1464 EXPECT_MD4 | EXPECT_SHA1 }, 1465 EXPECT_MD4 | EXPECT_SHA1 },
1465 #endif 1466 #endif
1466 { NULL, "weak_digest_md2_intermediate.pem", "weak_digest_sha1_ee.pem", 1467 { NULL, "weak_digest_md2_intermediate.pem", "weak_digest_sha1_ee.pem",
1467 EXPECT_MD2 | EXPECT_SHA1 }, 1468 EXPECT_MD2 | EXPECT_SHA1 },
1468 }; 1469 };
1469 // Disabled on NSS - libpkix does not return constructed chains on error, 1470 // Disabled on NSS - libpkix does not return constructed chains on error,
1470 // preventing us from detecting/inspecting the verified chain. 1471 // preventing us from detecting/inspecting the verified chain.
1471 #if defined(USE_NSS) || defined(OS_IOS) 1472 #if defined(USE_NSS_CERTS) || defined(OS_IOS)
1472 #define MAYBE_VerifyIncompleteIntermediate \ 1473 #define MAYBE_VerifyIncompleteIntermediate \
1473 DISABLED_VerifyIncompleteIntermediate 1474 DISABLED_VerifyIncompleteIntermediate
1474 #else 1475 #else
1475 #define MAYBE_VerifyIncompleteIntermediate VerifyIncompleteIntermediate 1476 #define MAYBE_VerifyIncompleteIntermediate VerifyIncompleteIntermediate
1476 #endif 1477 #endif
1477 WRAPPED_INSTANTIATE_TEST_CASE_P( 1478 WRAPPED_INSTANTIATE_TEST_CASE_P(
1478 MAYBE_VerifyIncompleteIntermediate, 1479 MAYBE_VerifyIncompleteIntermediate,
1479 CertVerifyProcWeakDigestTest, 1480 CertVerifyProcWeakDigestTest,
1480 testing::ValuesIn(kVerifyIncompleteIntermediateTestData)); 1481 testing::ValuesIn(kVerifyIncompleteIntermediateTestData));
1481 1482
1482 // Incomplete chains should still report the status of the end-entity. 1483 // Incomplete chains should still report the status of the end-entity.
1483 const WeakDigestTestData kVerifyIncompleteEETestData[] = { 1484 const WeakDigestTestData kVerifyIncompleteEETestData[] = {
1484 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem", 1485 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem",
1485 EXPECT_MD5 | EXPECT_SHA1 }, 1486 EXPECT_MD5 | EXPECT_SHA1 },
1486 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) 1487 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN)
1487 // MD4 is not supported by OS X / NSS 1488 // MD4 is not supported by OS X / NSS
1488 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem", 1489 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem",
1489 EXPECT_MD4 | EXPECT_SHA1 }, 1490 EXPECT_MD4 | EXPECT_SHA1 },
1490 #endif 1491 #endif
1491 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md2_ee.pem", 1492 { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md2_ee.pem",
1492 EXPECT_MD2 | EXPECT_SHA1 }, 1493 EXPECT_MD2 | EXPECT_SHA1 },
1493 }; 1494 };
1494 // Disabled on NSS - libpkix does not return constructed chains on error, 1495 // Disabled on NSS - libpkix does not return constructed chains on error,
1495 // preventing us from detecting/inspecting the verified chain. 1496 // preventing us from detecting/inspecting the verified chain.
1496 #if defined(USE_NSS) || defined(OS_IOS) 1497 #if defined(USE_NSS_CERTS) || defined(OS_IOS)
1497 #define MAYBE_VerifyIncompleteEndEntity DISABLED_VerifyIncompleteEndEntity 1498 #define MAYBE_VerifyIncompleteEndEntity DISABLED_VerifyIncompleteEndEntity
1498 #else 1499 #else
1499 #define MAYBE_VerifyIncompleteEndEntity VerifyIncompleteEndEntity 1500 #define MAYBE_VerifyIncompleteEndEntity VerifyIncompleteEndEntity
1500 #endif 1501 #endif
1501 WRAPPED_INSTANTIATE_TEST_CASE_P( 1502 WRAPPED_INSTANTIATE_TEST_CASE_P(
1502 MAYBE_VerifyIncompleteEndEntity, 1503 MAYBE_VerifyIncompleteEndEntity,
1503 CertVerifyProcWeakDigestTest, 1504 CertVerifyProcWeakDigestTest,
1504 testing::ValuesIn(kVerifyIncompleteEETestData)); 1505 testing::ValuesIn(kVerifyIncompleteEETestData));
1505 1506
1506 // Differing algorithms between the intermediate and the EE should still be 1507 // Differing algorithms between the intermediate and the EE should still be
1507 // reported. 1508 // reported.
1508 const WeakDigestTestData kVerifyMixedTestData[] = { 1509 const WeakDigestTestData kVerifyMixedTestData[] = {
1509 { "weak_digest_sha1_root.pem", "weak_digest_md5_intermediate.pem", 1510 { "weak_digest_sha1_root.pem", "weak_digest_md5_intermediate.pem",
1510 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_MD5 }, 1511 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_MD5 },
1511 { "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem", 1512 { "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem",
1512 "weak_digest_md5_ee.pem", EXPECT_MD2 | EXPECT_MD5 }, 1513 "weak_digest_md5_ee.pem", EXPECT_MD2 | EXPECT_MD5 },
1513 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) 1514 #if defined(USE_OPENSSL_CERTS) || defined(OS_WIN)
1514 // MD4 is not supported by OS X / NSS 1515 // MD4 is not supported by OS X / NSS
1515 { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", 1516 { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem",
1516 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_MD4 }, 1517 "weak_digest_md2_ee.pem", EXPECT_MD2 | EXPECT_MD4 },
1517 #endif 1518 #endif
1518 }; 1519 };
1519 // NSS does not support MD4 and does not enable MD2 by default, making all 1520 // NSS does not support MD4 and does not enable MD2 by default, making all
1520 // permutations invalid. 1521 // permutations invalid.
1521 #if defined(USE_NSS) || defined(OS_IOS) 1522 #if defined(USE_NSS_CERTS) || defined(OS_IOS)
1522 #define MAYBE_VerifyMixed DISABLED_VerifyMixed 1523 #define MAYBE_VerifyMixed DISABLED_VerifyMixed
1523 #else 1524 #else
1524 #define MAYBE_VerifyMixed VerifyMixed 1525 #define MAYBE_VerifyMixed VerifyMixed
1525 #endif 1526 #endif
1526 WRAPPED_INSTANTIATE_TEST_CASE_P( 1527 WRAPPED_INSTANTIATE_TEST_CASE_P(
1527 MAYBE_VerifyMixed, 1528 MAYBE_VerifyMixed,
1528 CertVerifyProcWeakDigestTest, 1529 CertVerifyProcWeakDigestTest,
1529 testing::ValuesIn(kVerifyMixedTestData)); 1530 testing::ValuesIn(kVerifyMixedTestData));
1530 1531
1531 // For the list of valid hostnames, see 1532 // For the list of valid hostnames, see
(...skipping 55 matching lines...) Expand 10 before | Expand all | Expand 10 after
1587 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_COMMON_NAME_INVALID); 1588 EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_COMMON_NAME_INVALID);
1588 } 1589 }
1589 } 1590 }
1590 1591
1591 WRAPPED_INSTANTIATE_TEST_CASE_P( 1592 WRAPPED_INSTANTIATE_TEST_CASE_P(
1592 VerifyName, 1593 VerifyName,
1593 CertVerifyProcNameTest, 1594 CertVerifyProcNameTest,
1594 testing::ValuesIn(kVerifyNameData)); 1595 testing::ValuesIn(kVerifyNameData));
1595 1596
1596 } // namespace net 1597 } // namespace net
OLDNEW
« no previous file with comments | « net/cert/cert_verify_proc.cc ('k') | net/cert/ct_objects_extractor_nss.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698