| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/quic_chromium_client_session.h" | 5 #include "net/quic/quic_chromium_client_session.h" |
| 6 | 6 |
| 7 #include <vector> | 7 #include <vector> |
| 8 | 8 |
| 9 #include "base/base64.h" | 9 #include "base/base64.h" |
| 10 #include "base/files/file_path.h" | 10 #include "base/files/file_path.h" |
| (...skipping 24 matching lines...) Expand all Loading... |
| 35 #include "net/test/cert_test_util.h" | 35 #include "net/test/cert_test_util.h" |
| 36 #include "net/udp/datagram_client_socket.h" | 36 #include "net/udp/datagram_client_socket.h" |
| 37 | 37 |
| 38 using testing::_; | 38 using testing::_; |
| 39 | 39 |
| 40 namespace net { | 40 namespace net { |
| 41 namespace test { | 41 namespace test { |
| 42 namespace { | 42 namespace { |
| 43 | 43 |
| 44 const char kServerHostname[] = "test.example.com"; | 44 const char kServerHostname[] = "test.example.com"; |
| 45 const uint16 kServerPort = 443; | 45 const uint16_t kServerPort = 443; |
| 46 | 46 |
| 47 class QuicChromiumClientSessionTest | 47 class QuicChromiumClientSessionTest |
| 48 : public ::testing::TestWithParam<QuicVersion> { | 48 : public ::testing::TestWithParam<QuicVersion> { |
| 49 protected: | 49 protected: |
| 50 QuicChromiumClientSessionTest() | 50 QuicChromiumClientSessionTest() |
| 51 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), | 51 : crypto_config_(CryptoTestUtils::ProofVerifierForTesting()), |
| 52 connection_(new PacketSavingConnection(&helper_, | 52 connection_(new PacketSavingConnection(&helper_, |
| 53 Perspective::IS_CLIENT, | 53 Perspective::IS_CLIENT, |
| 54 SupportedVersions(GetParam()))), | 54 SupportedVersions(GetParam()))), |
| 55 session_( | 55 session_( |
| (...skipping 165 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 221 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 221 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); |
| 222 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 222 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); |
| 223 | 223 |
| 224 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); | 224 EXPECT_TRUE(session_.CanPool("www.example.org", PRIVACY_MODE_DISABLED)); |
| 225 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 225 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 226 EXPECT_FALSE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); | 226 EXPECT_FALSE(session_.CanPool("mail.example.com", PRIVACY_MODE_DISABLED)); |
| 227 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); | 227 EXPECT_FALSE(session_.CanPool("mail.google.com", PRIVACY_MODE_DISABLED)); |
| 228 } | 228 } |
| 229 | 229 |
| 230 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { | 230 TEST_P(QuicChromiumClientSessionTest, ConnectionNotPooledWithDifferentPin) { |
| 231 uint8 primary_pin = 1; | 231 uint8_t primary_pin = 1; |
| 232 uint8 backup_pin = 2; | 232 uint8_t backup_pin = 2; |
| 233 uint8 bad_pin = 3; | 233 uint8_t bad_pin = 3; |
| 234 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 234 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 235 backup_pin); | 235 backup_pin); |
| 236 | 236 |
| 237 ProofVerifyDetailsChromium details; | 237 ProofVerifyDetailsChromium details; |
| 238 details.cert_verify_result.verified_cert = | 238 details.cert_verify_result.verified_cert = |
| 239 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 239 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 240 details.cert_verify_result.is_issued_by_known_root = true; | 240 details.cert_verify_result.is_issued_by_known_root = true; |
| 241 details.cert_verify_result.public_key_hashes.push_back( | 241 details.cert_verify_result.public_key_hashes.push_back( |
| 242 GetTestHashValue(bad_pin)); | 242 GetTestHashValue(bad_pin)); |
| 243 | 243 |
| 244 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 244 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 245 | 245 |
| 246 CompleteCryptoHandshake(); | 246 CompleteCryptoHandshake(); |
| 247 session_.OnProofVerifyDetailsAvailable(details); | 247 session_.OnProofVerifyDetailsAvailable(details); |
| 248 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 248 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); |
| 249 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 249 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); |
| 250 | 250 |
| 251 EXPECT_FALSE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 251 EXPECT_FALSE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 252 } | 252 } |
| 253 | 253 |
| 254 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { | 254 TEST_P(QuicChromiumClientSessionTest, ConnectionPooledWithMatchingPin) { |
| 255 uint8 primary_pin = 1; | 255 uint8_t primary_pin = 1; |
| 256 uint8 backup_pin = 2; | 256 uint8_t backup_pin = 2; |
| 257 AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 257 AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 258 backup_pin); | 258 backup_pin); |
| 259 | 259 |
| 260 ProofVerifyDetailsChromium details; | 260 ProofVerifyDetailsChromium details; |
| 261 details.cert_verify_result.verified_cert = | 261 details.cert_verify_result.verified_cert = |
| 262 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); | 262 ImportCertFromFile(GetTestCertsDirectory(), "spdy_pooling.pem"); |
| 263 details.cert_verify_result.is_issued_by_known_root = true; | 263 details.cert_verify_result.is_issued_by_known_root = true; |
| 264 details.cert_verify_result.public_key_hashes.push_back( | 264 details.cert_verify_result.public_key_hashes.push_back( |
| 265 GetTestHashValue(primary_pin)); | 265 GetTestHashValue(primary_pin)); |
| 266 | 266 |
| 267 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); | 267 ASSERT_TRUE(details.cert_verify_result.verified_cert.get()); |
| 268 | 268 |
| 269 CompleteCryptoHandshake(); | 269 CompleteCryptoHandshake(); |
| 270 session_.OnProofVerifyDetailsAvailable(details); | 270 session_.OnProofVerifyDetailsAvailable(details); |
| 271 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); | 271 QuicChromiumClientSessionPeer::SetHostname(&session_, "www.example.org"); |
| 272 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); | 272 QuicChromiumClientSessionPeer::SetChannelIDSent(&session_, true); |
| 273 | 273 |
| 274 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); | 274 EXPECT_TRUE(session_.CanPool("mail.example.org", PRIVACY_MODE_DISABLED)); |
| 275 } | 275 } |
| 276 | 276 |
| 277 } // namespace | 277 } // namespace |
| 278 } // namespace test | 278 } // namespace test |
| 279 } // namespace net | 279 } // namespace net |
| OLD | NEW |