OLD | NEW |
1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/ssl/ssl_config.h" | 5 #include "net/ssl/ssl_config.h" |
6 | 6 |
7 #include "net/cert/cert_verifier.h" | 7 #include "net/cert/cert_verifier.h" |
8 #include "testing/gtest/include/gtest/gtest.h" | 8 #include "testing/gtest/include/gtest/gtest.h" |
9 | 9 |
10 namespace net { | 10 namespace net { |
11 | 11 |
12 namespace { | 12 namespace { |
13 | 13 |
14 void CheckCertVerifyFlags(SSLConfig& ssl_config, | 14 void CheckCertVerifyFlags(SSLConfig* ssl_config, |
15 bool rev_checking_enabled, | 15 bool rev_checking_enabled, |
16 bool verify_ev_cert, | 16 bool verify_ev_cert, |
17 bool cert_io_enabled, | 17 bool cert_io_enabled, |
18 bool rev_checking_required_local_anchors) { | 18 bool rev_checking_required_local_anchors) { |
19 ssl_config.rev_checking_enabled = rev_checking_enabled; | 19 ssl_config->rev_checking_enabled = rev_checking_enabled; |
20 ssl_config.verify_ev_cert = verify_ev_cert; | 20 ssl_config->verify_ev_cert = verify_ev_cert; |
21 ssl_config.cert_io_enabled = cert_io_enabled; | 21 ssl_config->cert_io_enabled = cert_io_enabled; |
22 ssl_config.rev_checking_required_local_anchors = | 22 ssl_config->rev_checking_required_local_anchors = |
23 rev_checking_required_local_anchors; | 23 rev_checking_required_local_anchors; |
24 int flags = ssl_config.GetCertVerifyFlags(); | 24 int flags = ssl_config->GetCertVerifyFlags(); |
25 if (rev_checking_enabled) | 25 if (rev_checking_enabled) |
26 EXPECT_TRUE(flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED); | 26 EXPECT_TRUE(flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED); |
27 else | 27 else |
28 EXPECT_FALSE(flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED); | 28 EXPECT_FALSE(flags & CertVerifier::VERIFY_REV_CHECKING_ENABLED); |
29 if (verify_ev_cert) | 29 if (verify_ev_cert) |
30 EXPECT_TRUE(flags & CertVerifier::VERIFY_EV_CERT); | 30 EXPECT_TRUE(flags & CertVerifier::VERIFY_EV_CERT); |
31 else | 31 else |
32 EXPECT_FALSE(flags & CertVerifier::VERIFY_EV_CERT); | 32 EXPECT_FALSE(flags & CertVerifier::VERIFY_EV_CERT); |
33 if (cert_io_enabled) | 33 if (cert_io_enabled) |
34 EXPECT_TRUE(flags & CertVerifier::VERIFY_CERT_IO_ENABLED); | 34 EXPECT_TRUE(flags & CertVerifier::VERIFY_CERT_IO_ENABLED); |
35 else | 35 else |
36 EXPECT_FALSE(flags & CertVerifier::VERIFY_CERT_IO_ENABLED); | 36 EXPECT_FALSE(flags & CertVerifier::VERIFY_CERT_IO_ENABLED); |
37 if (rev_checking_required_local_anchors) { | 37 if (rev_checking_required_local_anchors) { |
38 EXPECT_TRUE(flags & | 38 EXPECT_TRUE(flags & |
39 CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS); | 39 CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS); |
40 } else { | 40 } else { |
41 EXPECT_FALSE(flags & | 41 EXPECT_FALSE(flags & |
42 CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS); | 42 CertVerifier::VERIFY_REV_CHECKING_REQUIRED_LOCAL_ANCHORS); |
43 } | 43 } |
44 } | 44 } |
45 | 45 |
46 } // namespace | 46 } // namespace |
47 | 47 |
48 TEST(SSLConfigTest, GetCertVerifyFlags) { | 48 TEST(SSLConfigTest, GetCertVerifyFlags) { |
49 SSLConfig ssl_config; | 49 SSLConfig ssl_config; |
50 CheckCertVerifyFlags(ssl_config, | 50 CheckCertVerifyFlags(&ssl_config, |
51 /*rev_checking_enabled=*/true, | 51 /*rev_checking_enabled=*/true, |
52 /*verify_ev_cert=*/true, | 52 /*verify_ev_cert=*/true, |
53 /*cert_io_enabled=*/true, | 53 /*cert_io_enabled=*/true, |
54 /*rev_checking_required_local_anchors=*/true); | 54 /*rev_checking_required_local_anchors=*/true); |
55 | 55 |
56 CheckCertVerifyFlags(ssl_config, | 56 CheckCertVerifyFlags(&ssl_config, |
57 /*rev_checking_enabled=*/false, | 57 /*rev_checking_enabled=*/false, |
58 /*verify_ev_cert=*/false, | 58 /*verify_ev_cert=*/false, |
59 /*cert_io_enabled=*/false, | 59 /*cert_io_enabled=*/false, |
60 /*rev_checking_required_local_anchors=*/false); | 60 /*rev_checking_required_local_anchors=*/false); |
61 | 61 |
62 CheckCertVerifyFlags(ssl_config, | 62 CheckCertVerifyFlags(&ssl_config, |
63 /*rev_checking_enabled=*/true, | 63 /*rev_checking_enabled=*/true, |
64 /*verify_ev_cert=*/false, | 64 /*verify_ev_cert=*/false, |
65 /*cert_io_enabled=*/false, | 65 /*cert_io_enabled=*/false, |
66 /*rev_checking_required_local_anchors=*/false); | 66 /*rev_checking_required_local_anchors=*/false); |
67 | 67 |
68 CheckCertVerifyFlags(ssl_config, | 68 CheckCertVerifyFlags(&ssl_config, |
69 /*rev_checking_enabled=*/false, | 69 /*rev_checking_enabled=*/false, |
70 /*verify_ev_cert=*/true, | 70 /*verify_ev_cert=*/true, |
71 /*cert_io_enabled=*/false, | 71 /*cert_io_enabled=*/false, |
72 /*rev_checking_required_local_anchors=*/false); | 72 /*rev_checking_required_local_anchors=*/false); |
73 | 73 |
74 CheckCertVerifyFlags(ssl_config, | 74 CheckCertVerifyFlags(&ssl_config, |
75 /*rev_checking_enabled=*/false, | 75 /*rev_checking_enabled=*/false, |
76 /*verify_ev_cert=*/false, | 76 /*verify_ev_cert=*/false, |
77 /*cert_io_enabled=*/true, | 77 /*cert_io_enabled=*/true, |
78 /*rev_checking_required_local_anchors=*/false); | 78 /*rev_checking_required_local_anchors=*/false); |
79 | 79 |
80 CheckCertVerifyFlags(ssl_config, | 80 CheckCertVerifyFlags(&ssl_config, |
81 /*rev_checking_enabled=*/false, | 81 /*rev_checking_enabled=*/false, |
82 /*verify_ev_cert=*/false, | 82 /*verify_ev_cert=*/false, |
83 /*cert_io_enabled=*/false, | 83 /*cert_io_enabled=*/false, |
84 /*rev_checking_required_local_anchors=*/true); | 84 /*rev_checking_required_local_anchors=*/true); |
85 } | 85 } |
86 | 86 |
87 } // namespace net | 87 } // namespace net |
OLD | NEW |