OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/chromium/crypto/proof_verifier_chromium.h" | 5 #include "net/quic/chromium/crypto/proof_verifier_chromium.h" |
6 | 6 |
7 #include "base/memory/ref_counted.h" | 7 #include "base/memory/ref_counted.h" |
8 #include "net/base/net_errors.h" | 8 #include "net/base/net_errors.h" |
9 #include "net/cert/cert_status_flags.h" | 9 #include "net/cert/cert_status_flags.h" |
10 #include "net/cert/cert_verifier.h" | 10 #include "net/cert/cert_verifier.h" |
(...skipping 102 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
113 void SetUp() override { | 113 void SetUp() override { |
114 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCertPolicy(_, _, _)) | 114 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCertPolicy(_, _, _)) |
115 .WillRepeatedly( | 115 .WillRepeatedly( |
116 Return(ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS)); | 116 Return(ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS)); |
117 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCTEVPolicy(_, _, _, _)) | 117 EXPECT_CALL(ct_policy_enforcer_, DoesConformToCTEVPolicy(_, _, _, _)) |
118 .WillRepeatedly( | 118 .WillRepeatedly( |
119 Return(ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY)); | 119 Return(ct::EVPolicyCompliance::EV_POLICY_DOES_NOT_APPLY)); |
120 | 120 |
121 scoped_refptr<const CTLogVerifier> log( | 121 scoped_refptr<const CTLogVerifier> log( |
122 CTLogVerifier::Create(ct::GetTestPublicKey(), kLogDescription, | 122 CTLogVerifier::Create(ct::GetTestPublicKey(), kLogDescription, |
123 "https://test.example.com", "")); | 123 "https://test.example.com", "dns.example.com")); |
124 ASSERT_TRUE(log); | 124 ASSERT_TRUE(log); |
125 log_verifiers_.push_back(log); | 125 log_verifiers_.push_back(log); |
126 | 126 |
127 ct_verifier_.reset(new MultiLogCTVerifier()); | 127 ct_verifier_.reset(new MultiLogCTVerifier()); |
128 ct_verifier_->AddLogs(log_verifiers_); | 128 ct_verifier_->AddLogs(log_verifiers_); |
129 | 129 |
130 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); | 130 ASSERT_NO_FATAL_FAILURE(GetTestCertificates(&certs_)); |
131 } | 131 } |
132 | 132 |
133 scoped_refptr<X509Certificate> GetTestServerCertificate() { | 133 scoped_refptr<X509Certificate> GetTestServerCertificate() { |
(...skipping 479 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
613 ASSERT_EQ(QUIC_SUCCESS, status); | 613 ASSERT_EQ(QUIC_SUCCESS, status); |
614 | 614 |
615 ASSERT_TRUE(details_.get()); | 615 ASSERT_TRUE(details_.get()); |
616 ProofVerifyDetailsChromium* verify_details = | 616 ProofVerifyDetailsChromium* verify_details = |
617 static_cast<ProofVerifyDetailsChromium*>(details_.get()); | 617 static_cast<ProofVerifyDetailsChromium*>(details_.get()); |
618 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); | 618 EXPECT_EQ(0u, verify_details->cert_verify_result.cert_status); |
619 } | 619 } |
620 | 620 |
621 } // namespace test | 621 } // namespace test |
622 } // namespace net | 622 } // namespace net |
OLD | NEW |