Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(271)

Side by Side Diff: net/cert/ev_root_ca_metadata_unittest.cc

Issue 266243004: Clang format slam. Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Created 6 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/cert/ev_root_ca_metadata.h" 5 #include "net/cert/ev_root_ca_metadata.h"
6 6
7 #include "net/cert/x509_cert_types.h" 7 #include "net/cert/x509_cert_types.h"
8 #include "net/test/cert_test_util.h" 8 #include "net/test/cert_test_util.h"
9 #include "testing/gtest/include/gtest/gtest.h" 9 #include "testing/gtest/include/gtest/gtest.h"
10 10
11 #if defined(USE_NSS) 11 #if defined(USE_NSS)
12 #include "crypto/scoped_nss_types.h" 12 #include "crypto/scoped_nss_types.h"
13 #endif 13 #endif
14 14
15 namespace net { 15 namespace net {
16 16
17 namespace { 17 namespace {
18 18
19 #if defined(USE_NSS) || defined(OS_WIN) 19 #if defined(USE_NSS) || defined(OS_WIN)
20 const char kVerisignPolicy[] = "2.16.840.1.113733.1.7.23.6"; 20 const char kVerisignPolicy[] = "2.16.840.1.113733.1.7.23.6";
21 const char kThawtePolicy[] = "2.16.840.1.113733.1.7.48.1"; 21 const char kThawtePolicy[] = "2.16.840.1.113733.1.7.48.1";
22 const char kFakePolicy[] = "2.16.840.1.42"; 22 const char kFakePolicy[] = "2.16.840.1.42";
23 const SHA1HashValue kVerisignFingerprint = 23 const SHA1HashValue kVerisignFingerprint = {
24 { { 0x74, 0x2c, 0x31, 0x92, 0xe6, 0x07, 0xe4, 0x24, 0xeb, 0x45, 24 {0x74, 0x2c, 0x31, 0x92, 0xe6, 0x07, 0xe4, 0x24, 0xeb, 0x45, 0x49, 0x54,
25 0x49, 0x54, 0x2b, 0xe1, 0xbb, 0xc5, 0x3e, 0x61, 0x74, 0xe2 } }; 25 0x2b, 0xe1, 0xbb, 0xc5, 0x3e, 0x61, 0x74, 0xe2}};
26 const SHA1HashValue kFakeFingerprint = 26 const SHA1HashValue kFakeFingerprint = {
27 { { 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 27 {0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0x00, 0x11,
28 0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99 } }; 28 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99}};
29 29
30 class EVOidData { 30 class EVOidData {
31 public: 31 public:
32 EVOidData(); 32 EVOidData();
33 bool Init(); 33 bool Init();
34 34
35 EVRootCAMetadata::PolicyOID verisign_policy; 35 EVRootCAMetadata::PolicyOID verisign_policy;
36 EVRootCAMetadata::PolicyOID thawte_policy; 36 EVRootCAMetadata::PolicyOID thawte_policy;
37 EVRootCAMetadata::PolicyOID fake_policy; 37 EVRootCAMetadata::PolicyOID fake_policy;
38 }; 38 };
(...skipping 26 matching lines...) Expand all
65 bool EVOidData::Init() { 65 bool EVOidData::Init() {
66 crypto::ScopedPLArenaPool pool(PORT_NewArena(DER_DEFAULT_CHUNKSIZE)); 66 crypto::ScopedPLArenaPool pool(PORT_NewArena(DER_DEFAULT_CHUNKSIZE));
67 if (!pool.get()) 67 if (!pool.get())
68 return false; 68 return false;
69 69
70 verisign_policy = RegisterOID(pool.get(), kVerisignPolicy); 70 verisign_policy = RegisterOID(pool.get(), kVerisignPolicy);
71 thawte_policy = RegisterOID(pool.get(), kThawtePolicy); 71 thawte_policy = RegisterOID(pool.get(), kThawtePolicy);
72 fake_policy = RegisterOID(pool.get(), kFakePolicy); 72 fake_policy = RegisterOID(pool.get(), kFakePolicy);
73 73
74 return verisign_policy != SEC_OID_UNKNOWN && 74 return verisign_policy != SEC_OID_UNKNOWN &&
75 thawte_policy != SEC_OID_UNKNOWN && 75 thawte_policy != SEC_OID_UNKNOWN && fake_policy != SEC_OID_UNKNOWN;
76 fake_policy != SEC_OID_UNKNOWN;
77 } 76 }
78 77
79 #elif defined(OS_WIN) 78 #elif defined(OS_WIN)
80 79
81 EVOidData::EVOidData() 80 EVOidData::EVOidData()
82 : verisign_policy(kVerisignPolicy), 81 : verisign_policy(kVerisignPolicy),
83 thawte_policy(kThawtePolicy), 82 thawte_policy(kThawtePolicy),
84 fake_policy(kFakePolicy) { 83 fake_policy(kFakePolicy) {
85 } 84 }
86 85
87 bool EVOidData::Init() { 86 bool EVOidData::Init() {
88 return true; 87 return true;
89 } 88 }
90 89
91 #endif 90 #endif
92 91
93 #if defined(USE_NSS) || defined(OS_WIN) 92 #if defined(USE_NSS) || defined(OS_WIN)
94 93
95 class EVRootCAMetadataTest : public testing::Test { 94 class EVRootCAMetadataTest : public testing::Test {
96 protected: 95 protected:
97 virtual void SetUp() OVERRIDE { 96 virtual void SetUp() OVERRIDE { ASSERT_TRUE(ev_oid_data.Init()); }
98 ASSERT_TRUE(ev_oid_data.Init());
99 }
100 97
101 EVOidData ev_oid_data; 98 EVOidData ev_oid_data;
102 }; 99 };
103 100
104 TEST_F(EVRootCAMetadataTest, Basic) { 101 TEST_F(EVRootCAMetadataTest, Basic) {
105 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); 102 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance());
106 103
107 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.verisign_policy)); 104 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.verisign_policy));
108 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); 105 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy));
109 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, 106 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint,
110 ev_oid_data.verisign_policy)); 107 ev_oid_data.verisign_policy));
111 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, 108 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint,
112 ev_oid_data.verisign_policy)); 109 ev_oid_data.verisign_policy));
113 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, 110 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint,
114 ev_oid_data.fake_policy)); 111 ev_oid_data.fake_policy));
115 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint, 112 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kVerisignFingerprint,
116 ev_oid_data.thawte_policy)); 113 ev_oid_data.thawte_policy));
117 } 114 }
118 115
119 TEST_F(EVRootCAMetadataTest, AddRemove) { 116 TEST_F(EVRootCAMetadataTest, AddRemove) {
120 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance()); 117 EVRootCAMetadata* ev_metadata(EVRootCAMetadata::GetInstance());
121 118
122 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); 119 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy));
123 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, 120 EXPECT_FALSE(
124 ev_oid_data.fake_policy)); 121 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy));
125 122
126 { 123 {
127 ScopedTestEVPolicy test_ev_policy(ev_metadata, kFakeFingerprint, 124 ScopedTestEVPolicy test_ev_policy(
128 kFakePolicy); 125 ev_metadata, kFakeFingerprint, kFakePolicy);
129 126
130 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); 127 EXPECT_TRUE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy));
131 EXPECT_TRUE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, 128 EXPECT_TRUE(
132 ev_oid_data.fake_policy)); 129 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy));
133 } 130 }
134 131
135 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy)); 132 EXPECT_FALSE(ev_metadata->IsEVPolicyOID(ev_oid_data.fake_policy));
136 EXPECT_FALSE(ev_metadata->HasEVPolicyOID(kFakeFingerprint, 133 EXPECT_FALSE(
137 ev_oid_data.fake_policy)); 134 ev_metadata->HasEVPolicyOID(kFakeFingerprint, ev_oid_data.fake_policy));
138 } 135 }
139 136
140 #endif // defined(USE_NSS) || defined(OS_WIN) 137 #endif // defined(USE_NSS) || defined(OS_WIN)
141 138
142 } // namespace 139 } // namespace
143 140
144 } // namespace net 141 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698