OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/http/transport_security_state.h" | 5 #include "net/http/transport_security_state.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <string> | 8 #include <string> |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
(...skipping 1270 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1281 | 1281 |
1282 EXPECT_TRUE(state.CheckPublicKeyPins( | 1282 EXPECT_TRUE(state.CheckPublicKeyPins( |
1283 host_port_pair, true, good_hashes, cert1.get(), cert2.get(), | 1283 host_port_pair, true, good_hashes, cert1.get(), cert2.get(), |
1284 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | 1284 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
1285 | 1285 |
1286 // No report should have been sent because there was no violation. | 1286 // No report should have been sent because there was no violation. |
1287 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); | 1287 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
1288 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); | 1288 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
1289 | 1289 |
1290 EXPECT_FALSE(state.CheckPublicKeyPins( | 1290 EXPECT_FALSE(state.CheckPublicKeyPins( |
1291 host_port_pair, false, bad_hashes, cert1.get(), cert2.get(), | |
1292 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | |
1293 | |
1294 // No report should have been sent because the certificate chained to a | |
1295 // non-public root | |
estark
2016/06/07 18:38:32
nit: period
dadrian
2016/06/07 21:07:53
Done.
| |
1296 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); | |
1297 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); | |
1298 | |
1299 EXPECT_TRUE(state.CheckPublicKeyPins( | |
1300 host_port_pair, false, good_hashes, cert1.get(), cert2.get(), | |
1301 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | |
1302 | |
1303 // No report should have been sent because there was no violation, even though | |
1304 // the certificate chained to a local trust anchor. | |
1305 EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); | |
1306 EXPECT_EQ(std::string(), mock_report_sender.latest_report()); | |
1307 | |
1308 EXPECT_FALSE(state.CheckPublicKeyPins( | |
1291 host_port_pair, true, bad_hashes, cert1.get(), cert2.get(), | 1309 host_port_pair, true, bad_hashes, cert1.get(), cert2.get(), |
1292 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); | 1310 TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
1293 | 1311 |
1294 // Now a report should have been sent. Check that it contains the | 1312 // Now a report should have been sent. Check that it contains the |
1295 // right information. | 1313 // right information. |
1296 EXPECT_EQ(report_uri, mock_report_sender.latest_report_uri()); | 1314 EXPECT_EQ(report_uri, mock_report_sender.latest_report_uri()); |
1297 std::string report = mock_report_sender.latest_report(); | 1315 std::string report = mock_report_sender.latest_report(); |
1298 ASSERT_FALSE(report.empty()); | 1316 ASSERT_FALSE(report.empty()); |
1299 ASSERT_NO_FATAL_FAILURE(CheckHPKPReport(report, host_port_pair, true, kHost, | 1317 ASSERT_NO_FATAL_FAILURE(CheckHPKPReport(report, host_port_pair, true, kHost, |
1300 cert1.get(), cert2.get(), | 1318 cert1.get(), cert2.get(), |
(...skipping 544 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
1845 EXPECT_EQ(1u, reporter.num_failures()); | 1863 EXPECT_EQ(1u, reporter.num_failures()); |
1846 EXPECT_TRUE(reporter.ssl_info().ct_compliance_details_available); | 1864 EXPECT_TRUE(reporter.ssl_info().ct_compliance_details_available); |
1847 EXPECT_EQ(ssl_info.ct_cert_policy_compliance, | 1865 EXPECT_EQ(ssl_info.ct_cert_policy_compliance, |
1848 reporter.ssl_info().ct_cert_policy_compliance); | 1866 reporter.ssl_info().ct_cert_policy_compliance); |
1849 EXPECT_EQ(host_port.host(), reporter.host_port_pair().host()); | 1867 EXPECT_EQ(host_port.host(), reporter.host_port_pair().host()); |
1850 EXPECT_EQ(host_port.port(), reporter.host_port_pair().port()); | 1868 EXPECT_EQ(host_port.port(), reporter.host_port_pair().port()); |
1851 EXPECT_EQ(GURL(kExpectCTStaticReportURI), reporter.report_uri()); | 1869 EXPECT_EQ(GURL(kExpectCTStaticReportURI), reporter.report_uri()); |
1852 } | 1870 } |
1853 | 1871 |
1854 } // namespace net | 1872 } // namespace net |
OLD | NEW |