Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(599)

Side by Side Diff: net/socket/ssl_server_socket_unittest.cc

Issue 2351513002: net: rename BoundNetLog to NetLogWithSource (Closed)
Patch Set: one more fix, content bound_net_log_ Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // This test suite uses SSLClientSocket to test the implementation of 5 // This test suite uses SSLClientSocket to test the implementation of
6 // SSLServerSocket. In order to establish connections between the sockets 6 // SSLServerSocket. In order to establish connections between the sockets
7 // we need two additional classes: 7 // we need two additional classes:
8 // 1. FakeSocket 8 // 1. FakeSocket
9 // Connects SSL socket to FakeDataChannel. This class is just a stub. 9 // Connects SSL socket to FakeDataChannel. This class is just a stub.
10 // 10 //
(...skipping 79 matching lines...) Expand 10 before | Expand all | Expand 10 after
90 90
91 class MockCTVerifier : public CTVerifier { 91 class MockCTVerifier : public CTVerifier {
92 public: 92 public:
93 MockCTVerifier() = default; 93 MockCTVerifier() = default;
94 ~MockCTVerifier() override = default; 94 ~MockCTVerifier() override = default;
95 95
96 int Verify(X509Certificate* cert, 96 int Verify(X509Certificate* cert,
97 const std::string& stapled_ocsp_response, 97 const std::string& stapled_ocsp_response,
98 const std::string& sct_list_from_tls_extension, 98 const std::string& sct_list_from_tls_extension,
99 ct::CTVerifyResult* result, 99 ct::CTVerifyResult* result,
100 const BoundNetLog& net_log) override { 100 const NetLogWithSource& net_log) override {
101 return net::OK; 101 return net::OK;
102 } 102 }
103 103
104 void SetObserver(Observer* observer) override {} 104 void SetObserver(Observer* observer) override {}
105 }; 105 };
106 106
107 class MockCTPolicyEnforcer : public CTPolicyEnforcer { 107 class MockCTPolicyEnforcer : public CTPolicyEnforcer {
108 public: 108 public:
109 MockCTPolicyEnforcer() = default; 109 MockCTPolicyEnforcer() = default;
110 ~MockCTPolicyEnforcer() override = default; 110 ~MockCTPolicyEnforcer() override = default;
111 ct::CertPolicyCompliance DoesConformToCertPolicy( 111 ct::CertPolicyCompliance DoesConformToCertPolicy(
112 X509Certificate* cert, 112 X509Certificate* cert,
113 const SCTList& verified_scts, 113 const SCTList& verified_scts,
114 const BoundNetLog& net_log) override { 114 const NetLogWithSource& net_log) override {
115 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; 115 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS;
116 } 116 }
117 117
118 ct::EVPolicyCompliance DoesConformToCTEVPolicy( 118 ct::EVPolicyCompliance DoesConformToCTEVPolicy(
119 X509Certificate* cert, 119 X509Certificate* cert,
120 const ct::EVCertsWhitelist* ev_whitelist, 120 const ct::EVCertsWhitelist* ev_whitelist,
121 const SCTList& verified_scts, 121 const SCTList& verified_scts,
122 const BoundNetLog& net_log) override { 122 const NetLogWithSource& net_log) override {
123 return ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS; 123 return ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS;
124 } 124 }
125 }; 125 };
126 126
127 class FakeDataChannel { 127 class FakeDataChannel {
128 public: 128 public:
129 FakeDataChannel() 129 FakeDataChannel()
130 : read_buf_len_(0), 130 : read_buf_len_(0),
131 closed_(false), 131 closed_(false),
132 write_called_after_close_(false), 132 write_called_after_close_(false),
(...skipping 153 matching lines...) Expand 10 before | Expand all | Expand 10 after
286 int GetPeerAddress(IPEndPoint* address) const override { 286 int GetPeerAddress(IPEndPoint* address) const override {
287 *address = IPEndPoint(IPAddress::IPv4AllZeros(), 0 /*port*/); 287 *address = IPEndPoint(IPAddress::IPv4AllZeros(), 0 /*port*/);
288 return OK; 288 return OK;
289 } 289 }
290 290
291 int GetLocalAddress(IPEndPoint* address) const override { 291 int GetLocalAddress(IPEndPoint* address) const override {
292 *address = IPEndPoint(IPAddress::IPv4AllZeros(), 0 /*port*/); 292 *address = IPEndPoint(IPAddress::IPv4AllZeros(), 0 /*port*/);
293 return OK; 293 return OK;
294 } 294 }
295 295
296 const BoundNetLog& NetLog() const override { return net_log_; } 296 const NetLogWithSource& NetLog() const override { return net_log_; }
297 297
298 void SetSubresourceSpeculation() override {} 298 void SetSubresourceSpeculation() override {}
299 void SetOmniboxSpeculation() override {} 299 void SetOmniboxSpeculation() override {}
300 300
301 bool WasEverUsed() const override { return true; } 301 bool WasEverUsed() const override { return true; }
302 302
303 bool WasNpnNegotiated() const override { return false; } 303 bool WasNpnNegotiated() const override { return false; }
304 304
305 NextProto GetNegotiatedProtocol() const override { return kProtoUnknown; } 305 NextProto GetNegotiatedProtocol() const override { return kProtoUnknown; }
306 306
307 bool GetSSLInfo(SSLInfo* ssl_info) override { return false; } 307 bool GetSSLInfo(SSLInfo* ssl_info) override { return false; }
308 308
309 void GetConnectionAttempts(ConnectionAttempts* out) const override { 309 void GetConnectionAttempts(ConnectionAttempts* out) const override {
310 out->clear(); 310 out->clear();
311 } 311 }
312 312
313 void ClearConnectionAttempts() override {} 313 void ClearConnectionAttempts() override {}
314 314
315 void AddConnectionAttempts(const ConnectionAttempts& attempts) override {} 315 void AddConnectionAttempts(const ConnectionAttempts& attempts) override {}
316 316
317 int64_t GetTotalReceivedBytes() const override { 317 int64_t GetTotalReceivedBytes() const override {
318 NOTIMPLEMENTED(); 318 NOTIMPLEMENTED();
319 return 0; 319 return 0;
320 } 320 }
321 321
322 private: 322 private:
323 BoundNetLog net_log_; 323 NetLogWithSource net_log_;
324 FakeDataChannel* incoming_; 324 FakeDataChannel* incoming_;
325 FakeDataChannel* outgoing_; 325 FakeDataChannel* outgoing_;
326 326
327 DISALLOW_COPY_AND_ASSIGN(FakeSocket); 327 DISALLOW_COPY_AND_ASSIGN(FakeSocket);
328 }; 328 };
329 329
330 } // namespace 330 } // namespace
331 331
332 // Verify the correctness of the test helper classes first. 332 // Verify the correctness of the test helper classes first.
333 TEST(FakeSocketTest, DataTransfer) { 333 TEST(FakeSocketTest, DataTransfer) {
(...skipping 779 matching lines...) Expand 10 before | Expand all | Expand 10 after
1113 int server_ret = server_socket_->Handshake(handshake_callback.callback()); 1113 int server_ret = server_socket_->Handshake(handshake_callback.callback());
1114 1114
1115 client_ret = connect_callback.GetResult(client_ret); 1115 client_ret = connect_callback.GetResult(client_ret);
1116 server_ret = handshake_callback.GetResult(server_ret); 1116 server_ret = handshake_callback.GetResult(server_ret);
1117 1117
1118 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); 1118 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
1119 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); 1119 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
1120 } 1120 }
1121 1121
1122 } // namespace net 1122 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698