| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" | 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" |
| 6 | 6 |
| 7 #include <memory> | 7 #include <memory> |
| 8 | 8 |
| 9 #include "base/bind.h" | 9 #include "base/bind.h" |
| 10 #include "base/bind_helpers.h" | 10 #include "base/bind_helpers.h" |
| (...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 68 protected: | 68 protected: |
| 69 int VerifyTestServerCert( | 69 int VerifyTestServerCert( |
| 70 const net::TestCompletionCallback& test_callback, | 70 const net::TestCompletionCallback& test_callback, |
| 71 net::CertVerifyResult* verify_result, | 71 net::CertVerifyResult* verify_result, |
| 72 std::unique_ptr<net::CertVerifier::Request>* request) { | 72 std::unique_ptr<net::CertVerifier::Request>* request) { |
| 73 return cert_verifier_->Verify(net::CertVerifier::RequestParams( | 73 return cert_verifier_->Verify(net::CertVerifier::RequestParams( |
| 74 test_server_cert_.get(), "127.0.0.1", 0, | 74 test_server_cert_.get(), "127.0.0.1", 0, |
| 75 std::string(), net::CertificateList()), | 75 std::string(), net::CertificateList()), |
| 76 nullptr, verify_result, | 76 nullptr, verify_result, |
| 77 test_callback.callback(), request, | 77 test_callback.callback(), request, |
| 78 net::BoundNetLog()); | 78 net::NetLogWithSource()); |
| 79 } | 79 } |
| 80 | 80 |
| 81 bool SupportsAdditionalTrustAnchors() { | 81 bool SupportsAdditionalTrustAnchors() { |
| 82 scoped_refptr<net::CertVerifyProc> proc = | 82 scoped_refptr<net::CertVerifyProc> proc = |
| 83 net::CertVerifyProc::CreateDefault(); | 83 net::CertVerifyProc::CreateDefault(); |
| 84 return proc->SupportsAdditionalTrustAnchors(); | 84 return proc->SupportsAdditionalTrustAnchors(); |
| 85 } | 85 } |
| 86 | 86 |
| 87 // Returns whether |cert_verifier| signalled usage of one of the additional | 87 // Returns whether |cert_verifier| signalled usage of one of the additional |
| 88 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the | 88 // trust anchors (i.e. of |test_ca_cert_|) for the first time or since the |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 227 int error = VerifyTestServerCert(callback, &verify_result, &request); | 227 int error = VerifyTestServerCert(callback, &verify_result, &request); |
| 228 // Note: this hits the cached result from the first Verify() in this test. | 228 // Note: this hits the cached result from the first Verify() in this test. |
| 229 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); | 229 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); |
| 230 } | 230 } |
| 231 // The additional trust anchors were reset, thus |cert_verifier_| should not | 231 // The additional trust anchors were reset, thus |cert_verifier_| should not |
| 232 // signal it's usage anymore. | 232 // signal it's usage anymore. |
| 233 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); | 233 EXPECT_FALSE(WasTrustAnchorUsedAndReset()); |
| 234 } | 234 } |
| 235 | 235 |
| 236 } // namespace policy | 236 } // namespace policy |
| OLD | NEW |