| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/test_tools/crypto_test_utils.h" | 5 #include "net/quic/test_tools/crypto_test_utils.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/callback_helpers.h" | 9 #include "base/callback_helpers.h" |
| 10 #include "base/logging.h" | 10 #include "base/logging.h" |
| (...skipping 201 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 212 } | 212 } |
| 213 | 213 |
| 214 private: | 214 private: |
| 215 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); | 215 DISALLOW_COPY_AND_ASSIGN(FakeProofVerifier); |
| 216 }; | 216 }; |
| 217 | 217 |
| 218 } // namespace | 218 } // namespace |
| 219 | 219 |
| 220 // static | 220 // static |
| 221 ProofSource* CryptoTestUtils::ProofSourceForTesting() { | 221 ProofSource* CryptoTestUtils::ProofSourceForTesting() { |
| 222 #if defined(USE_OPENSSL) | |
| 223 ProofSourceChromium* source = new ProofSourceChromium(); | 222 ProofSourceChromium* source = new ProofSourceChromium(); |
| 224 #else | |
| 225 FakeProofSource* source = new FakeProofSource(); | |
| 226 #endif | |
| 227 base::FilePath certs_dir = GetTestCertsDirectory(); | 223 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 228 CHECK(source->Initialize( | 224 CHECK(source->Initialize( |
| 229 certs_dir.AppendASCII("quic_chain.crt"), | 225 certs_dir.AppendASCII("quic_chain.crt"), |
| 230 certs_dir.AppendASCII("quic_test.example.com.key.pkcs8"), | 226 certs_dir.AppendASCII("quic_test.example.com.key.pkcs8"), |
| 231 certs_dir.AppendASCII("quic_test.example.com.key.sct"))); | 227 certs_dir.AppendASCII("quic_test.example.com.key.sct"))); |
| 232 return source; | 228 return source; |
| 233 } | 229 } |
| 234 | 230 |
| 235 // static | 231 // static |
| 236 ProofVerifier* ProofVerifierForTestingInternal(bool use_real_proof_verifier) { | 232 ProofVerifier* ProofVerifierForTestingInternal(bool use_real_proof_verifier) { |
| 237 // TODO(rch): use a real cert verifier? | 233 // TODO(rch): use a real cert verifier? |
| 238 scoped_ptr<MockCertVerifier> cert_verifier(new MockCertVerifier()); | 234 scoped_ptr<MockCertVerifier> cert_verifier(new MockCertVerifier()); |
| 239 net::CertVerifyResult verify_result; | 235 net::CertVerifyResult verify_result; |
| 240 verify_result.verified_cert = | 236 verify_result.verified_cert = |
| 241 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); | 237 ImportCertFromFile(GetTestCertsDirectory(), "quic_test.example.com.crt"); |
| 242 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 238 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
| 243 "test.example.com", verify_result, OK); | 239 "test.example.com", verify_result, OK); |
| 244 verify_result.verified_cert = ImportCertFromFile( | 240 verify_result.verified_cert = ImportCertFromFile( |
| 245 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); | 241 GetTestCertsDirectory(), "quic_test_ecc.example.com.crt"); |
| 246 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), | 242 cert_verifier->AddResultForCertAndHost(verify_result.verified_cert.get(), |
| 247 "test.example.com", verify_result, OK); | 243 "test.example.com", verify_result, OK); |
| 248 if (use_real_proof_verifier) { | 244 if (use_real_proof_verifier) { |
| 249 return new TestProofVerifierChromium( | 245 return new TestProofVerifierChromium( |
| 250 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), | 246 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
| 251 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 247 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
| 252 } | 248 } |
| 253 #if defined(USE_OPENSSL) | |
| 254 return new TestProofVerifierChromium( | 249 return new TestProofVerifierChromium( |
| 255 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), | 250 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), |
| 256 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | 251 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); |
| 257 #else | |
| 258 return new FakeProofVerifier( | |
| 259 std::move(cert_verifier), make_scoped_ptr(new TransportSecurityState), | |
| 260 make_scoped_ptr(new MultiLogCTVerifier), "quic_root.crt"); | |
| 261 #endif | |
| 262 } | 252 } |
| 263 | 253 |
| 264 // static | 254 // static |
| 265 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { | 255 ProofVerifier* CryptoTestUtils::ProofVerifierForTesting() { |
| 266 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); | 256 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/false); |
| 267 } | 257 } |
| 268 | 258 |
| 269 // static | 259 // static |
| 270 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { | 260 ProofVerifier* CryptoTestUtils::RealProofVerifierForTesting() { |
| 271 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); | 261 return ProofVerifierForTestingInternal(/*use_real_proof_verifier=*/true); |
| 272 } | 262 } |
| 273 | 263 |
| 274 // static | 264 // static |
| 275 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { | 265 ProofVerifyContext* CryptoTestUtils::ProofVerifyContextForTesting() { |
| 276 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); | 266 return new ProofVerifyContextChromium(/*cert_verify_flags=*/0, BoundNetLog()); |
| 277 } | 267 } |
| 278 | 268 |
| 279 } // namespace test | 269 } // namespace test |
| 280 | 270 |
| 281 } // namespace net | 271 } // namespace net |
| OLD | NEW |