Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(884)

Unified Diff: chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc

Issue 1420053005: Move code in components/safe_browsing_db and chrome/browser/s_b/ under the safe_browsing namespace. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@02_components_move
Patch Set: Remove '// namespace safe_browsing' for a small fwd decl block. Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc
diff --git a/chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc b/chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc
index 4b3fad34ada7cbf27e868c7b9f034c337c595785..48843f05b8506bce14c380cc51f48f458192bb66 100644
--- a/chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc
+++ b/chrome/browser/safe_browsing/signature_evaluator_mac_unittest.cc
@@ -100,7 +100,7 @@ TEST_F(MacSignatureEvaluatorTest, SimpleTest) {
// This is a simple test that checks the validity of a signed executable.
// There is no designated requirement: we only check the embedded signature.
base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat");
- safe_browsing::MacSignatureEvaluator evaluator(path);
+ MacSignatureEvaluator evaluator(path);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -113,7 +113,7 @@ TEST_F(MacSignatureEvaluatorTest, SimpleTestWithDR) {
base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat");
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(path, requirement);
+ MacSignatureEvaluator evaluator(path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -124,7 +124,7 @@ TEST_F(MacSignatureEvaluatorTest, SimpleTestWithDR) {
TEST_F(MacSignatureEvaluatorTest, SimpleTestWithBadDR) {
// Now test with a designated requirement that does not describe the signer.
base::FilePath path = testdata_path_.AppendASCII("signedexecutablefat");
- safe_browsing::MacSignatureEvaluator evaluator(path, "anchor apple");
+ MacSignatureEvaluator evaluator(path, "anchor apple");
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -141,7 +141,7 @@ TEST_F(MacSignatureEvaluatorTest, SimpleBundleTest) {
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(path, requirement);
+ MacSignatureEvaluator evaluator(path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -155,7 +155,7 @@ TEST_F(MacSignatureEvaluatorTest, ModifiedMainExecTest32) {
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(path, requirement);
+ MacSignatureEvaluator evaluator(path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -184,7 +184,7 @@ TEST_F(MacSignatureEvaluatorTest, ModifiedMainExecTest64) {
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(path, requirement);
+ MacSignatureEvaluator evaluator(path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -211,7 +211,7 @@ TEST_F(MacSignatureEvaluatorTest, ModifiedBundleAndExecTest) {
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(path, requirement);
+ MacSignatureEvaluator evaluator(path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
@@ -247,7 +247,7 @@ TEST_F(MacSignatureEvaluatorTest, ModifiedBundleTest) {
std::string requirement(
"certificate leaf[subject.CN]=\"untrusted@goat.local\"");
- safe_browsing::MacSignatureEvaluator evaluator(copied_path, requirement);
+ MacSignatureEvaluator evaluator(copied_path, requirement);
ASSERT_TRUE(evaluator.Initialize());
ClientIncidentReport_IncidentData_BinaryIntegrityIncident incident;
« no previous file with comments | « chrome/browser/safe_browsing/safe_browsing_util.cc ('k') | chrome/browser/safe_browsing/srt_fetcher_browsertest_win.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698