| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index f2203e0f99ca297d62d6a46cce21f47ac54b7916..fece0535e440c5cfb195723c2d0f4aaaefeac5d2 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -3421,7 +3421,7 @@ TEST_F(TokenBindingURLRequestTest, TokenBindingTest) {
|
| EXPECT_TRUE(headers.GetHeader(HttpRequestHeaders::kTokenBinding,
|
| &token_binding_header));
|
| EXPECT_TRUE(base::Base64UrlDecode(
|
| - token_binding_header, base::Base64UrlDecodePolicy::REQUIRE_PADDING,
|
| + token_binding_header, base::Base64UrlDecodePolicy::DISALLOW_PADDING,
|
| &token_binding_message));
|
| std::vector<TokenBinding> token_bindings;
|
| ASSERT_TRUE(
|
| @@ -3432,8 +3432,9 @@ TEST_F(TokenBindingURLRequestTest, TokenBindingTest) {
|
| std::string ekm = d.data_received();
|
|
|
| EXPECT_EQ(TokenBindingType::PROVIDED, token_bindings[0].type);
|
| - EXPECT_TRUE(VerifyEKMSignature(token_bindings[0].ec_point,
|
| - token_bindings[0].signature, ekm));
|
| + EXPECT_TRUE(VerifyTokenBindingSignature(token_bindings[0].ec_point,
|
| + token_bindings[0].signature,
|
| + TokenBindingType::PROVIDED, ekm));
|
| }
|
| }
|
|
|
| @@ -3464,7 +3465,7 @@ TEST_F(TokenBindingURLRequestTest, ForwardTokenBinding) {
|
| EXPECT_TRUE(headers.GetHeader(HttpRequestHeaders::kTokenBinding,
|
| &token_binding_header));
|
| EXPECT_TRUE(base::Base64UrlDecode(
|
| - token_binding_header, base::Base64UrlDecodePolicy::REQUIRE_PADDING,
|
| + token_binding_header, base::Base64UrlDecodePolicy::DISALLOW_PADDING,
|
| &token_binding_message));
|
| std::vector<TokenBinding> token_bindings;
|
| ASSERT_TRUE(
|
| @@ -3475,11 +3476,13 @@ TEST_F(TokenBindingURLRequestTest, ForwardTokenBinding) {
|
| std::string ekm = d.data_received();
|
|
|
| EXPECT_EQ(TokenBindingType::PROVIDED, token_bindings[0].type);
|
| - EXPECT_TRUE(VerifyEKMSignature(token_bindings[0].ec_point,
|
| - token_bindings[0].signature, ekm));
|
| + EXPECT_TRUE(VerifyTokenBindingSignature(token_bindings[0].ec_point,
|
| + token_bindings[0].signature,
|
| + TokenBindingType::PROVIDED, ekm));
|
| EXPECT_EQ(TokenBindingType::REFERRED, token_bindings[1].type);
|
| - EXPECT_TRUE(VerifyEKMSignature(token_bindings[1].ec_point,
|
| - token_bindings[1].signature, ekm));
|
| + EXPECT_TRUE(VerifyTokenBindingSignature(token_bindings[1].ec_point,
|
| + token_bindings[1].signature,
|
| + TokenBindingType::REFERRED, ekm));
|
| }
|
| }
|
|
|
| @@ -3517,7 +3520,7 @@ TEST_F(TokenBindingURLRequestTest, DontForwardHeaderFromHttp) {
|
| EXPECT_TRUE(headers.GetHeader(HttpRequestHeaders::kTokenBinding,
|
| &token_binding_header));
|
| EXPECT_TRUE(base::Base64UrlDecode(
|
| - token_binding_header, base::Base64UrlDecodePolicy::REQUIRE_PADDING,
|
| + token_binding_header, base::Base64UrlDecodePolicy::DISALLOW_PADDING,
|
| &token_binding_message));
|
| std::vector<TokenBinding> token_bindings;
|
| ASSERT_TRUE(
|
| @@ -3528,8 +3531,9 @@ TEST_F(TokenBindingURLRequestTest, DontForwardHeaderFromHttp) {
|
| std::string ekm = d.data_received();
|
|
|
| EXPECT_EQ(TokenBindingType::PROVIDED, token_bindings[0].type);
|
| - EXPECT_TRUE(VerifyEKMSignature(token_bindings[0].ec_point,
|
| - token_bindings[0].signature, ekm));
|
| + EXPECT_TRUE(VerifyTokenBindingSignature(token_bindings[0].ec_point,
|
| + token_bindings[0].signature,
|
| + TokenBindingType::PROVIDED, ekm));
|
| }
|
| }
|
|
|
|
|