| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/http/transport_security_state.h" | 5 #include "net/http/transport_security_state.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <string> | 8 #include <string> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| (...skipping 1255 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1266 | 1266 |
| 1267 EXPECT_TRUE(state.CheckPublicKeyPins( | 1267 EXPECT_TRUE(state.CheckPublicKeyPins( |
| 1268 host_port_pair, true, good_hashes, cert1.get(), cert2.get(), | 1268 host_port_pair, true, good_hashes, cert1.get(), cert2.get(), |
| 1269 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | 1269 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| 1270 | 1270 |
| 1271 // No report should have been sent because there was no violation. | 1271 // No report should have been sent because there was no violation. |
| 1272 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); | 1272 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
| 1273 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); | 1273 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| 1274 | 1274 |
| 1275 EXPECT_FALSE(state.CheckPublicKeyPins( | 1275 EXPECT_FALSE(state.CheckPublicKeyPins( |
| 1276 host_port_pair, false, bad_hashes, cert1.get(), cert2.get(), |
| 1277 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| 1278 |
| 1279 // No report should have been sent because the certificate chained to a |
| 1280 // non-public root |
| 1281 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
| 1282 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| 1283 |
| 1284 EXPECT_TRUE(state.CheckPublicKeyPins( |
| 1285 host_port_pair, false, good_hashes, cert1.get(), cert2.get(), |
| 1286 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| 1287 |
| 1288 // No report should have been sent because there was no violation, even though |
| 1289 // the certificate chained to a local trust anchor. |
| 1290 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
| 1291 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| 1292 |
| 1293 EXPECT_FALSE(state.CheckPublicKeyPins( |
| 1276 host_port_pair, true, bad_hashes, cert1.get(), cert2.get(), | 1294 host_port_pair, true, bad_hashes, cert1.get(), cert2.get(), |
| 1277 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | 1295 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| 1278 | 1296 |
| 1279 // Now a report should have been sent. Check that it contains the | 1297 // Now a report should have been sent. Check that it contains the |
| 1280 // right information. | 1298 // right information. |
| 1281 EXPECT_EQ(report_uri, mock_report_sender.latest_report_uri()); | 1299 EXPECT_EQ(report_uri, mock_report_sender.latest_report_uri()); |
| 1282 std::string report = mock_report_sender.latest_report(); | 1300 std::string report = mock_report_sender.latest_report(); |
| 1283 ASSERT_FALSE(report.empty()); | 1301 ASSERT_FALSE(report.empty()); |
| 1284 ASSERT_NO_FATAL_FAILURE(CheckHPKPReport(report, host_port_pair, true, kHost, | 1302 ASSERT_NO_FATAL_FAILURE(CheckHPKPReport(report, host_port_pair, true, kHost, |
| 1285 cert1.get(), cert2.get(), | 1303 cert1.get(), cert2.get(), |
| (...skipping 512 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1798 EXPECT_EQ(1u, reporter.num_failures()); | 1816 EXPECT_EQ(1u, reporter.num_failures()); |
| 1799 EXPECT_TRUE(reporter.ssl_info().ct_compliance_details_available); | 1817 EXPECT_TRUE(reporter.ssl_info().ct_compliance_details_available); |
| 1800 EXPECT_EQ(ssl_info.ct_cert_policy_compliance, | 1818 EXPECT_EQ(ssl_info.ct_cert_policy_compliance, |
| 1801 reporter.ssl_info().ct_cert_policy_compliance); | 1819 reporter.ssl_info().ct_cert_policy_compliance); |
| 1802 EXPECT_EQ(host_port.host(), reporter.host_port_pair().host()); | 1820 EXPECT_EQ(host_port.host(), reporter.host_port_pair().host()); |
| 1803 EXPECT_EQ(host_port.port(), reporter.host_port_pair().port()); | 1821 EXPECT_EQ(host_port.port(), reporter.host_port_pair().port()); |
| 1804 EXPECT_EQ(GURL(kExpectCTStaticReportURI), reporter.report_uri()); | 1822 EXPECT_EQ(GURL(kExpectCTStaticReportURI), reporter.report_uri()); |
| 1805 } | 1823 } |
| 1806 | 1824 |
| 1807 } // namespace net | 1825 } // namespace net |
| OLD | NEW |