Index: net/cert/x509_certificate_unittest.cc |
diff --git a/net/cert/x509_certificate_unittest.cc b/net/cert/x509_certificate_unittest.cc |
index 771dda1212237d9d1697aae710aee517d7b39a6c..9cadb266849f493a6b915d34573a3f079fda864a 100644 |
--- a/net/cert/x509_certificate_unittest.cc |
+++ b/net/cert/x509_certificate_unittest.cc |
@@ -492,6 +492,32 @@ TEST(X509CertificateTest, ExtractCRLURLsFromDERCert) { |
} |
} |
+TEST(X509CertificateTest, HasTLSFeatureExtension) { |
+ base::FilePath certs_dir = GetTestCertsDirectory(); |
+ scoped_refptr<X509Certificate> cert = |
+ ImportCertFromFile(certs_dir, "tls_feature_extension.pem"); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), cert.get()); |
+ |
+ std::string derBytes; |
+ EXPECT_TRUE( |
+ X509Certificate::GetDEREncoded(cert->os_cert_handle(), &derBytes)); |
+ |
+ EXPECT_TRUE(asn1::HasTLSFeatureExtension(derBytes)); |
+} |
+ |
+TEST(X509CertificateTest, DoesNotHaveTLSFeatureExtension) { |
+ base::FilePath certs_dir = GetTestCertsDirectory(); |
+ scoped_refptr<X509Certificate> cert = |
+ ImportCertFromFile(certs_dir, "ok_cert.pem"); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), cert.get()); |
+ |
+ std::string derBytes; |
+ EXPECT_TRUE( |
+ X509Certificate::GetDEREncoded(cert->os_cert_handle(), &derBytes)); |
+ |
+ EXPECT_FALSE(asn1::HasTLSFeatureExtension(derBytes)); |
+} |
+ |
// Tests X509CertificateCache via X509Certificate::CreateFromHandle. We |
// call X509Certificate::CreateFromHandle several times and observe whether |
// it returns a cached or new OSCertHandle. |