Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(726)

Unified Diff: components/security_state/security_state_model_unittest.cc

Issue 2363623002: Remove SecurityStateModel memoization (Closed)
Patch Set: Created 4 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: components/security_state/security_state_model_unittest.cc
diff --git a/components/security_state/security_state_model_unittest.cc b/components/security_state/security_state_model_unittest.cc
index 2d49eed251e842dbc48cb8548d3fe50236e23ab6..a254ead20c31e06b249481e0310a2336ce73c04a 100644
--- a/components/security_state/security_state_model_unittest.cc
+++ b/components/security_state/security_state_model_unittest.cc
@@ -122,8 +122,8 @@ TEST(SecurityStateModelTest, SHA1Warning) {
TestSecurityStateModelClient client;
SecurityStateModel model;
model.SetClient(&client);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR,
security_info.sha1_deprecation_status);
EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level);
@@ -136,8 +136,8 @@ TEST(SecurityStateModelTest, SHA1WarningMixedContent) {
SecurityStateModel model;
model.SetClient(&client);
client.SetDisplayedMixedContent(true);
- const SecurityStateModel::SecurityInfo& security_info1 =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info1;
+ model.GetSecurityInfo(&security_info1);
EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR,
security_info1.sha1_deprecation_status);
EXPECT_EQ(SecurityStateModel::CONTENT_STATUS_DISPLAYED,
@@ -147,8 +147,8 @@ TEST(SecurityStateModelTest, SHA1WarningMixedContent) {
client.set_initial_security_level(SecurityStateModel::SECURITY_ERROR);
client.SetDisplayedMixedContent(false);
client.SetRanMixedContent(true);
- const SecurityStateModel::SecurityInfo& security_info2 =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info2;
+ model.GetSecurityInfo(&security_info2);
EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR,
security_info2.sha1_deprecation_status);
EXPECT_EQ(SecurityStateModel::CONTENT_STATUS_RAN,
@@ -164,8 +164,8 @@ TEST(SecurityStateModelTest, SHA1WarningBrokenHTTPS) {
model.SetClient(&client);
client.set_initial_security_level(SecurityStateModel::SECURITY_ERROR);
client.AddCertStatus(net::CERT_STATUS_DATE_INVALID);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(SecurityStateModel::DEPRECATED_SHA1_MINOR,
security_info.sha1_deprecation_status);
EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level);
@@ -183,8 +183,8 @@ TEST(SecurityStateModelTest, SecureProtocolAndCiphersuite) {
client.set_connection_status(net::SSL_CONNECTION_VERSION_TLS1_2
<< net::SSL_CONNECTION_VERSION_SHIFT);
client.SetCipherSuite(ciphersuite);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(net::OBSOLETE_SSL_NONE, security_info.obsolete_ssl_status);
}
@@ -198,8 +198,8 @@ TEST(SecurityStateModelTest, NonsecureProtocol) {
client.set_connection_status(net::SSL_CONNECTION_VERSION_TLS1_1
<< net::SSL_CONNECTION_VERSION_SHIFT);
client.SetCipherSuite(ciphersuite);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(net::OBSOLETE_SSL_MASK_PROTOCOL, security_info.obsolete_ssl_status);
}
@@ -213,8 +213,8 @@ TEST(SecurityStateModelTest, NonsecureCiphersuite) {
client.set_connection_status(net::SSL_CONNECTION_VERSION_TLS1_2
<< net::SSL_CONNECTION_VERSION_SHIFT);
client.SetCipherSuite(ciphersuite);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(net::OBSOLETE_SSL_MASK_KEY_EXCHANGE | net::OBSOLETE_SSL_MASK_CIPHER,
security_info.obsolete_ssl_status);
}
@@ -231,8 +231,8 @@ TEST(SecurityStateModelTest, MalwareOverride) {
<< net::SSL_CONNECTION_VERSION_SHIFT);
client.SetCipherSuite(ciphersuite);
client.set_fails_malware_check(true);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_TRUE(security_info.fails_malware_check);
EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level);
}
@@ -244,8 +244,8 @@ TEST(SecurityStateModelTest, MalwareWithoutCOnnectionState) {
SecurityStateModel model;
model.SetClient(&client);
client.set_fails_malware_check(true);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_TRUE(security_info.fails_malware_check);
EXPECT_EQ(SecurityStateModel::SECURITY_ERROR, security_info.security_level);
}
@@ -262,8 +262,8 @@ TEST(SecurityStateModelTest, PasswordFieldWarning) {
SecurityStateModel model;
model.SetClient(&client);
client.set_displayed_password_field_on_http(true);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(SecurityStateModel::HTTP_SHOW_WARNING,
security_info.security_level);
}
@@ -280,8 +280,8 @@ TEST(SecurityStateModelTest, CreditCardFieldWarning) {
SecurityStateModel model;
model.SetClient(&client);
client.set_displayed_credit_card_field_on_http(true);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(SecurityStateModel::HTTP_SHOW_WARNING,
security_info.security_level);
}
@@ -297,8 +297,8 @@ TEST(SecurityStateModelTest, HttpWarningNotSetWithoutSwitch) {
model.SetClient(&client);
client.set_displayed_password_field_on_http(true);
client.set_displayed_credit_card_field_on_http(true);
- const SecurityStateModel::SecurityInfo& security_info =
- model.GetSecurityInfo();
+ SecurityStateModel::SecurityInfo security_info;
+ model.GetSecurityInfo(&security_info);
EXPECT_EQ(SecurityStateModel::NONE, security_info.security_level);
}
« no previous file with comments | « components/security_state/security_state_model.cc ('k') | ios/chrome/browser/ssl/ios_chrome_security_state_model_client.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698