Chromium Code Reviews| Index: net/http/transport_security_state_unittest.cc |
| diff --git a/net/http/transport_security_state_unittest.cc b/net/http/transport_security_state_unittest.cc |
| index 9f092d84a8462f27928f5630af1fd225c51681d9..24e45bb5589c9fd266e0cd988cc5d2212218ac63 100644 |
| --- a/net/http/transport_security_state_unittest.cc |
| +++ b/net/http/transport_security_state_unittest.cc |
| @@ -1288,6 +1288,24 @@ TEST_F(TransportSecurityStateTest, HPKPReporting) { |
| EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| EXPECT_FALSE(state.CheckPublicKeyPins( |
| + host_port_pair, false, bad_hashes, cert1.get(), cert2.get(), |
| + TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| + |
| + // No report should have been sent because the certificate chained to a |
| + // non-public root |
|
estark
2016/06/07 18:38:32
nit: period
dadrian
2016/06/07 21:07:53
Done.
|
| + EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
| + EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| + |
| + EXPECT_TRUE(state.CheckPublicKeyPins( |
| + host_port_pair, false, good_hashes, cert1.get(), cert2.get(), |
| + TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |
| + |
| + // No report should have been sent because there was no violation, even though |
| + // the certificate chained to a local trust anchor. |
| + EXPECT_EQ(GURL(), mock_report_sender.latest_report_uri()); |
| + EXPECT_EQ(std::string(), mock_report_sender.latest_report()); |
| + |
| + EXPECT_FALSE(state.CheckPublicKeyPins( |
| host_port_pair, true, bad_hashes, cert1.get(), cert2.get(), |
| TransportSecurityState::ENABLE_PIN_REPORTS, &failure_log)); |