| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/crypto/proof_verifier_chromium.h" |
| 6 | 6 |
| 7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
| 8 #include "base/memory/scoped_ptr.h" | 8 #include "base/memory/scoped_ptr.h" |
| 9 #include "net/base/net_errors.h" | 9 #include "net/base/net_errors.h" |
| 10 #include "net/base/test_data_directory.h" | 10 #include "net/base/test_data_directory.h" |
| (...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 49 return ERR_FAILED; | 49 return ERR_FAILED; |
| 50 } | 50 } |
| 51 }; | 51 }; |
| 52 | 52 |
| 53 // CTPolicyEnforcer that will fail the test if it is ever called. | 53 // CTPolicyEnforcer that will fail the test if it is ever called. |
| 54 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { | 54 class FailsTestCTPolicyEnforcer : public CTPolicyEnforcer { |
| 55 public: | 55 public: |
| 56 FailsTestCTPolicyEnforcer() {} | 56 FailsTestCTPolicyEnforcer() {} |
| 57 ~FailsTestCTPolicyEnforcer() override {} | 57 ~FailsTestCTPolicyEnforcer() override {} |
| 58 | 58 |
| 59 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 59 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
| 60 const ct::EVCertsWhitelist* ev_whitelist, | 60 X509Certificate* cert, |
| 61 const ct::CTVerifyResult& ct_result, | 61 const ct::EVCertsWhitelist* ev_whitelist, |
| 62 const BoundNetLog& net_log) override { | 62 const ct::SCTList& verified_scts, |
| 63 const BoundNetLog& net_log) override { |
| 63 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " | 64 ADD_FAILURE() << "CTPolicyEnforcer::DoesConformToCTEVPolicy() should " |
| 64 << "not be called"; | 65 << "not be called"; |
| 65 return false; | 66 return ct::EV_POLICY_DOES_NOT_APPLY; |
| 66 } | 67 } |
| 67 }; | 68 }; |
| 68 | 69 |
| 69 // CTPolicyEnforcer that can simulate whether or not a given certificate | 70 // CTPolicyEnforcer that can simulate whether or not a given certificate |
| 70 // conforms to the CT/EV policy. | 71 // conforms to the CT/EV policy. |
| 71 class MockCTPolicyEnforcer : public CTPolicyEnforcer { | 72 class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
| 72 public: | 73 public: |
| 73 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} | 74 MockCTPolicyEnforcer(bool is_ev) : is_ev_(is_ev) {} |
| 74 ~MockCTPolicyEnforcer() override {} | 75 ~MockCTPolicyEnforcer() override {} |
| 75 | 76 |
| 76 bool DoesConformToCTEVPolicy(X509Certificate* cert, | 77 ct::EVPolicyCompliance DoesConformToCTEVPolicy( |
| 77 const ct::EVCertsWhitelist* ev_whitelist, | 78 X509Certificate* cert, |
| 78 const ct::CTVerifyResult& ct_result, | 79 const ct::EVCertsWhitelist* ev_whitelist, |
| 79 const BoundNetLog& net_log) override { | 80 const ct::SCTList& verified_scts, |
| 80 return is_ev_; | 81 const BoundNetLog& net_log) override { |
| 82 return is_ev_ ? ct::EV_POLICY_COMPLIES_VIA_SCTS |
| 83 : ct::EV_POLICY_NOT_ENOUGH_SCTS; |
| 81 } | 84 } |
| 82 | 85 |
| 83 private: | 86 private: |
| 84 bool is_ev_; | 87 bool is_ev_; |
| 85 }; | 88 }; |
| 86 | 89 |
| 87 class DummyProofVerifierCallback : public ProofVerifierCallback { | 90 class DummyProofVerifierCallback : public ProofVerifierCallback { |
| 88 public: | 91 public: |
| 89 DummyProofVerifierCallback() {} | 92 DummyProofVerifierCallback() {} |
| 90 ~DummyProofVerifierCallback() override {} | 93 ~DummyProofVerifierCallback() override {} |
| (...skipping 304 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 395 ASSERT_EQ(QUIC_SUCCESS, status); | 398 ASSERT_EQ(QUIC_SUCCESS, status); |
| 396 | 399 |
| 397 ASSERT_TRUE(details_.get()); | 400 ASSERT_TRUE(details_.get()); |
| 398 ProofVerifyDetailsChromium* verify_details = | 401 ProofVerifyDetailsChromium* verify_details = |
| 399 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 402 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
| 400 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 403 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
| 401 } | 404 } |
| 402 | 405 |
| 403 } // namespace test | 406 } // namespace test |
| 404 } // namespace net | 407 } // namespace net |
| OLD | NEW |