Index: chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
diff --git a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
index 42ee6935b50af91f4893df534a86400d1c21fec8..a3ba387e24482d1423f1307cd317c3cf70651226 100644 |
--- a/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
+++ b/chrome/browser/net/ssl_config_service_manager_pref_unittest.cc |
@@ -220,8 +220,11 @@ TEST_F(SSLConfigServiceManagerPrefTest, BadDisabledCipherSuites) { |
EXPECT_EQ(0x0005, config.disabled_cipher_suites[1]); |
} |
-// Test that without command-line settings for minimum and maximum SSL |
-// versions, SSL 3.0 ~ default_version_max() are enabled. |
+// Test that |
+// * without command-line settings for minimum and maximum SSL versions, |
+// SSL 3.0 ~ default_version_max() are enabled; |
+// * without --enable-unrestricted_ssl3-fallback, |
agl
2013/04/19 14:41:52
s/_/-/
thaidn_google
2013/04/19 18:21:11
Done.
|
+// |unrestricted_ssl3_fallback_enabled| is false. |
TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) { |
scoped_refptr<TestingPrefStore> local_state_store(new TestingPrefStore()); |
@@ -245,10 +248,13 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) { |
EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_min); |
EXPECT_EQ(net::SSLConfigService::default_version_max(), |
ssl_config.version_max); |
+ EXPECT_FALSE(ssl_config.unrestricted_ssl3_fallback_enabled); |
// The settings should not be added to the local_state. |
EXPECT_FALSE(local_state->HasPrefPath(prefs::kSSLVersionMin)); |
EXPECT_FALSE(local_state->HasPrefPath(prefs::kSSLVersionMax)); |
+ EXPECT_FALSE(local_state->HasPrefPath( |
+ prefs::kEnableUnrestrictedSSL3Fallback)); |
// Explicitly double-check the settings are not in the preference store. |
std::string version_min_str; |
@@ -257,6 +263,10 @@ TEST_F(SSLConfigServiceManagerPrefTest, NoCommandLinePrefs) { |
&version_min_str)); |
EXPECT_FALSE(local_state_store->GetString(prefs::kSSLVersionMax, |
&version_max_str)); |
+ bool unrestricted_ssl3_fallback_enabled; |
+ EXPECT_FALSE(local_state_store->GetBoolean( |
+ prefs::kEnableUnrestrictedSSL3Fallback, |
+ &unrestricted_ssl3_fallback_enabled)); |
} |
// Test that command-line settings for minimum and maximum SSL versions are |
@@ -267,6 +277,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, CommandLinePrefs) { |
CommandLine command_line(CommandLine::NO_PROGRAM); |
command_line.AppendSwitchASCII(switches::kSSLVersionMin, "tls1"); |
command_line.AppendSwitchASCII(switches::kSSLVersionMax, "ssl3"); |
+ command_line.AppendSwitch(switches::kEnableUnrestrictedSSL3Fallback); |
PrefServiceMockBuilder builder; |
builder.WithUserPrefs(local_state_store.get()); |
@@ -287,6 +298,7 @@ TEST_F(SSLConfigServiceManagerPrefTest, CommandLinePrefs) { |
// Command-line flags should be respected. |
EXPECT_EQ(net::SSL_PROTOCOL_VERSION_TLS1, ssl_config.version_min); |
EXPECT_EQ(net::SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_max); |
+ EXPECT_TRUE(ssl_config.unrestricted_ssl3_fallback_enabled); |
// Explicitly double-check the settings are not in the preference store. |
const PrefService::Preference* version_min_pref = |
@@ -297,10 +309,18 @@ TEST_F(SSLConfigServiceManagerPrefTest, CommandLinePrefs) { |
local_state->FindPreference(prefs::kSSLVersionMax); |
EXPECT_FALSE(version_max_pref->IsUserModifiable()); |
+ const PrefService::Preference* ssl3_fallback_pref = |
+ local_state->FindPreference(prefs::kEnableUnrestrictedSSL3Fallback); |
+ EXPECT_FALSE(ssl3_fallback_pref->IsUserModifiable()); |
+ |
std::string version_min_str; |
std::string version_max_str; |
EXPECT_FALSE(local_state_store->GetString(prefs::kSSLVersionMin, |
&version_min_str)); |
EXPECT_FALSE(local_state_store->GetString(prefs::kSSLVersionMax, |
&version_max_str)); |
+ bool unrestricted_ssl3_fallback_enabled; |
+ EXPECT_FALSE(local_state_store->GetBoolean( |
+ prefs::kEnableUnrestrictedSSL3Fallback, |
+ &unrestricted_ssl3_fallback_enabled)); |
} |