| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/chromium/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/chromium/crypto/proof_verifier_chromium.h" |
| 6 | 6 |
| 7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
| 8 #include "net/base/net_errors.h" | 8 #include "net/base/net_errors.h" |
| 9 #include "net/cert/cert_status_flags.h" | 9 #include "net/cert/cert_status_flags.h" |
| 10 #include "net/cert/cert_verifier.h" | 10 #include "net/cert/cert_verifier.h" |
| (...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 113 void SetUp() override { | 113 void SetUp() override { |
| 114 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCertPolicy(_, _, _)) | 114 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCertPolicy(_, _, _)) |
| 115 .WillRepeatedly( | 115 .WillRepeatedly( |
| 116 Return(ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS)); | 116 Return(ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS)); |
| 117 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCTEVPolicy(_, _, _, _)) | 117 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCTEVPolicy(_, _, _, _)) |
| 118 .WillRepeatedly( | 118 .WillRepeatedly( |
| 119 Return(ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY)); | 119 Return(ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY)); |
| 120 | 120 |
| 121 scoped_refptr<const CTLogVerifier> log( | 121 scoped_refptr<const CTLogVerifier> log( |
| 122 CTLogVerifier::Create(ct::GetTestPublicKey(), kLogDescription, | 122 CTLogVerifier::Create(ct::GetTestPublicKey(), kLogDescription, |
| 123 "https://test.example.com", "")); | 123 "https://test.example.com", "dns.example.com")); |
| 124 ASSERT_TRUE(log); | 124 ASSERT_TRUE(log); |
| 125 log_verifiers_.push_back(log); | 125 log_verifiers_.push_back(log); |
| 126 | 126 |
| 127 ct_verifier_.reset(new MultiLogCTVerifier()); | 127 ct_verifier_.reset(new MultiLogCTVerifier()); |
| 128 ct_verifier_->AddLogs(log_verifiers_); | 128 ct_verifier_->AddLogs(log_verifiers_); |
| 129 | 129 |
| 130 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); | 130 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); |
| 131 } | 131 } |
| 132 | 132 |
| 133 scoped_refptr<X509Certificate> GetTestServerCertificate() { | 133 scoped_refptr<X509Certificate> GetTestServerCertificate() { |
| (...skipping 479 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 613 ASSERT_EQ(QUIC_SUCCESS, status); | 613 ASSERT_EQ(QUIC_SUCCESS, status); |
| 614 | 614 |
| 615 ASSERT_TRUE(details_.get()); | 615 ASSERT_TRUE(details_.get()); |
| 616 ProofVerifyDetailsChromium* verify_details = | 616 ProofVerifyDetailsChromium* verify_details = |
| 617 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 617 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
| 618 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 618 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
| 619 } | 619 } |
| 620 | 620 |
| 621 } // namespace test | 621 } // namespace test |
| 622 } // namespace net | 622 } // namespace net |
| OLD | NEW |