| Index: net/cert/multi_threaded_cert_verifier_unittest.cc
|
| diff --git a/net/cert/multi_threaded_cert_verifier_unittest.cc b/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| index a93680a3067df08be4ff29c0d61e47b8f86c5106..26d9e0205f6920f70764bb98af00091dd234f87b 100644
|
| --- a/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| +++ b/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| @@ -90,9 +90,10 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) {
|
| TestCompletionCallback callback;
|
| std::unique_ptr<CertVerifier::Request> request;
|
|
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| error = callback.WaitForResult();
|
| @@ -102,9 +103,10 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) {
|
| ASSERT_EQ(0u, verifier_.inflight_joins());
|
| ASSERT_EQ(1u, verifier_.GetCacheSize());
|
|
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| // Synchronous completion.
|
| ASSERT_NE(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(IsCertificateError(error));
|
| @@ -150,9 +152,10 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) {
|
| TestCompletionCallback callback;
|
| std::unique_ptr<CertVerifier::Request> request;
|
|
|
| - error = verifier_.Verify(cert_chain1.get(), "www.example.com", std::string(),
|
| - 0, NULL, &verify_result, callback.callback(),
|
| - &request, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(cert_chain1, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| error = callback.WaitForResult();
|
| @@ -162,9 +165,10 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) {
|
| ASSERT_EQ(0u, verifier_.inflight_joins());
|
| ASSERT_EQ(1u, verifier_.GetCacheSize());
|
|
|
| - error = verifier_.Verify(cert_chain2.get(), "www.example.com", std::string(),
|
| - 0, NULL, &verify_result, callback.callback(),
|
| - &request, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(cert_chain2, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| error = callback.WaitForResult();
|
| @@ -190,14 +194,16 @@ TEST_F(MultiThreadedCertVerifierTest, InflightJoin) {
|
| TestCompletionCallback callback2;
|
| std::unique_ptr<CertVerifier::Request> request2;
|
|
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result2, callback2.callback(),
|
| - &request2, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result2, callback2.callback(), &request2, BoundNetLog());
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request2);
|
| error = callback.WaitForResult();
|
| @@ -220,9 +226,10 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) {
|
| CertVerifyResult verify_result;
|
| std::unique_ptr<CertVerifier::Request> request;
|
|
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, base::Bind(&FailTest),
|
| - &request, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, base::Bind(&FailTest), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request);
|
| request.reset();
|
| @@ -232,9 +239,10 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) {
|
| // worker thread) is likely to complete by the end of this test.
|
| TestCompletionCallback callback;
|
| for (int i = 0; i < 5; ++i) {
|
| - error = verifier_.Verify(test_cert.get(), "www2.example.com", std::string(),
|
| - 0, NULL, &verify_result, callback.callback(),
|
| - &request, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www2.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| error = callback.WaitForResult();
|
| @@ -262,9 +270,10 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) {
|
| // can't post the reply back to the origin thread. See
|
| // https://crbug.com/522514
|
| ANNOTATE_SCOPED_MEMORY_LEAK;
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(),
|
| - 0, NULL, &verify_result, callback.callback(),
|
| - &request, BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| }
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| @@ -292,9 +301,10 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| std::unique_ptr<CertVerifier::Request> request;
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list));
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| @@ -306,9 +316,10 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| // The next Verify() uses the cached result.
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list));
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
|
| EXPECT_FALSE(request);
|
| @@ -319,9 +330,10 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| // trust anchors will not reuse the cache.
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(cert_list));
|
| - error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0,
|
| - NULL, &verify_result, callback.callback(), &request,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, "www.example.com", 0,
|
| + std::string(), CertificateList()),
|
| + NULL, &verify_result, callback.callback(), &request, BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request);
|
| @@ -361,34 +373,39 @@ TEST_F(MultiThreadedCertVerifierTest, MultipleInflightJoin) {
|
| const char domain3[] = "www.example3.com";
|
|
|
| // Start 3 unique requests.
|
| - error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr,
|
| - &verify_result1, callback1.callback(), &request1,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, domain2, 0, std::string(),
|
| + CertificateList()),
|
| + nullptr, &verify_result1, callback1.callback(), &request1, BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request1);
|
|
|
| - error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr,
|
| - &verify_result2, callback2.callback(), &request2,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, domain2, 0, std::string(),
|
| + CertificateList()),
|
| + nullptr, &verify_result2, callback2.callback(), &request2, BoundNetLog());
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request2);
|
|
|
| - error = verifier_.Verify(test_cert.get(), domain3, std::string(), 0, nullptr,
|
| - &verify_result3, callback3.callback(), &request3,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, domain3, 0, std::string(),
|
| + CertificateList()),
|
| + nullptr, &verify_result3, callback3.callback(), &request3, BoundNetLog());
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request3);
|
|
|
| // Start duplicate requests (which should join to existing jobs).
|
| - error = verifier_.Verify(test_cert.get(), domain1, std::string(), 0, nullptr,
|
| - &verify_result4, callback4.callback(), &request4,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, domain1, 0, std::string(),
|
| + CertificateList()),
|
| + nullptr, &verify_result4, callback4.callback(), &request4, BoundNetLog());
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request4);
|
|
|
| - error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr,
|
| - &verify_result5, callback5.callback(), &request5,
|
| - BoundNetLog());
|
| + error = verifier_.Verify(
|
| + CertVerifier::RequestParams(test_cert, domain2, 0, std::string(),
|
| + CertificateList()),
|
| + nullptr, &verify_result5, callback5.callback(), &request5, BoundNetLog());
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request5);
|
|
|
|
|