OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/crypto/proof_verifier_chromium.h" |
6 | 6 |
7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
9 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
49 return ERR_FAILED; | 49 return ERR_FAILED; |
50 } | 50 } |
51 }; | 51 }; |
52 | 52 |
53 // CTPolicyEnforcer that will fail the test if it is ever called. | 53 // CTPolicyEnforcer that will fail the test if it is ever called. |
54 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { | 54 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { |
55 public: | 55 public: |
56 FailsTestCTPolicyEnforcer() {} | 56 FailsTestCTPolicyEnforcer() {} |
57 ~FailsTestCTPolicyEnforcer() override {} | 57 ~FailsTestCTPolicyEnforcer() override {} |
58 | 58 |
59 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 59 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
60 const ct::EVCertsWhitelist* ev_whitelist, | 60 X509Certificate* cert, |
61 const ct::CTVerifyResult& ct_result, | 61 const ct::EVCertsWhitelist* ev_whitelist, |
62 const BoundNetLog& net_log) override { | 62 const ct::SCTList& verified_scts, |
| 63 const BoundNetLog& net_log) override { |
63 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " | 64 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " |
64 << "not be called"; | 65 << "not be called"; |
65 return false; | 66 return ct::EV_POLICY_DOES_NOT_APPLY; |
66 } | 67 } |
67 }; | 68 }; |
68 | 69 |
69 // CTPolicyEnforcer that can simulate whether or not a given certificate | 70 // CTPolicyEnforcer that can simulate whether or not a given certificate |
70 // conforms to the CT/EV policy. | 71 // conforms to the CT/EV policy. |
71 class MockCTPolicyEnforcer : public CTPolicyEnforcer { | 72 class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
72 public: | 73 public: |
73 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} | 74 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} |
74 ~MockCTPolicyEnforcer() override {} | 75 ~MockCTPolicyEnforcer() override {} |
75 | 76 |
76 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 77 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
77 const ct::EVCertsWhitelist* ev_whitelist, | 78 X509Certificate* cert, |
78 const ct::CTVerifyResult& ct_result, | 79 const ct::EVCertsWhitelist* ev_whitelist, |
79 const BoundNetLog& net_log) override { | 80 const ct::SCTList& verified_scts, |
80 return is_ev_; | 81 const BoundNetLog& net_log) override { |
| 82 return is_ev_ ? ct::EV_POLICY_COMPLIES_VIA_SCTS |
| 83 : ct::EV_POLICY_NOT_ENOUGH_SCTS; |
81 } | 84 } |
82 | 85 |
83 private: | 86 private: |
84 bool is_ev_; | 87 bool is_ev_; |
85 }; | 88 }; |
86 | 89 |
87 class DummyProofVerifierCallback : public ProofVerifierCallback { | 90 class DummyProofVerifierCallback : public ProofVerifierCallback { |
88 public: | 91 public: |
89 DummyProofVerifierCallback() {} | 92 DummyProofVerifierCallback() {} |
90 ~DummyProofVerifierCallback() override {} | 93 ~DummyProofVerifierCallback() override {} |
(...skipping 304 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
395 ASSERT_EQ(QUIC_SUCCESS, status); | 398 ASSERT_EQ(QUIC_SUCCESS, status); |
396 | 399 |
397 ASSERT_TRUE(details_.get()); | 400 ASSERT_TRUE(details_.get()); |
398 ProofVerifyDetailsChromium* verify_details = | 401 ProofVerifyDetailsChromium* verify_details = |
399 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 402 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
400 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 403 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
401 } | 404 } |
402 | 405 |
403 } // namespace test | 406 } // namespace test |
404 } // namespace net | 407 } // namespace net |
OLD | NEW |