| Index: net/cert/internal/name_constraints_unittest.cc
|
| diff --git a/net/cert/internal/name_constraints_unittest.cc b/net/cert/internal/name_constraints_unittest.cc
|
| index 2f8b8a3f5a48e8efdf23ba0b0e6b5878d99aafe8..f1dd470d093bdb9df61f06eba901c8b51cffba2c 100644
|
| --- a/net/cert/internal/name_constraints_unittest.cc
|
| +++ b/net/cert/internal/name_constraints_unittest.cc
|
| @@ -53,9 +53,9 @@ namespace {
|
| LoadTestSubjectAltNameData(basename, &san_der);
|
| if (!load_result)
|
| return load_result;
|
| - *result = GeneralNames::CreateFromDer(der::Input(&san_der));
|
| + *result = GeneralNames::Create(der::Input(&san_der));
|
| if (!*result)
|
| - return ::testing::AssertionFailure() << "CreateFromDer failed";
|
| + return ::testing::AssertionFailure() << "Create failed";
|
| return ::testing::AssertionSuccess();
|
| }
|
|
|
| @@ -78,7 +78,7 @@ TEST_P(ParseNameConstraints, DNSNames) {
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| EXPECT_TRUE(name_constraints->IsPermittedDNSName("permitted.example.com"));
|
| @@ -161,7 +161,7 @@ TEST_P(ParseNameConstraints,
|
| std::string a;
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname2.pem", &a));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // Matches permitted exactly.
|
| @@ -191,7 +191,7 @@ TEST_P(ParseNameConstraints, DNSNamesWithLeadingDot) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("dnsname-permitted_with_leading_dot.pem", &a));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // dNSName constraints should be specified as a host. A dNSName constraint
|
| @@ -208,7 +208,7 @@ TEST_P(ParseNameConstraints, DNSNamesExcludeOnly) {
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-excluded.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // Only "excluded.permitted.example.com" is excluded, and since permitted is
|
| @@ -227,7 +227,7 @@ TEST_P(ParseNameConstraints, DNSNamesExcludeAll) {
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-excludeall.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // "permitted.example.com" is in the permitted section, but since "" is
|
| @@ -244,7 +244,7 @@ TEST_P(ParseNameConstraints, DNSNamesExcludeDot) {
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-exclude_dot.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // "." is excluded, which should match nothing.
|
| @@ -262,7 +262,7 @@ TEST_P(ParseNameConstraints, DNSNamesFailOnInvalidIA5String) {
|
| ASSERT_NE(std::string::npos, replace_location);
|
| a.replace(replace_location, 1, 1, -1);
|
|
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, DirectoryNames) {
|
| @@ -288,8 +288,7 @@ TEST_P(ParseNameConstraints, DirectoryNames) {
|
| ASSERT_TRUE(LoadTestName("name-ca.pem", &name_ca));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // Not in any permitted subtree.
|
| @@ -351,8 +350,7 @@ TEST_P(ParseNameConstraints, DirectoryNamesExcludeOnly) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("directoryname-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_empty;
|
| @@ -382,8 +380,7 @@ TEST_P(ParseNameConstraints, DirectoryNamesExcludeAll) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("directoryname-excludeall.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_empty;
|
| @@ -415,7 +412,7 @@ TEST_P(ParseNameConstraints, IPAdresses) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // IPv4 tests:
|
| @@ -530,7 +527,7 @@ TEST_P(ParseNameConstraints, IPAdressesExcludeOnly) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-excluded.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // Only 192.168.5.0/255.255.255.0 is excluded, and since permitted is empty,
|
| @@ -546,7 +543,7 @@ TEST_P(ParseNameConstraints, IPAdressesExcludeAll) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-excludeall.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| // 192.168.0.0/255.255.0.0 and
|
| @@ -565,7 +562,7 @@ TEST_P(ParseNameConstraints, IPAdressesNetmaskPermitSingleHost) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-permit_singlehost.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| EXPECT_FALSE(name_constraints->IsPermittedIP(IPAddress::IPv4AllZeros()));
|
| @@ -581,7 +578,7 @@ TEST_P(ParseNameConstraints, IPAdressesNetmaskPermitPrefixLen31) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-permit_prefix31.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| EXPECT_FALSE(name_constraints->IsPermittedIP(IPAddress::IPv4AllZeros()));
|
| @@ -598,7 +595,7 @@ TEST_P(ParseNameConstraints, IPAdressesNetmaskPermitPrefixLen1) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-permit_prefix1.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| EXPECT_FALSE(name_constraints->IsPermittedIP(IPAddress::IPv4AllZeros()));
|
| @@ -614,7 +611,7 @@ TEST_P(ParseNameConstraints, IPAdressesNetmaskPermitAll) {
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-permit_all.pem", &a));
|
|
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + NameConstraints::Create(der::Input(&a), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| EXPECT_TRUE(name_constraints->IsPermittedIP(IPAddress::IPv4AllZeros()));
|
| @@ -626,26 +623,26 @@ TEST_P(ParseNameConstraints, IPAdressesFailOnInvalidAddr) {
|
| std::string a;
|
| ASSERT_TRUE(LoadTestNameConstraint("ipaddress-invalid_addr.pem", &a));
|
|
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, IPAdressesFailOnInvalidMaskNotContiguous) {
|
| std::string a;
|
| ASSERT_TRUE(LoadTestNameConstraint(
|
| "ipaddress-invalid_mask_not_contiguous_1.pem", &a));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
|
|
| ASSERT_TRUE(LoadTestNameConstraint(
|
| "ipaddress-invalid_mask_not_contiguous_2.pem", &a));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
|
|
| ASSERT_TRUE(LoadTestNameConstraint(
|
| "ipaddress-invalid_mask_not_contiguous_3.pem", &a));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
|
|
| ASSERT_TRUE(LoadTestNameConstraint(
|
| "ipaddress-invalid_mask_not_contiguous_4.pem", &a));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&a), is_critical()));
|
| + EXPECT_FALSE(NameConstraints::Create(der::Input(&a), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, OtherNamesInPermitted) {
|
| @@ -653,8 +650,7 @@ TEST_P(ParseNameConstraints, OtherNamesInPermitted) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("othername-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -675,8 +671,7 @@ TEST_P(ParseNameConstraints, OtherNamesInExcluded) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("othername-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -697,8 +692,7 @@ TEST_P(ParseNameConstraints, Rfc822NamesInPermitted) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("rfc822name-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -719,8 +713,7 @@ TEST_P(ParseNameConstraints, Rfc822NamesInExcluded) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("rfc822name-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -741,8 +734,7 @@ TEST_P(ParseNameConstraints, X400AddresssInPermitted) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("x400address-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -763,8 +755,7 @@ TEST_P(ParseNameConstraints, X400AddresssInExcluded) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("x400address-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -785,8 +776,7 @@ TEST_P(ParseNameConstraints, EdiPartyNamesInPermitted) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("edipartyname-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -807,8 +797,7 @@ TEST_P(ParseNameConstraints, EdiPartyNamesInExcluded) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("edipartyname-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -828,8 +817,7 @@ TEST_P(ParseNameConstraints, URIsInPermitted) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("uri-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -849,8 +837,7 @@ TEST_P(ParseNameConstraints, URIsInExcluded) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("uri-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -871,8 +858,7 @@ TEST_P(ParseNameConstraints, RegisteredIDsInPermitted) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("registeredid-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -893,8 +879,7 @@ TEST_P(ParseNameConstraints, RegisteredIDsInExcluded) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("registeredid-excluded.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| if (is_critical()) {
|
| @@ -918,16 +903,16 @@ TEST_P(ParseNameConstraints,
|
| // The value should not be in the DER encoding if it is the default. But this
|
| // could be changed to allowed if there are buggy encoders out there that
|
| // include it anyway.
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnGeneralSubtreeWithMinimum) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("dnsname-with_min_1.pem", &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints,
|
| @@ -935,61 +920,60 @@ TEST_P(ParseNameConstraints,
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-with_min_0_and_max.pem",
|
| &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnGeneralSubtreeWithMinimumAndMaximum) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-with_min_1_and_max.pem",
|
| &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnGeneralSubtreeWithMaximum) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("dnsname-with_max.pem", &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnEmptyExtensionValue) {
|
| std::string constraints_der = "";
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnNoPermittedAndExcluded) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("invalid-no_subtrees.pem", &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnEmptyPermitted) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("invalid-empty_permitted_subtree.pem",
|
| &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, FailsOnEmptyExcluded) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("invalid-empty_excluded_subtree.pem",
|
| &constraints_der));
|
| - EXPECT_FALSE(NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + EXPECT_FALSE(
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| }
|
|
|
| TEST_P(ParseNameConstraints, IsPermittedCertSubjectEmailAddressIsOk) {
|
| std::string constraints_der;
|
| ASSERT_TRUE(LoadTestNameConstraint("directoryname.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_us_arizona_email;
|
| @@ -1008,8 +992,7 @@ TEST_P(ParseNameConstraints, IsPermittedCertSubjectEmailAddressIsNotOk) {
|
| ASSERT_TRUE(
|
| LoadTestNameConstraint("rfc822name-permitted.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_us_arizona_email;
|
| @@ -1031,8 +1014,7 @@ TEST_P(ParseNameConstraints, IsPermittedCertSubjectDnsNames) {
|
| ASSERT_TRUE(LoadTestNameConstraint("directoryname_and_dnsname.pem",
|
| &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_us_az_foocom;
|
| @@ -1073,8 +1055,7 @@ TEST_P(ParseNameConstraints, IsPermittedCertSubjectIpAddresses) {
|
| ASSERT_TRUE(LoadTestNameConstraint(
|
| "directoryname_and_dnsname_and_ipaddress.pem", &constraints_der));
|
| std::unique_ptr<NameConstraints> name_constraints(
|
| - NameConstraints::CreateFromDer(der::Input(&constraints_der),
|
| - is_critical()));
|
| + NameConstraints::Create(der::Input(&constraints_der), is_critical()));
|
| ASSERT_TRUE(name_constraints);
|
|
|
| std::string name_us_az_1_1_1_1;
|
| @@ -1116,20 +1097,19 @@ TEST_P(ParseNameConstraints, IsPermittedCertSubjectIpAddresses) {
|
| nullptr /* subject_alt_names */));
|
| }
|
|
|
| -TEST_P(ParseNameConstraints,
|
| - GeneralNamesCreateFromDerFailsOnEmptySubjectAltName) {
|
| +TEST_P(ParseNameConstraints, GeneralNamesCreateFailsOnEmptySubjectAltName) {
|
| std::string invalid_san_der;
|
| ASSERT_TRUE(
|
| LoadTestSubjectAltNameData("san-invalid-empty.pem", &invalid_san_der));
|
| - EXPECT_FALSE(GeneralNames::CreateFromDer(der::Input(&invalid_san_der)));
|
| + EXPECT_FALSE(GeneralNames::Create(der::Input(&invalid_san_der)));
|
| }
|
|
|
| TEST_P(ParseNameConstraints,
|
| - GeneralNamesCreateFromDerFailsOnInvalidIpInSubjectAltName) {
|
| + GeneralNamesCreateFailsOnInvalidIpInSubjectAltName) {
|
| std::string invalid_san_der;
|
| ASSERT_TRUE(LoadTestSubjectAltNameData("san-invalid-ipaddress.pem",
|
| &invalid_san_der));
|
| - EXPECT_FALSE(GeneralNames::CreateFromDer(der::Input(&invalid_san_der)));
|
| + EXPECT_FALSE(GeneralNames::Create(der::Input(&invalid_san_der)));
|
| }
|
|
|
| } // namespace net
|
|
|