| Index: net/socket/ssl_client_socket_openssl_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_openssl_unittest.cc b/net/socket/ssl_client_socket_openssl_unittest.cc
|
| index 91c9a93aa7eb3c1af8b230436d79c002dd5df4b2..00cf9f35cb4b612841207513f112780a405880df 100644
|
| --- a/net/socket/ssl_client_socket_openssl_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_openssl_unittest.cc
|
| @@ -35,9 +35,7 @@
|
| #include "net/socket/client_socket_handle.h"
|
| #include "net/socket/socket_test_util.h"
|
| #include "net/socket/tcp_client_socket.h"
|
| -#include "net/ssl/default_server_bound_cert_store.h"
|
| #include "net/ssl/openssl_client_key_store.h"
|
| -#include "net/ssl/server_bound_cert_service.h"
|
| #include "net/ssl/ssl_cert_request_info.h"
|
| #include "net/ssl/ssl_config_service.h"
|
| #include "net/test/cert_test_util.h"
|
| @@ -64,35 +62,6 @@ typedef crypto::ScopedOpenSSL<BIGNUM, BN_free> ScopedBIGNUM;
|
|
|
| const SSLConfig kDefaultSSLConfig;
|
|
|
| -// A ServerBoundCertStore that always returns an error when asked for a
|
| -// certificate.
|
| -class FailingServerBoundCertStore : public ServerBoundCertStore {
|
| - virtual int GetServerBoundCert(const std::string& server_identifier,
|
| - base::Time* expiration_time,
|
| - std::string* private_key_result,
|
| - std::string* cert_result,
|
| - const GetCertCallback& callback) OVERRIDE {
|
| - return ERR_UNEXPECTED;
|
| - }
|
| - virtual void SetServerBoundCert(const std::string& server_identifier,
|
| - base::Time creation_time,
|
| - base::Time expiration_time,
|
| - const std::string& private_key,
|
| - const std::string& cert) OVERRIDE {}
|
| - virtual void DeleteServerBoundCert(const std::string& server_identifier,
|
| - const base::Closure& completion_callback)
|
| - OVERRIDE {}
|
| - virtual void DeleteAllCreatedBetween(base::Time delete_begin,
|
| - base::Time delete_end,
|
| - const base::Closure& completion_callback)
|
| - OVERRIDE {}
|
| - virtual void DeleteAll(const base::Closure& completion_callback) OVERRIDE {}
|
| - virtual void GetAllServerBoundCerts(const GetCertListCallback& callback)
|
| - OVERRIDE {}
|
| - virtual int GetCertCount() OVERRIDE { return 0; }
|
| - virtual void SetForceKeepSessionState() OVERRIDE {}
|
| -};
|
| -
|
| // Loads a PEM-encoded private key file into a scoped EVP_PKEY object.
|
| // |filepath| is the private key file path.
|
| // |*pkey| is reset to the new EVP_PKEY on success, untouched otherwise.
|
| @@ -141,20 +110,6 @@ class SSLClientSocketOpenSSLClientAuthTest : public PlatformTest {
|
| }
|
|
|
| protected:
|
| - void EnabledChannelID() {
|
| - cert_service_.reset(
|
| - new ServerBoundCertService(new DefaultServerBoundCertStore(NULL),
|
| - base::MessageLoopProxy::current()));
|
| - context_.server_bound_cert_service = cert_service_.get();
|
| - }
|
| -
|
| - void EnabledFailingChannelID() {
|
| - cert_service_.reset(
|
| - new ServerBoundCertService(new FailingServerBoundCertStore(),
|
| - base::MessageLoopProxy::current()));
|
| - context_.server_bound_cert_service = cert_service_.get();
|
| - }
|
| -
|
| scoped_ptr<SSLClientSocket> CreateSSLClientSocket(
|
| scoped_ptr<StreamSocket> transport_socket,
|
| const HostPortPair& host_and_port,
|
| @@ -236,7 +191,6 @@ class SSLClientSocketOpenSSLClientAuthTest : public PlatformTest {
|
| return ssl_info.client_cert_sent;
|
| }
|
|
|
| - scoped_ptr<ServerBoundCertService> cert_service_;
|
| ClientSocketFactory* socket_factory_;
|
| scoped_ptr<MockCertVerifier> cert_verifier_;
|
| scoped_ptr<TransportSecurityState> transport_security_state_;
|
| @@ -323,45 +277,6 @@ TEST_F(SSLClientSocketOpenSSLClientAuthTest, SendGoodCert) {
|
| sock_->Disconnect();
|
| EXPECT_FALSE(sock_->IsConnected());
|
| }
|
| -
|
| -// Connect to a server using channel id. It should allow the connection.
|
| -TEST_F(SSLClientSocketOpenSSLClientAuthTest, SendChannelID) {
|
| - SpawnedTestServer::SSLOptions ssl_options;
|
| -
|
| - ASSERT_TRUE(ConnectToTestServer(ssl_options));
|
| -
|
| - EnabledChannelID();
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| - ssl_config.channel_id_enabled = true;
|
| -
|
| - int rv;
|
| - ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| -
|
| - EXPECT_EQ(OK, rv);
|
| - EXPECT_TRUE(sock_->IsConnected());
|
| - EXPECT_TRUE(sock_->WasChannelIDSent());
|
| -
|
| - sock_->Disconnect();
|
| - EXPECT_FALSE(sock_->IsConnected());
|
| -}
|
| -
|
| -// Connect to a server using channel id but without sending a key. It should
|
| -// fail.
|
| -TEST_F(SSLClientSocketOpenSSLClientAuthTest, FailingChannelID) {
|
| - SpawnedTestServer::SSLOptions ssl_options;
|
| -
|
| - ASSERT_TRUE(ConnectToTestServer(ssl_options));
|
| -
|
| - EnabledFailingChannelID();
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| - ssl_config.channel_id_enabled = true;
|
| -
|
| - int rv;
|
| - ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| -
|
| - EXPECT_EQ(ERR_UNEXPECTED, rv);
|
| - EXPECT_FALSE(sock_->IsConnected());
|
| -}
|
| #endif // defined(USE_OPENSSL_CERTS)
|
|
|
| } // namespace
|
|
|