| Index: net/quic/quic_stream_factory_test.cc
|
| diff --git a/net/quic/quic_stream_factory_test.cc b/net/quic/quic_stream_factory_test.cc
|
| index b5a1b5b15b9c06b55796216d5094b2b8212dfc59..81c24663e77e58172cce63963d160fc958bddf49 100644
|
| --- a/net/quic/quic_stream_factory_test.cc
|
| +++ b/net/quic/quic_stream_factory_test.cc
|
| @@ -682,7 +682,8 @@ TEST_P(QuicStreamFactoryTest, HttpsPooling) {
|
| ProofVerifyDetailsChromium verify_details;
|
| verify_details.cert_verify_result.verified_cert = test_cert;
|
| verify_details.cert_verify_result.is_issued_by_known_root = true;
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
| + crypto_client_stream_factory_.set_default_proof_verify_details(
|
| + &verify_details);
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
| @@ -746,7 +747,8 @@ TEST_P(QuicStreamFactoryTest, NoHttpsPoolingIfDisabled) {
|
| ProofVerifyDetailsChromium verify_details;
|
| verify_details.cert_verify_result.verified_cert = test_cert;
|
| verify_details.cert_verify_result.is_issued_by_known_root = true;
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
| + crypto_client_stream_factory_.set_default_proof_verify_details(
|
| + &verify_details);
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
| @@ -815,8 +817,8 @@ TEST_P(QuicStreamFactoryTest, NoHttpsPoolingWithCertMismatch) {
|
| ASSERT_NE(static_cast<X509Certificate*>(nullptr), test_cert.get());
|
| ProofVerifyDetailsChromium verify_details;
|
| verify_details.cert_verify_result.verified_cert = test_cert;
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
| -
|
| + crypto_client_stream_factory_.set_default_proof_verify_details(
|
| + &verify_details);
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
| @@ -884,8 +886,8 @@ TEST_P(QuicStreamFactoryTest, HttpsPoolingWithMatchingPins) {
|
| verify_details.cert_verify_result.is_issued_by_known_root = true;
|
| verify_details.cert_verify_result.public_key_hashes.push_back(
|
| test::GetTestHashValue(primary_pin));
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
| -
|
| + crypto_client_stream_factory_.set_default_proof_verify_details(
|
| + &verify_details);
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
| @@ -954,8 +956,8 @@ TEST_P(QuicStreamFactoryTest, NoHttpsPoolingWithMatchingPinsIfDisabled) {
|
| verify_details.cert_verify_result.is_issued_by_known_root = true;
|
| verify_details.cert_verify_result.public_key_hashes.push_back(
|
| test::GetTestHashValue(primary_pin));
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
| -
|
| + crypto_client_stream_factory_.set_default_proof_verify_details(
|
| + &verify_details);
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
| @@ -1025,13 +1027,24 @@ TEST_P(QuicStreamFactoryTest, NoHttpsPoolingWithDifferentPins) {
|
| scoped_refptr<X509Certificate> test_cert(
|
| ImportCertFromFile(certs_dir, "spdy_pooling.pem"));
|
| ASSERT_NE(static_cast<X509Certificate*>(nullptr), test_cert.get());
|
| - ProofVerifyDetailsChromium verify_details;
|
| - verify_details.cert_verify_result.verified_cert = test_cert;
|
| - verify_details.cert_verify_result.is_issued_by_known_root = true;
|
| - verify_details.cert_verify_result.public_key_hashes.push_back(
|
| - test::GetTestHashValue(bad_pin));
|
| - crypto_client_stream_factory_.set_proof_verify_details(&verify_details);
|
|
|
| + ProofVerifyDetailsChromium verify_details1;
|
| + verify_details1.cert_verify_result.verified_cert = test_cert;
|
| + verify_details1.cert_verify_result.is_issued_by_known_root = true;
|
| + verify_details1.cert_verify_result.public_key_hashes.push_back(
|
| + test::GetTestHashValue(bad_pin));
|
| + crypto_client_stream_factory_.set_proof_verify_details_for_server(
|
| + &verify_details1,
|
| + QuicServerId(server1, /*is_https=*/true, privacy_mode_));
|
| +
|
| + ProofVerifyDetailsChromium verify_details2;
|
| + verify_details2.cert_verify_result.verified_cert = test_cert;
|
| + verify_details2.cert_verify_result.is_issued_by_known_root = true;
|
| + verify_details2.cert_verify_result.public_key_hashes.push_back(
|
| + test::GetTestHashValue(primary_pin));
|
| + crypto_client_stream_factory_.set_proof_verify_details_for_server(
|
| + &verify_details2,
|
| + QuicServerId(server2, /*is_https=*/true, privacy_mode_));
|
|
|
| host_resolver_.set_synchronous_mode(true);
|
| host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", "");
|
|
|