Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(401)

Unified Diff: net/cert/internal/parsed_certificate_unittest.cc

Issue 2803513003: Remove ParsedCertificate::unparsed_extensions(). (Closed)
Patch Set: remove unused Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/internal/parsed_certificate.cc ('k') | net/cert/internal/verify_certificate_chain.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/internal/parsed_certificate_unittest.cc
diff --git a/net/cert/internal/parsed_certificate_unittest.cc b/net/cert/internal/parsed_certificate_unittest.cc
index 5212caab8e1aab42a1512c1d3a30adc6c2e128c8..9b3b2e4b1d3e031d375e6a647ba6b54df0b73ba7 100644
--- a/net/cert/internal/parsed_certificate_unittest.cc
+++ b/net/cert/internal/parsed_certificate_unittest.cc
@@ -68,9 +68,8 @@ TEST(ParsedCertificateTest, ExtensionCritical) {
const uint8_t kExpectedValue[] = {0x30, 0x00};
- auto it = cert->unparsed_extensions().find(DavidBenOid());
- ASSERT_NE(cert->unparsed_extensions().end(), it);
- const auto& extension = it->second;
+ ParsedExtension extension;
+ ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension));
EXPECT_TRUE(extension.critical);
EXPECT_EQ(DavidBenOid(), extension.oid);
@@ -85,9 +84,8 @@ TEST(ParsedCertificateTest, ExtensionNotCritical) {
const uint8_t kExpectedValue[] = {0x30, 0x00};
- auto it = cert->unparsed_extensions().find(DavidBenOid());
- ASSERT_NE(cert->unparsed_extensions().end(), it);
- const auto& extension = it->second;
+ ParsedExtension extension;
+ ASSERT_TRUE(cert->GetExtension(DavidBenOid(), &extension));
EXPECT_FALSE(extension.critical);
EXPECT_EQ(DavidBenOid(), extension.oid);
@@ -134,13 +132,16 @@ TEST(ParsedCertificateTest, ExtendedKeyUsage) {
ParseCertificateFromFile("extended_key_usage.pem");
ASSERT_TRUE(cert);
- const auto& extensions = cert->unparsed_extensions();
- ASSERT_EQ(3u, extensions.size());
+ ASSERT_EQ(4u, cert->extensions().size());
- auto iter = extensions.find(ExtKeyUsageOid());
- ASSERT_TRUE(iter != extensions.end());
- EXPECT_FALSE(iter->second.critical);
- EXPECT_EQ(45u, iter->second.value.Length());
+ ParsedExtension extension;
+ ASSERT_TRUE(cert->GetExtension(ExtKeyUsageOid(), &extension));
+
+ EXPECT_FALSE(extension.critical);
+ EXPECT_EQ(45u, extension.value.Length());
+
+ EXPECT_TRUE(cert->has_extended_key_usage());
+ EXPECT_EQ(4u, cert->extended_key_usage().size());
}
// Parses an Extensions that contains a key usage.
@@ -166,13 +167,16 @@ TEST(ParsedCertificateTest, Policies) {
ParseCertificateFromFile("policies.pem");
ASSERT_TRUE(cert);
- const auto& extensions = cert->unparsed_extensions();
- ASSERT_EQ(3u, extensions.size());
+ ASSERT_EQ(4u, cert->extensions().size());
+
+ ParsedExtension extension;
+ ASSERT_TRUE(cert->GetExtension(CertificatePoliciesOid(), &extension));
- auto iter = extensions.find(CertificatePoliciesOid());
- ASSERT_TRUE(iter != extensions.end());
- EXPECT_FALSE(iter->second.critical);
- EXPECT_EQ(95u, iter->second.value.Length());
+ EXPECT_FALSE(extension.critical);
+ EXPECT_EQ(95u, extension.value.Length());
+
+ EXPECT_TRUE(cert->has_policy_oids());
+ EXPECT_EQ(2u, cert->policy_oids().size());
}
// Parses an Extensions that contains a subjectaltname extension.
@@ -191,16 +195,17 @@ TEST(ParsedCertificateTest, ExtensionsReal) {
ParseCertificateFromFile("extensions_real.pem");
ASSERT_TRUE(cert);
- const auto& extensions = cert->unparsed_extensions();
- ASSERT_EQ(4u, extensions.size());
+ ASSERT_EQ(7u, cert->extensions().size());
EXPECT_TRUE(cert->has_key_usage());
EXPECT_TRUE(cert->has_basic_constraints());
+ EXPECT_TRUE(cert->has_policy_oids());
- auto iter = extensions.find(CertificatePoliciesOid());
- ASSERT_TRUE(iter != extensions.end());
- EXPECT_FALSE(iter->second.critical);
- EXPECT_EQ(16u, iter->second.value.Length());
+ ParsedExtension extension;
+ ASSERT_TRUE(cert->GetExtension(CertificatePoliciesOid(), &extension));
+
+ EXPECT_FALSE(extension.critical);
+ EXPECT_EQ(16u, extension.value.Length());
// TODO(eroman): Verify the other 4 extensions' values.
}
« no previous file with comments | « net/cert/internal/parsed_certificate.cc ('k') | net/cert/internal/verify_certificate_chain.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698