| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" | 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 64 // Destroy |cert_verifier_| before destroying the ThreadBundle, otherwise | 64 // Destroy |cert_verifier_| before destroying the ThreadBundle, otherwise |
| 65 // BrowserThread::CurrentlyOn checks fail. | 65 // BrowserThread::CurrentlyOn checks fail. |
| 66 cert_verifier_.reset(); | 66 cert_verifier_.reset(); |
| 67 } | 67 } |
| 68 | 68 |
| 69 protected: | 69 protected: |
| 70 int VerifyTestServerCert( | 70 int VerifyTestServerCert( |
| 71 const net::TestCompletionCallback& test_callback, | 71 const net::TestCompletionCallback& test_callback, |
| 72 net::CertVerifyResult* verify_result, | 72 net::CertVerifyResult* verify_result, |
| 73 std::unique_ptr<net::CertVerifier::Request>* request) { | 73 std::unique_ptr<net::CertVerifier::Request>* request) { |
| 74 return cert_verifier_->Verify( | 74 return cert_verifier_->Verify(net::CertVerifier::RequestParams( |
| 75 test_server_cert_.get(), "127.0.0.1", std::string(), 0, NULL, | 75 test_server_cert_.get(), "127.0.0.1", 0, |
| 76 verify_result, test_callback.callback(), request, net::BoundNetLog()); | 76 std::string(), net::CertificateList()), |
| 77 nullptr, verify_result, |
| 78 test_callback.callback(), request, |
| 79 net::BoundNetLog()); |
| 77 } | 80 } |
| 78 | 81 |
| 79 bool SupportsAdditionalTrustAnchors() { | 82 bool SupportsAdditionalTrustAnchors() { |
| 80 scoped_refptr<net::CertVerifyProc> proc = | 83 scoped_refptr<net::CertVerifyProc> proc = |
| 81 net::CertVerifyProc::CreateDefault(); | 84 net::CertVerifyProc::CreateDefault(); |
| 82 return proc->SupportsAdditionalTrustAnchors(); | 85 return proc->SupportsAdditionalTrustAnchors(); |
| 83 } | 86 } |
| 84 | 87 |
| 85 // Returns whether |cert_verifier| signalled usage of one of the additional | 88 // Returns whether |cert_verifier| signalled usage of one of the additional |
| 86 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the | 89 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 225 int error = VerifyTestServerCert(callback, &verify_result, &request); | 228 int error = VerifyTestServerCert(callback, &verify_result, &request); |
| 226 // Note: this hits the cached result from the first Verify() in this test. | 229 // Note: this hits the cached result from the first Verify() in this test. |
| 227 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | 230 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); |
| 228 } | 231 } |
| 229 // The additional trust anchors were reset, thus |cert_verifier_| should not | 232 // The additional trust anchors were reset, thus |cert_verifier_| should not |
| 230 // signal it's usage anymore. | 233 // signal it's usage anymore. |
| 231 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | 234 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); |
| 232 } | 235 } |
| 233 | 236 |
| 234 } // namespace policy | 237 } // namespace policy |
| OLD | NEW |