Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(211)

Unified Diff: net/ssl/ssl_cipher_suite_names_unittest.cc

Issue 2418113002: Revert "Roll src/third_party/boringssl/src 0d81373f9..1991af690" (https://codereview.chromium.org/2… (Closed)
Patch Set: Created 4 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/ssl/ssl_cipher_suite_names.cc ('k') | third_party/WebKit/Source/core/inspector/browser_protocol.json » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/ssl/ssl_cipher_suite_names_unittest.cc
diff --git a/net/ssl/ssl_cipher_suite_names_unittest.cc b/net/ssl/ssl_cipher_suite_names_unittest.cc
index 5bda4c7d7de60b57618fef7e79387bd19ab0e3d0..83eb55c617145bc4901727c0144c61eb5cae63eb 100644
--- a/net/ssl/ssl_cipher_suite_names_unittest.cc
+++ b/net/ssl/ssl_cipher_suite_names_unittest.cc
@@ -39,72 +39,38 @@ int MakeConnectionStatus(int version, uint16_t cipher_suite) {
TEST(CipherSuiteNamesTest, Basic) {
const char *key_exchange, *cipher, *mac;
- bool is_aead, is_tls13;
+ bool is_aead;
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xc001);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xc001);
EXPECT_STREQ("ECDH_ECDSA", key_exchange);
EXPECT_STREQ("NULL", cipher);
EXPECT_STREQ("HMAC-SHA1", mac);
EXPECT_FALSE(is_aead);
- EXPECT_FALSE(is_tls13);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x009f);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x009f);
EXPECT_STREQ("DHE_RSA", key_exchange);
EXPECT_STREQ("AES_256_GCM", cipher);
EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
- EXPECT_EQ(nullptr, mac);
+ EXPECT_EQ(NULL, mac);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xcca9);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xcca9);
EXPECT_STREQ("ECDHE_ECDSA", key_exchange);
EXPECT_STREQ("CHACHA20_POLY1305", cipher);
EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
- EXPECT_EQ(nullptr, mac);
+ EXPECT_EQ(NULL, mac);
// Non-standard variant.
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xcc14);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xcc14);
EXPECT_STREQ("ECDHE_ECDSA", key_exchange);
EXPECT_STREQ("CHACHA20_POLY1305", cipher);
EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
- EXPECT_EQ(nullptr, mac);
+ EXPECT_EQ(NULL, mac);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0xff31);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0xff31);
EXPECT_STREQ("???", key_exchange);
EXPECT_STREQ("???", cipher);
EXPECT_STREQ("???", mac);
EXPECT_FALSE(is_aead);
- EXPECT_FALSE(is_tls13);
-
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1301);
- EXPECT_STREQ("AES_128_GCM", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
-
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1302);
- EXPECT_STREQ("AES_256_GCM", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
-
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x1303);
- EXPECT_STREQ("CHACHA20_POLY1305", cipher);
- EXPECT_TRUE(is_aead);
- EXPECT_TRUE(is_tls13);
- EXPECT_EQ(nullptr, mac);
- EXPECT_EQ(nullptr, key_exchange);
}
TEST(CipherSuiteNamesTest, ParseSSLCipherString) {
@@ -181,9 +147,6 @@ TEST(CipherSuiteNamesTest, ObsoleteSSLStatusProtocolAndCipherSuite) {
EXPECT_EQ(OBSOLETE_SSL_NONE,
ObsoleteSSLStatus(MakeConnectionStatus(
kModernVersion, kModernCipherModernKeyExchange)));
- EXPECT_EQ(OBSOLETE_SSL_NONE, ObsoleteSSLStatus(MakeConnectionStatus(
- SSL_CONNECTION_VERSION_TLS1_3,
- 0x1301 /* AES_128_GCM_SHA256 */)));
}
TEST(CipherSuiteNamesTest, HTTP2CipherSuites) {
@@ -219,9 +182,6 @@ TEST(CipherSuiteNamesTest, HTTP2CipherSuites) {
0xcca8 /* ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 */));
EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(
0xcca9 /* ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1301 /* AES_128_GCM_SHA256 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1302 /* AES_256_GCM_SHA384 */));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(0x1303 /* CHACHA20_POLY1305 */));
}
TEST(CipherSuiteNamesTest, CECPQ1) {
@@ -232,7 +192,7 @@ TEST(CipherSuiteNamesTest, CECPQ1) {
0x16ba, // TLS_CECPQ1_ECDSA_WITH_AES_256_GCM_SHA384 (non-standard)
};
const char *key_exchange, *cipher, *mac;
- bool is_aead, is_tls13;
+ bool is_aead;
for (const uint16_t cipher_suite_id : kCECPQ1CipherSuites) {
SCOPED_TRACE(base::StringPrintf("cipher suite %x", cipher_suite_id));
@@ -241,31 +201,25 @@ TEST(CipherSuiteNamesTest, CECPQ1) {
int connection_status =
MakeConnectionStatus(kModernVersion, cipher_suite_id);
EXPECT_EQ(OBSOLETE_SSL_NONE, ObsoleteSSLStatus(connection_status));
- EXPECT_TRUE(IsTLSCipherSuiteAllowedByHTTP2(cipher_suite_id));
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead,
cipher_suite_id);
EXPECT_TRUE(is_aead);
- EXPECT_FALSE(is_tls13);
EXPECT_EQ(nullptr, mac);
}
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x16b7);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b7);
EXPECT_STREQ("CECPQ1_RSA", key_exchange);
EXPECT_STREQ("CHACHA20_POLY1305", cipher);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x16b8);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b8);
EXPECT_STREQ("CECPQ1_ECDSA", key_exchange);
EXPECT_STREQ("CHACHA20_POLY1305", cipher);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x16b9);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16b9);
EXPECT_STREQ("CECPQ1_RSA", key_exchange);
EXPECT_STREQ("AES_256_GCM", cipher);
- SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, &is_tls13,
- 0x16ba);
+ SSLCipherSuiteToStrings(&key_exchange, &cipher, &mac, &is_aead, 0x16ba);
EXPECT_STREQ("CECPQ1_ECDSA", key_exchange);
EXPECT_STREQ("AES_256_GCM", cipher);
}
« no previous file with comments | « net/ssl/ssl_cipher_suite_names.cc ('k') | third_party/WebKit/Source/core/inspector/browser_protocol.json » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698