| Index: chrome/browser/chromeos/cros/network_library_unittest.cc
|
| diff --git a/chrome/browser/chromeos/cros/network_library_unittest.cc b/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| index 4608f104d452fae72fd62dfd1f57c357230eb49b..9d5dc6c5ff5322fca089481db7ee77e5d2582f40 100644
|
| --- a/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| +++ b/chrome/browser/chromeos/cros/network_library_unittest.cc
|
| @@ -177,7 +177,8 @@ class NetworkLibraryStubTest : public ::testing::Test {
|
| base::DictionaryValue* expected_configs;
|
| expected_value->GetAsDictionary(&expected_configs);
|
|
|
| - cros_->LoadOncNetworks(*onc_network_configs, source);
|
| + cros_->LoadOncNetworks(*onc_network_configs, source,
|
| + base::Bind(&onc::test_utils::FakeFingerprintToPEM));
|
|
|
| const std::map<std::string, base::DictionaryValue*>& configs =
|
| cros_->GetConfigurations();
|
| @@ -291,14 +292,14 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifi) {
|
|
|
| TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) {
|
| scoped_ptr<base::DictionaryValue> onc_root =
|
| - onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc");
|
| + onc::test_utils::ReadTestDictionary("certificate-client.onc");
|
| base::ListValue* certificates;
|
| onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates,
|
| &certificates);
|
|
|
| onc::CertificateImporter importer(true /* allow trust imports */);
|
| ASSERT_EQ(onc::CertificateImporter::IMPORT_OK,
|
| - importer.ParseAndStoreCertificates(*certificates, NULL));
|
| + importer.ParseAndStoreCertificates(*certificates, NULL, NULL));
|
|
|
| WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern");
|
|
|
| @@ -320,14 +321,14 @@ TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) {
|
|
|
| TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) {
|
| scoped_ptr<base::DictionaryValue> onc_root =
|
| - onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc");
|
| + onc::test_utils::ReadTestDictionary("certificate-client.onc");
|
| base::ListValue* certificates;
|
| onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates,
|
| &certificates);
|
|
|
| onc::CertificateImporter importer(true /* allow trust imports */);
|
| ASSERT_EQ(onc::CertificateImporter::IMPORT_OK,
|
| - importer.ParseAndStoreCertificates(*certificates, NULL));
|
| + importer.ParseAndStoreCertificates(*certificates, NULL, NULL));
|
|
|
| VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern");
|
|
|
| @@ -409,7 +410,7 @@ INSTANTIATE_TEST_CASE_P(
|
| ImportParams("managed_toplevel1_normalized.onc",
|
| "chromeos/net/shill_for_managed_toplevel1.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| - ImportParams("managed_toplevel2.onc",
|
| + ImportParams("managed_toplevel2_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_managed_toplevel2.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams("managed_toplevel_l2tpipsec.onc",
|
| @@ -431,10 +432,10 @@ INSTANTIATE_TEST_CASE_P(
|
| "chromeos/net/shill_for_toplevel_wifi_leap.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams(
|
| - "toplevel_wifi_eap_clientcert.onc",
|
| + "toplevel_wifi_eap_clientcert_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_toplevel_wifi_eap_clientcert.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| - ImportParams("toplevel_openvpn_clientcert.onc",
|
| + ImportParams("toplevel_openvpn_clientcert_with_cert_fingerprints.onc",
|
| "chromeos/net/shill_for_toplevel_openvpn_clientcert.json",
|
| onc::ONC_SOURCE_USER_POLICY),
|
| ImportParams("toplevel_wifi_remove.onc",
|
|
|