Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(200)

Side by Side Diff: net/quic/test_tools/crypto_test_utils_chromium.cc

Issue 1545233002: Convert Pass()→std::move() in //net (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 4 years, 12 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/quic/quic_stream_factory.cc ('k') | net/sdch/sdch_owner.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/test_tools/crypto_test_utils.h" 5 #include "net/quic/test_tools/crypto_test_utils.h"
6 6
7 #include <utility>
8
7 #include "base/callback_helpers.h" 9 #include "base/callback_helpers.h"
8 #include "base/logging.h" 10 #include "base/logging.h"
9 #include "base/macros.h" 11 #include "base/macros.h"
10 #include "base/memory/ref_counted.h" 12 #include "base/memory/ref_counted.h"
11 #include "base/memory/scoped_ptr.h" 13 #include "base/memory/scoped_ptr.h"
12 #include "base/stl_util.h" 14 #include "base/stl_util.h"
13 #include "base/strings/stringprintf.h" 15 #include "base/strings/stringprintf.h"
14 #include "net/base/net_errors.h" 16 #include "net/base/net_errors.h"
15 #include "net/base/test_completion_callback.h" 17 #include "net/base/test_completion_callback.h"
16 #include "net/base/test_data_directory.h" 18 #include "net/base/test_data_directory.h"
(...skipping 29 matching lines...) Expand all
46 public: 48 public:
47 TestProofVerifierChromium( 49 TestProofVerifierChromium(
48 scoped_ptr<CertVerifier> cert_verifier, 50 scoped_ptr<CertVerifier> cert_verifier,
49 scoped_ptr<TransportSecurityState> transport_security_state, 51 scoped_ptr<TransportSecurityState> transport_security_state,
50 scoped_ptr<CTVerifier> cert_transparency_verifier, 52 scoped_ptr<CTVerifier> cert_transparency_verifier,
51 const std::string& cert_file) 53 const std::string& cert_file)
52 : ProofVerifierChromium(cert_verifier.get(), 54 : ProofVerifierChromium(cert_verifier.get(),
53 nullptr, 55 nullptr,
54 transport_security_state.get(), 56 transport_security_state.get(),
55 cert_transparency_verifier.get()), 57 cert_transparency_verifier.get()),
56 cert_verifier_(cert_verifier.Pass()), 58 cert_verifier_(std::move(cert_verifier)),
57 transport_security_state_(transport_security_state.Pass()), 59 transport_security_state_(std::move(transport_security_state)),
58 cert_transparency_verifier_(cert_transparency_verifier.Pass()) { 60 cert_transparency_verifier_(std::move(cert_transparency_verifier)) {
59 // Load and install the root for the validated chain. 61 // Load and install the root for the validated chain.
60 scoped_refptr<X509Certificate> root_cert = 62 scoped_refptr<X509Certificate> root_cert =
61 ImportCertFromFile(GetTestCertsDirectory(), cert_file); 63 ImportCertFromFile(GetTestCertsDirectory(), cert_file);
62 scoped_root_.Reset(root_cert.get()); 64 scoped_root_.Reset(root_cert.get());
63 } 65 }
64 66
65 ~TestProofVerifierChromium() override {} 67 ~TestProofVerifierChromium() override {}
66 68
67 CertVerifier* cert_verifier() { return cert_verifier_.get(); } 69 CertVerifier* cert_verifier() { return cert_verifier_.get(); }
68 70
(...skipping 60 matching lines...) Expand 10 before | Expand all | Expand 10 after
129 131
130 DISALLOW_COPY_AND_ASSIGN(FakeProofSource); 132 DISALLOW_COPY_AND_ASSIGN(FakeProofSource);
131 }; 133 };
132 134
133 class FakeProofVerifier : public TestProofVerifierChromium { 135 class FakeProofVerifier : public TestProofVerifierChromium {
134 public: 136 public:
135 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier, 137 FakeProofVerifier(scoped_ptr<CertVerifier> cert_verifier,
136 scoped_ptr<TransportSecurityState> transport_security_state, 138 scoped_ptr<TransportSecurityState> transport_security_state,
137 scoped_ptr<CTVerifier> cert_transparency_verifier, 139 scoped_ptr<CTVerifier> cert_transparency_verifier,
138 const std::string& cert_file) 140 const std::string& cert_file)
139 : TestProofVerifierChromium(cert_verifier.Pass(), 141 : TestProofVerifierChromium(std::move(cert_verifier),
140 transport_security_state.Pass(), 142 std::move(transport_security_state),
141 cert_transparency_verifier.Pass(), 143 std::move(cert_transparency_verifier),
142 cert_file) {} 144 cert_file) {}
143 ~FakeProofVerifier() override {} 145 ~FakeProofVerifier() override {}
144 146
145 // ProofVerifier interface 147 // ProofVerifier interface
146 QuicAsyncStatus VerifyProof(const std::string& hostname, 148 QuicAsyncStatus VerifyProof(const std::string& hostname,
147 const std::string& server_config, 149 const std::string& server_config,
148 const std::vector<std::string>& certs, 150 const std::vector<std::string>& certs,
149 const std::string& cert_sct, 151 const std::string& cert_sct,
150 const std::string& signature, 152 const std::string& signature,
151 const ProofVerifyContext* verify_context, 153 const ProofVerifyContext* verify_context,
152 std::string* error_details, 154 std::string* error_details,
153 scoped_ptr<ProofVerifyDetails>* verify_details, 155 scoped_ptr<ProofVerifyDetails>* verify_details,
154 ProofVerifierCallback* callback) override { 156 ProofVerifierCallback* callback) override {
155 error_details->clear(); 157 error_details->clear();
156 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium( 158 scoped_ptr<ProofVerifyDetailsChromium> verify_details_chromium(
157 new ProofVerifyDetailsChromium); 159 new ProofVerifyDetailsChromium);
158 DCHECK(!certs.empty()); 160 DCHECK(!certs.empty());
159 // Convert certs to X509Certificate. 161 // Convert certs to X509Certificate.
160 vector<StringPiece> cert_pieces(certs.size()); 162 vector<StringPiece> cert_pieces(certs.size());
161 for (unsigned i = 0; i < certs.size(); i++) { 163 for (unsigned i = 0; i < certs.size(); i++) {
162 cert_pieces[i] = base::StringPiece(certs[i]); 164 cert_pieces[i] = base::StringPiece(certs[i]);
163 } 165 }
164 scoped_refptr<X509Certificate> x509_cert = 166 scoped_refptr<X509Certificate> x509_cert =
165 X509Certificate::CreateFromDERCertChain(cert_pieces); 167 X509Certificate::CreateFromDERCertChain(cert_pieces);
166 168
167 if (!x509_cert.get()) { 169 if (!x509_cert.get()) {
168 *error_details = "Failed to create certificate chain"; 170 *error_details = "Failed to create certificate chain";
169 verify_details_chromium->cert_verify_result.cert_status = 171 verify_details_chromium->cert_verify_result.cert_status =
170 CERT_STATUS_INVALID; 172 CERT_STATUS_INVALID;
171 *verify_details = verify_details_chromium.Pass(); 173 *verify_details = std::move(verify_details_chromium);
172 return QUIC_FAILURE; 174 return QUIC_FAILURE;
173 } 175 }
174 176
175 const ProofVerifyContextChromium* chromium_context = 177 const ProofVerifyContextChromium* chromium_context =
176 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context); 178 reinterpret_cast<const ProofVerifyContextChromium*>(verify_context);
177 scoped_ptr<CertVerifier::Request> cert_verifier_request_; 179 scoped_ptr<CertVerifier::Request> cert_verifier_request_;
178 TestCompletionCallback test_callback; 180 TestCompletionCallback test_callback;
179 int result = cert_verifier()->Verify( 181 int result = cert_verifier()->Verify(
180 x509_cert.get(), hostname, std::string(), 182 x509_cert.get(), hostname, std::string(),
181 chromium_context->cert_verify_flags, 183 chromium_context->cert_verify_flags,
182 SSLConfigService::GetCRLSet().get(), 184 SSLConfigService::GetCRLSet().get(),
183 &verify_details_chromium->cert_verify_result, test_callback.callback(), 185 &verify_details_chromium->cert_verify_result, test_callback.callback(),
184 &cert_verifier_request_, chromium_context->net_log); 186 &cert_verifier_request_, chromium_context->net_log);
185 if (result != OK) { 187 if (result != OK) {
186 std::string error_string = ErrorToString(result); 188 std::string error_string = ErrorToString(result);
187 *error_details = StringPrintf("Failed to verify certificate chain: %s", 189 *error_details = StringPrintf("Failed to verify certificate chain: %s",
188 error_string.c_str()); 190 error_string.c_str());
189 verify_details_chromium->cert_verify_result.cert_status = 191 verify_details_chromium->cert_verify_result.cert_status =
190 CERT_STATUS_INVALID; 192 CERT_STATUS_INVALID;
191 *verify_details = verify_details_chromium.Pass(); 193 *verify_details = std::move(verify_details_chromium);
192 return QUIC_FAILURE; 194 return QUIC_FAILURE;
193 } 195 }
194 if (signature != kSignature) { 196 if (signature != kSignature) {
195 *error_details = "Invalid proof"; 197 *error_details = "Invalid proof";
196 verify_details_chromium->cert_verify_result.cert_status = 198 verify_details_chromium->cert_verify_result.cert_status =
197 CERT_STATUS_INVALID; 199 CERT_STATUS_INVALID;
198 *verify_details = verify_details_chromium.Pass(); 200 *verify_details = std::move(verify_details_chromium);
199 return QUIC_FAILURE; 201 return QUIC_FAILURE;
200 } 202 }
201 *verify_details = verify_details_chromium.Pass(); 203 *verify_details = std::move(verify_details_chromium);
202 return QUIC_SUCCESS; 204 return QUIC_SUCCESS;
203 } 205 }
204 206
205 private: 207 private:
206 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); 208 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier);
207 }; 209 };
208 210
209 } // namespace 211 } // namespace
210 212
211 // static 213 // static
(...skipping 19 matching lines...) Expand all
231 verify_result.verified_cert = 233 verify_result.verified_cert =
232 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); 234 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt");
233 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), 235 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(),
234 "test.example.com", verify_result, OK); 236 "test.example.com", verify_result, OK);
235 verify_result.verified_cert = ImportCertFromFile( 237 verify_result.verified_cert = ImportCertFromFile(
236 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); 238 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt");
237 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), 239 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(),
238 "test.example.com", verify_result, OK); 240 "test.example.com", verify_result, OK);
239 if (use_real_proof_verifier) { 241 if (use_real_proof_verifier) {
240 return new TestProofVerifierChromium( 242 return new TestProofVerifierChromium(
241 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), 243 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState),
242 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); 244 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt");
243 } 245 }
244 #if defined(USE_OPENSSL) 246 #if defined(USE_OPENSSL)
245 return new TestProofVerifierChromium( 247 return new TestProofVerifierChromium(
246 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), 248 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState),
247 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); 249 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt");
248 #else 250 #else
249 return new FakeProofVerifier( 251 return new FakeProofVerifier(
250 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState), 252 cert_verifier.Pass(), make_scoped_ptr(new TransportSecurityState),
251 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); 253 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt");
252 #endif 254 #endif
253 } 255 }
254 256
255 // static 257 // static
256 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { 258 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() {
257 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); 259 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false);
258 } 260 }
259 261
260 // static 262 // static
261 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { 263 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() {
262 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); 264 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true);
263 } 265 }
264 266
265 // static 267 // static
266 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { 268 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() {
267 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); 269 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog());
268 } 270 }
269 271
270 } // namespace test 272 } // namespace test
271 273
272 } // namespace net 274 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/quic_stream_factory.cc ('k') | net/sdch/sdch_owner.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698