OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/chromeos/settings/session_manager_operation.h" | 5 #include "chrome/browser/chromeos/settings/session_manager_operation.h" |
6 | 6 |
7 #include "base/basictypes.h" | 7 #include "base/basictypes.h" |
8 #include "base/bind.h" | 8 #include "base/bind.h" |
9 #include "base/bind_helpers.h" | 9 #include "base/bind_helpers.h" |
10 #include "base/memory/ref_counted.h" | 10 #include "base/memory/ref_counted.h" |
(...skipping 253 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
264 std::vector<uint8> public_key; | 264 std::vector<uint8> public_key; |
265 policy_.GetSigningKey()->ExportPublicKey(&public_key); | 265 policy_.GetSigningKey()->ExportPublicKey(&public_key); |
266 // Convert from bytes to string format (which is what ValidateSignature() | 266 // Convert from bytes to string format (which is what ValidateSignature() |
267 // takes). | 267 // takes). |
268 std::string public_key_as_string = std::string( | 268 std::string public_key_as_string = std::string( |
269 reinterpret_cast<const char*>(vector_as_array(&public_key)), | 269 reinterpret_cast<const char*>(vector_as_array(&public_key)), |
270 public_key.size()); | 270 public_key.size()); |
271 validator->ValidateSignature( | 271 validator->ValidateSignature( |
272 public_key_as_string, | 272 public_key_as_string, |
273 policy::GetPolicyVerificationKey(), | 273 policy::GetPolicyVerificationKey(), |
274 policy::PolicyBuilder::GetTestSigningKeySignature(), | 274 policy::PolicyBuilder::kFakeDomain, |
275 false); | 275 false); |
276 validator->StartValidation( | 276 validator->StartValidation( |
277 base::Bind(&SessionManagerOperationTest::CheckSuccessfulValidation, | 277 base::Bind(&SessionManagerOperationTest::CheckSuccessfulValidation, |
278 base::Unretained(this))); | 278 base::Unretained(this))); |
279 | 279 |
280 message_loop_.RunUntilIdle(); | 280 message_loop_.RunUntilIdle(); |
281 EXPECT_TRUE(validated_); | 281 EXPECT_TRUE(validated_); |
282 | 282 |
283 // Check that the loaded policy_data contains the expected values. | 283 // Check that the loaded policy_data contains the expected values. |
284 EXPECT_EQ(policy::dm_protocol::kChromeDevicePolicyType, | 284 EXPECT_EQ(policy::dm_protocol::kChromeDevicePolicyType, |
285 op.policy_data()->policy_type()); | 285 op.policy_data()->policy_type()); |
286 EXPECT_LE((before - base::Time::UnixEpoch()).InMilliseconds(), | 286 EXPECT_LE((before - base::Time::UnixEpoch()).InMilliseconds(), |
287 op.policy_data()->timestamp()); | 287 op.policy_data()->timestamp()); |
288 EXPECT_GE((after - base::Time::UnixEpoch()).InMilliseconds(), | 288 EXPECT_GE((after - base::Time::UnixEpoch()).InMilliseconds(), |
289 op.policy_data()->timestamp()); | 289 op.policy_data()->timestamp()); |
290 EXPECT_FALSE(op.policy_data()->has_request_token()); | 290 EXPECT_FALSE(op.policy_data()->has_request_token()); |
291 EXPECT_EQ(policy_.policy_data().username(), op.policy_data()->username()); | 291 EXPECT_EQ(policy_.policy_data().username(), op.policy_data()->username()); |
292 | 292 |
293 // Loaded device settings should match what the operation received. | 293 // Loaded device settings should match what the operation received. |
294 ASSERT_TRUE(op.device_settings().get()); | 294 ASSERT_TRUE(op.device_settings().get()); |
295 EXPECT_EQ(policy_.payload().SerializeAsString(), | 295 EXPECT_EQ(policy_.payload().SerializeAsString(), |
296 op.device_settings()->SerializeAsString()); | 296 op.device_settings()->SerializeAsString()); |
297 } | 297 } |
298 | 298 |
299 } // namespace chromeos | 299 } // namespace chromeos |
OLD | NEW |