| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/crypto/proof_verifier_chromium.h" |
| 6 | 6 |
| 7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
| 8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
| 9 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
| 10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
| 11 #include "net/cert/cert_policy_enforcer.h" | 11 #include "net/cert/cert_policy_enforcer.h" |
| 12 #include "net/cert/cert_status_flags.h" | 12 #include "net/cert/cert_status_flags.h" |
| 13 #include "net/cert/cert_verifier.h" | 13 #include "net/cert/cert_verifier.h" |
| 14 #include "net/cert/ct_log_verifier.h" |
| 15 #include "net/cert/ct_serialization.h" |
| 16 #include "net/cert/ct_verify_result.h" |
| 14 #include "net/cert/mock_cert_verifier.h" | 17 #include "net/cert/mock_cert_verifier.h" |
| 18 #include "net/cert/multi_log_ct_verifier.h" |
| 15 #include "net/cert/x509_certificate.h" | 19 #include "net/cert/x509_certificate.h" |
| 16 #include "net/http/transport_security_state.h" | 20 #include "net/http/transport_security_state.h" |
| 17 #include "net/log/net_log.h" | 21 #include "net/log/net_log.h" |
| 18 #include "net/quic/crypto/proof_verifier.h" | 22 #include "net/quic/crypto/proof_verifier.h" |
| 19 #include "net/test/cert_test_util.h" | 23 #include "net/test/cert_test_util.h" |
| 24 #include "net/test/ct_test_util.h" |
| 20 #include "testing/gtest/include/gtest/gtest.h" | 25 #include "testing/gtest/include/gtest/gtest.h" |
| 21 | 26 |
| 22 namespace net { | 27 namespace net { |
| 23 namespace test { | 28 namespace test { |
| 24 | 29 |
| 25 namespace { | 30 namespace { |
| 26 | 31 |
| 27 // CertVerifier that will fail the test if it is ever called. | 32 // CertVerifier that will fail the test if it is ever called. |
| 28 class FailsTestCertVerifier : public CertVerifier { | 33 class FailsTestCertVerifier : public CertVerifier { |
| 29 public: | 34 public: |
| (...skipping 56 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 86 | 91 |
| 87 void Run(bool ok, | 92 void Run(bool ok, |
| 88 const std::string& error_details, | 93 const std::string& error_details, |
| 89 scoped_ptr<ProofVerifyDetails>* details) override { | 94 scoped_ptr<ProofVerifyDetails>* details) override { |
| 90 // Do nothing | 95 // Do nothing |
| 91 } | 96 } |
| 92 }; | 97 }; |
| 93 | 98 |
| 94 const char kTestHostname[] = "test.example.com"; | 99 const char kTestHostname[] = "test.example.com"; |
| 95 const char kTestConfig[] = "server config bytes"; | 100 const char kTestConfig[] = "server config bytes"; |
| 101 const char kLogDescription[] = "somelog"; |
| 96 | 102 |
| 97 } // namespace | 103 } // namespace |
| 98 | 104 |
| 99 class ProofVerifierChromiumTest : public ::testing::Test { | 105 class ProofVerifierChromiumTest : public ::testing::Test { |
| 100 public: | 106 public: |
| 101 ProofVerifierChromiumTest() | 107 ProofVerifierChromiumTest() |
| 102 : verify_context_(new ProofVerifyContextChromium(0 /*cert_verify_flags*/, | 108 : verify_context_(new ProofVerifyContextChromium(0 /*cert_verify_flags*/, |
| 103 BoundNetLog())) {} | 109 BoundNetLog())) {} |
| 104 | 110 |
| 105 void SetUp() override { | 111 void SetUp() override { |
| 112 scoped_refptr<const CTLogVerifier> log(CTLogVerifier::Create( |
| 113 ct::GetTestPublicKey(), kLogDescription, "https://test.example.com")); |
| 114 ASSERT_TRUE(log); |
| 115 log_verifiers_.push_back(log); |
| 116 |
| 117 ct_verifier_.reset(new MultiLogCTVerifier()); |
| 118 ct_verifier_->AddLogs(log_verifiers_); |
| 119 |
| 106 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); | 120 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); |
| 107 } | 121 } |
| 108 | 122 |
| 109 scoped_refptr<X509Certificate> GetTestServerCertificate() { | 123 scoped_refptr<X509Certificate> GetTestServerCertificate() { |
| 110 static const char kTestCert[] = "quic_test.example.com.crt"; | 124 static const char kTestCert[] = "quic_test.example.com.crt"; |
| 111 return ImportCertFromFile(GetTestCertsDirectory(), kTestCert); | 125 return ImportCertFromFile(GetTestCertsDirectory(), kTestCert); |
| 112 } | 126 } |
| 113 | 127 |
| 114 void GetTestCertificates(std::vector<std::string>* certs) { | 128 void GetTestCertificates(std::vector<std::string>* certs) { |
| 115 scoped_refptr<X509Certificate> cert = GetTestServerCertificate(); | 129 scoped_refptr<X509Certificate> cert = GetTestServerCertificate(); |
| (...skipping 32 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 148 0x64, 0x3d, 0x3f, 0x98, 0xce, 0xc1, 0xa6, 0x33, 0x32, 0xd3, 0x5c, 0xa8, | 162 0x64, 0x3d, 0x3f, 0x98, 0xce, 0xc1, 0xa6, 0x33, 0x32, 0xd3, 0x5c, 0xa8, |
| 149 0x39, 0x93, 0xdc, 0x1c, 0xb9, 0xab, 0x3c, 0x80, 0x62, 0xb3, 0x76, 0x21, | 163 0x39, 0x93, 0xdc, 0x1c, 0xb9, 0xab, 0x3c, 0x80, 0x62, 0xb3, 0x76, 0x21, |
| 150 0xdf, 0x47, 0x1e, 0xa9, 0x0e, 0x5e, 0x8a, 0xbe, 0x66, 0x5b, 0x7c, 0x21, | 164 0xdf, 0x47, 0x1e, 0xa9, 0x0e, 0x5e, 0x8a, 0xbe, 0x66, 0x5b, 0x7c, 0x21, |
| 151 0xfa, 0x78, 0x2d, 0xd1, 0x1d, 0x5c, 0x35, 0x8a, 0x34, 0xb2, 0x1a, 0xc2, | 165 0xfa, 0x78, 0x2d, 0xd1, 0x1d, 0x5c, 0x35, 0x8a, 0x34, 0xb2, 0x1a, 0xc2, |
| 152 0xc4, 0x4b, 0x53, 0x54, | 166 0xc4, 0x4b, 0x53, 0x54, |
| 153 }; | 167 }; |
| 154 return std::string(reinterpret_cast<const char*>(kTestSignature), | 168 return std::string(reinterpret_cast<const char*>(kTestSignature), |
| 155 sizeof(kTestSignature)); | 169 sizeof(kTestSignature)); |
| 156 } | 170 } |
| 157 | 171 |
| 172 void GetSCTTestCertificates(std::vector<std::string>* certs) { |
| 173 std::string der_test_cert(ct::GetDerEncodedX509Cert()); |
| 174 scoped_refptr<X509Certificate> test_cert = X509Certificate::CreateFromBytes( |
| 175 der_test_cert.data(), der_test_cert.length()); |
| 176 ASSERT_TRUE(test_cert.get()); |
| 177 |
| 178 std::string der_bytes; |
| 179 ASSERT_TRUE(X509Certificate::GetDEREncoded(test_cert->os_cert_handle(), |
| 180 &der_bytes)); |
| 181 |
| 182 certs->clear(); |
| 183 certs->push_back(der_bytes); |
| 184 } |
| 185 |
| 186 std::string GetSCTListForTesting() { |
| 187 const std::string sct = ct::GetTestSignedCertificateTimestamp(); |
| 188 std::string sct_list; |
| 189 ct::EncodeSCTListForTesting(sct, &sct_list); |
| 190 return sct_list; |
| 191 } |
| 192 |
| 193 std::string GetCorruptSCTListForTesting() { |
| 194 std::string sct = ct::GetTestSignedCertificateTimestamp(); |
| 195 sct[15] = 't'; // Corrupt a byte inside SCT. |
| 196 std::string sct_list; |
| 197 ct::EncodeSCTListForTesting(sct, &sct_list); |
| 198 return sct_list; |
| 199 } |
| 200 |
| 201 bool CheckForSingleVerifiedSCTInResult(const ct::CTVerifyResult& result) { |
| 202 return (result.verified_scts.size() == 1U) && result.invalid_scts.empty() && |
| 203 result.unknown_logs_scts.empty() && |
| 204 result.verified_scts[0]->log_description == kLogDescription; |
| 205 } |
| 206 |
| 207 bool CheckForSCTOrigin(const ct::CTVerifyResult& result, |
| 208 ct::SignedCertificateTimestamp::Origin origin) { |
| 209 return (result.verified_scts.size() > 0) && |
| 210 (result.verified_scts[0]->origin == origin); |
| 211 } |
| 212 |
| 213 void CheckSCT(bool sct_expected_ok) { |
| 214 ProofVerifyDetailsChromium* proof_details = |
| 215 reinterpret_cast<ProofVerifyDetailsChromium*>(details_.get()); |
| 216 const ct::CTVerifyResult& ct_verify_result = |
| 217 proof_details->ct_verify_result; |
| 218 if (sct_expected_ok) { |
| 219 ASSERT_TRUE(CheckForSingleVerifiedSCTInResult(ct_verify_result)); |
| 220 ASSERT_TRUE(CheckForSCTOrigin( |
| 221 ct_verify_result, |
| 222 ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION)); |
| 223 } else { |
| 224 EXPECT_EQ(1U, ct_verify_result.unknown_logs_scts.size()); |
| 225 } |
| 226 } |
| 227 |
| 158 protected: | 228 protected: |
| 229 scoped_ptr<MultiLogCTVerifier> ct_verifier_; |
| 230 std::vector<scoped_refptr<const CTLogVerifier>> log_verifiers_; |
| 159 scoped_ptr<ProofVerifyContext> verify_context_; | 231 scoped_ptr<ProofVerifyContext> verify_context_; |
| 160 scoped_ptr<ProofVerifyDetails> details_; | 232 scoped_ptr<ProofVerifyDetails> details_; |
| 161 std::string error_details_; | 233 std::string error_details_; |
| 162 std::vector<std::string> certs_; | 234 std::vector<std::string> certs_; |
| 163 }; | 235 }; |
| 164 | 236 |
| 165 // Tests that the ProofVerifier fails verification if certificate | 237 // Tests that the ProofVerifier fails verification if certificate |
| 166 // verification fails. | 238 // verification fails. |
| 167 TEST_F(ProofVerifierChromiumTest, FailsIfCertFails) { | 239 TEST_F(ProofVerifierChromiumTest, FailsIfCertFails) { |
| 168 MockCertVerifier dummy_verifier; | 240 MockCertVerifier dummy_verifier; |
| 169 ProofVerifierChromium proof_verifier(&dummy_verifier, nullptr, nullptr); | 241 ProofVerifierChromium proof_verifier(&dummy_verifier, nullptr, nullptr, |
| 242 ct_verifier_.get()); |
| 170 | 243 |
| 171 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 244 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 172 QuicAsyncStatus status = proof_verifier.VerifyProof( | 245 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 173 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), | 246 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), |
| 174 verify_context_.get(), &error_details_, &details_, callback); | 247 verify_context_.get(), &error_details_, &details_, callback); |
| 175 ASSERT_EQ(QUIC_FAILURE, status); | 248 ASSERT_EQ(QUIC_FAILURE, status); |
| 176 delete callback; | 249 delete callback; |
| 177 } | 250 } |
| 178 | 251 |
| 252 // Valid SCT, but invalid signature. |
| 253 TEST_F(ProofVerifierChromiumTest, ValidSCTList) { |
| 254 // Use different certificates for SCT tests. |
| 255 ASSERT_NO_FATAL_FAILURE(GetSCTTestCertificates(&certs_)); |
| 256 |
| 257 MockCertVerifier cert_verifier; |
| 258 ProofVerifierChromium proof_verifier(&cert_verifier, nullptr, nullptr, |
| 259 ct_verifier_.get()); |
| 260 |
| 261 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 262 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 263 kTestHostname, kTestConfig, certs_, GetSCTListForTesting(), "", |
| 264 verify_context_.get(), &error_details_, &details_, callback); |
| 265 ASSERT_EQ(QUIC_FAILURE, status); |
| 266 CheckSCT(/*sct_expected_ok=*/true); |
| 267 delete callback; |
| 268 } |
| 269 |
| 270 // Invalid SCT and signature. |
| 271 TEST_F(ProofVerifierChromiumTest, InvalidSCTList) { |
| 272 // Use different certificates for SCT tests. |
| 273 ASSERT_NO_FATAL_FAILURE(GetSCTTestCertificates(&certs_)); |
| 274 |
| 275 MockCertVerifier cert_verifier; |
| 276 ProofVerifierChromium proof_verifier(&cert_verifier, nullptr, nullptr, |
| 277 ct_verifier_.get()); |
| 278 |
| 279 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 280 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 281 kTestHostname, kTestConfig, certs_, GetCorruptSCTListForTesting(), "", |
| 282 verify_context_.get(), &error_details_, &details_, callback); |
| 283 ASSERT_EQ(QUIC_FAILURE, status); |
| 284 CheckSCT(/*sct_expected_ok=*/false); |
| 285 delete callback; |
| 286 } |
| 287 |
| 179 // Tests that the ProofVerifier doesn't verify certificates if the config | 288 // Tests that the ProofVerifier doesn't verify certificates if the config |
| 180 // signature fails. | 289 // signature fails. |
| 181 TEST_F(ProofVerifierChromiumTest, FailsIfSignatureFails) { | 290 TEST_F(ProofVerifierChromiumTest, FailsIfSignatureFails) { |
| 182 FailsTestCertVerifier cert_verifier; | 291 FailsTestCertVerifier cert_verifier; |
| 183 ProofVerifierChromium proof_verifier(&cert_verifier, nullptr, nullptr); | 292 ProofVerifierChromium proof_verifier(&cert_verifier, nullptr, nullptr, |
| 293 ct_verifier_.get()); |
| 184 | 294 |
| 185 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 295 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 186 QuicAsyncStatus status = proof_verifier.VerifyProof( | 296 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 187 kTestHostname, kTestConfig, certs_, "", kTestConfig, | 297 kTestHostname, kTestConfig, certs_, "", kTestConfig, |
| 188 verify_context_.get(), &error_details_, &details_, callback); | 298 verify_context_.get(), &error_details_, &details_, callback); |
| 189 ASSERT_EQ(QUIC_FAILURE, status); | 299 ASSERT_EQ(QUIC_FAILURE, status); |
| 190 delete callback; | 300 delete callback; |
| 191 } | 301 } |
| 192 | 302 |
| 193 // Tests that EV certificates are left as EV if there is no certificate | 303 // Tests that EV certificates are left as EV if there is no certificate |
| 194 // policy enforcement. | 304 // policy enforcement. |
| 195 TEST_F(ProofVerifierChromiumTest, PreservesEVIfNoPolicy) { | 305 TEST_F(ProofVerifierChromiumTest, PreservesEVIfNoPolicy) { |
| 196 scoped_refptr<X509Certificate> test_cert = GetTestServerCertificate(); | 306 scoped_refptr<X509Certificate> test_cert = GetTestServerCertificate(); |
| 197 ASSERT_TRUE(test_cert); | 307 ASSERT_TRUE(test_cert); |
| 198 | 308 |
| 199 CertVerifyResult dummy_result; | 309 CertVerifyResult dummy_result; |
| 200 dummy_result.verified_cert = test_cert; | 310 dummy_result.verified_cert = test_cert; |
| 201 dummy_result.cert_status = CERT_STATUS_IS_EV; | 311 dummy_result.cert_status = CERT_STATUS_IS_EV; |
| 202 | 312 |
| 203 MockCertVerifier dummy_verifier; | 313 MockCertVerifier dummy_verifier; |
| 204 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); | 314 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); |
| 205 | 315 |
| 206 ProofVerifierChromium proof_verifier(&dummy_verifier, nullptr, nullptr); | 316 ProofVerifierChromium proof_verifier(&dummy_verifier, nullptr, nullptr, |
| 317 ct_verifier_.get()); |
| 207 | 318 |
| 208 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 319 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 209 QuicAsyncStatus status = proof_verifier.VerifyProof( | 320 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 210 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), | 321 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), |
| 211 verify_context_.get(), &error_details_, &details_, callback); | 322 verify_context_.get(), &error_details_, &details_, callback); |
| 212 ASSERT_EQ(QUIC_SUCCESS, status); | 323 ASSERT_EQ(QUIC_SUCCESS, status); |
| 213 delete callback; | 324 delete callback; |
| 214 | 325 |
| 215 ASSERT_TRUE(details_.get()); | 326 ASSERT_TRUE(details_.get()); |
| 216 ProofVerifyDetailsChromium* verify_details = | 327 ProofVerifyDetailsChromium* verify_details = |
| (...skipping 11 matching lines...) Expand all Loading... |
| 228 CertVerifyResult dummy_result; | 339 CertVerifyResult dummy_result; |
| 229 dummy_result.verified_cert = test_cert; | 340 dummy_result.verified_cert = test_cert; |
| 230 dummy_result.cert_status = CERT_STATUS_IS_EV; | 341 dummy_result.cert_status = CERT_STATUS_IS_EV; |
| 231 | 342 |
| 232 MockCertVerifier dummy_verifier; | 343 MockCertVerifier dummy_verifier; |
| 233 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); | 344 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); |
| 234 | 345 |
| 235 MockCertPolicyEnforcer policy_enforcer(true /*is_ev*/); | 346 MockCertPolicyEnforcer policy_enforcer(true /*is_ev*/); |
| 236 | 347 |
| 237 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, | 348 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, |
| 238 nullptr); | 349 nullptr, ct_verifier_.get()); |
| 239 | 350 |
| 240 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 351 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 241 QuicAsyncStatus status = proof_verifier.VerifyProof( | 352 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 242 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), | 353 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), |
| 243 verify_context_.get(), &error_details_, &details_, callback); | 354 verify_context_.get(), &error_details_, &details_, callback); |
| 244 ASSERT_EQ(QUIC_SUCCESS, status); | 355 ASSERT_EQ(QUIC_SUCCESS, status); |
| 245 delete callback; | 356 delete callback; |
| 246 | 357 |
| 247 ASSERT_TRUE(details_.get()); | 358 ASSERT_TRUE(details_.get()); |
| 248 ProofVerifyDetailsChromium* verify_details = | 359 ProofVerifyDetailsChromium* verify_details = |
| (...skipping 11 matching lines...) Expand all Loading... |
| 260 CertVerifyResult dummy_result; | 371 CertVerifyResult dummy_result; |
| 261 dummy_result.verified_cert = test_cert; | 372 dummy_result.verified_cert = test_cert; |
| 262 dummy_result.cert_status = CERT_STATUS_IS_EV; | 373 dummy_result.cert_status = CERT_STATUS_IS_EV; |
| 263 | 374 |
| 264 MockCertVerifier dummy_verifier; | 375 MockCertVerifier dummy_verifier; |
| 265 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); | 376 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); |
| 266 | 377 |
| 267 MockCertPolicyEnforcer policy_enforcer(false /*is_ev*/); | 378 MockCertPolicyEnforcer policy_enforcer(false /*is_ev*/); |
| 268 | 379 |
| 269 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, | 380 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, |
| 270 nullptr); | 381 nullptr, ct_verifier_.get()); |
| 271 | 382 |
| 272 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 383 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 273 QuicAsyncStatus status = proof_verifier.VerifyProof( | 384 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 274 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), | 385 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), |
| 275 verify_context_.get(), &error_details_, &details_, callback); | 386 verify_context_.get(), &error_details_, &details_, callback); |
| 276 ASSERT_EQ(QUIC_SUCCESS, status); | 387 ASSERT_EQ(QUIC_SUCCESS, status); |
| 277 delete callback; | 388 delete callback; |
| 278 | 389 |
| 279 ASSERT_TRUE(details_.get()); | 390 ASSERT_TRUE(details_.get()); |
| 280 ProofVerifyDetailsChromium* verify_details = | 391 ProofVerifyDetailsChromium* verify_details = |
| (...skipping 12 matching lines...) Expand all Loading... |
| 293 CertVerifyResult dummy_result; | 404 CertVerifyResult dummy_result; |
| 294 dummy_result.verified_cert = test_cert; | 405 dummy_result.verified_cert = test_cert; |
| 295 dummy_result.cert_status = 0; | 406 dummy_result.cert_status = 0; |
| 296 | 407 |
| 297 MockCertVerifier dummy_verifier; | 408 MockCertVerifier dummy_verifier; |
| 298 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); | 409 dummy_verifier.AddResultForCert(test_cert.get(), dummy_result, OK); |
| 299 | 410 |
| 300 FailsTestCertPolicyEnforcer policy_enforcer; | 411 FailsTestCertPolicyEnforcer policy_enforcer; |
| 301 | 412 |
| 302 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, | 413 ProofVerifierChromium proof_verifier(&dummy_verifier, &policy_enforcer, |
| 303 nullptr); | 414 nullptr, ct_verifier_.get()); |
| 304 | 415 |
| 305 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; | 416 DummyProofVerifierCallback* callback = new DummyProofVerifierCallback; |
| 306 QuicAsyncStatus status = proof_verifier.VerifyProof( | 417 QuicAsyncStatus status = proof_verifier.VerifyProof( |
| 307 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), | 418 kTestHostname, kTestConfig, certs_, "", GetTestSignature(), |
| 308 verify_context_.get(), &error_details_, &details_, callback); | 419 verify_context_.get(), &error_details_, &details_, callback); |
| 309 ASSERT_EQ(QUIC_SUCCESS, status); | 420 ASSERT_EQ(QUIC_SUCCESS, status); |
| 310 delete callback; | 421 delete callback; |
| 311 | 422 |
| 312 ASSERT_TRUE(details_.get()); | 423 ASSERT_TRUE(details_.get()); |
| 313 ProofVerifyDetailsChromium* verify_details = | 424 ProofVerifyDetailsChromium* verify_details = |
| 314 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 425 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
| 315 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 426 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
| 316 } | 427 } |
| 317 | 428 |
| 318 } // namespace test | 429 } // namespace test |
| 319 } // namespace net | 430 } // namespace net |
| OLD | NEW |