 Chromium Code Reviews
 Chromium Code Reviews Issue 2898573002:
  Refactor client cert private key handling.  (Closed)
    
  
    Issue 2898573002:
  Refactor client cert private key handling.  (Closed) 
  | OLD | NEW | 
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be | 
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. | 
| 4 | 4 | 
| 5 #import "chrome/browser/ui/cocoa/ssl_client_certificate_selector_cocoa.h" | 5 #import "chrome/browser/ui/cocoa/ssl_client_certificate_selector_cocoa.h" | 
| 6 | 6 | 
| 7 #import <SecurityInterface/SFChooseIdentityPanel.h> | 7 #import <SecurityInterface/SFChooseIdentityPanel.h> | 
| 8 | 8 | 
| 9 #include "base/bind.h" | 9 #include "base/bind.h" | 
| 10 #import "base/mac/mac_util.h" | 10 #import "base/mac/mac_util.h" | 
| 11 #include "base/macros.h" | 11 #include "base/macros.h" | 
| 12 #include "base/memory/ptr_util.h" | 12 #include "base/memory/ptr_util.h" | 
| 13 #include "chrome/browser/ssl/ssl_client_certificate_selector.h" | 13 #include "chrome/browser/ssl/ssl_client_certificate_selector.h" | 
| 14 #include "chrome/browser/ssl/ssl_client_certificate_selector_test.h" | 14 #include "chrome/browser/ssl/ssl_client_certificate_selector_test.h" | 
| 15 #include "chrome/browser/ui/browser.h" | 15 #include "chrome/browser/ui/browser.h" | 
| 16 #include "chrome/browser/ui/browser_commands.h" | 16 #include "chrome/browser/ui/browser_commands.h" | 
| 17 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 17 #include "chrome/browser/ui/tabs/tab_strip_model.h" | 
| 18 #include "components/web_modal/web_contents_modal_dialog_manager.h" | 18 #include "components/web_modal/web_contents_modal_dialog_manager.h" | 
| 19 #include "content/public/browser/client_certificate_delegate.h" | 19 #include "content/public/browser/client_certificate_delegate.h" | 
| 20 #include "content/public/browser/web_contents.h" | 20 #include "content/public/browser/web_contents.h" | 
| 21 #include "content/public/test/test_utils.h" | 21 #include "content/public/test/test_utils.h" | 
| 22 #include "net/cert/x509_certificate.h" | 22 #include "net/cert/x509_certificate.h" | 
| 23 #include "net/ssl/client_cert_identity_mac.h" | |
| 24 #include "net/ssl/ssl_private_key_test_util.h" | |
| 23 #include "net/test/cert_test_util.h" | 25 #include "net/test/cert_test_util.h" | 
| 26 #include "net/test/keychain_test_util_mac.h" | |
| 24 #include "net/test/test_data_directory.h" | 27 #include "net/test/test_data_directory.h" | 
| 25 #import "testing/gtest_mac.h" | 28 #import "testing/gtest_mac.h" | 
| 26 #include "ui/base/cocoa/window_size_constants.h" | 29 #include "ui/base/cocoa/window_size_constants.h" | 
| 27 | 30 | 
| 28 using web_modal::WebContentsModalDialogManager; | 31 using web_modal::WebContentsModalDialogManager; | 
| 29 | 32 | 
| 33 @interface SFChooseIdentityPanel (SystemPrivate) | |
| 34 // A system-private interface that dismisses a panel whose sheet was started by | |
| 35 // -beginSheetForWindow:modalDelegate:didEndSelector:contextInfo:identities:mess age: | |
| 36 // as though the user clicked the button identified by returnCode. Verified | |
| 37 // present in 10.5 through 10.8. | |
| 38 - (void)_dismissWithCode:(NSInteger)code; | |
| 39 @end | |
| 40 | |
| 30 namespace { | 41 namespace { | 
| 31 | 42 | 
| 43 struct TestClientCertificateDelegateResults { | |
| 44 bool destroyed = false; | |
| 45 bool continue_with_certificate_called = false; | |
| 46 scoped_refptr<net::X509Certificate> cert; | |
| 47 scoped_refptr<net::SSLPrivateKey> key; | |
| 48 }; | |
| 49 | |
| 32 class TestClientCertificateDelegate | 50 class TestClientCertificateDelegate | 
| 33 : public content::ClientCertificateDelegate { | 51 : public content::ClientCertificateDelegate { | 
| 34 public: | 52 public: | 
| 35 // Creates a ClientCertificateDelegate that sets |*destroyed| to true on | 53 // Creates a ClientCertificateDelegate that sets |*destroyed| to true on | 
| 36 // destruction. | 54 // destruction. | 
| 37 explicit TestClientCertificateDelegate(bool* destroyed) | 55 explicit TestClientCertificateDelegate( | 
| 38 : destroyed_(destroyed) {} | 56 TestClientCertificateDelegateResults* results) | 
| 57 : results_(results) {} | |
| 39 | 58 | 
| 40 ~TestClientCertificateDelegate() override { | 59 ~TestClientCertificateDelegate() override { results_->destroyed = true; } | 
| 41 if (destroyed_ != nullptr) | |
| 42 *destroyed_ = true; | |
| 43 } | |
| 44 | 60 | 
| 45 // content::ClientCertificateDelegate. | 61 // content::ClientCertificateDelegate. | 
| 46 void ContinueWithCertificate(net::X509Certificate* cert) override { | 62 void ContinueWithCertificate(scoped_refptr<net::X509Certificate> cert, | 
| 47 // TODO(davidben): Add a test which explicitly tests selecting a | 63 scoped_refptr<net::SSLPrivateKey> key) override { | 
| 48 // certificate, or selecting no certificate, since closing the dialog | 64 EXPECT_FALSE(results_->continue_with_certificate_called); | 
| 49 // (normally by closing the tab) is not the same as explicitly selecting no | 65 results_->cert = cert; | 
| 50 // certificate. | 66 results_->key = key; | 
| 51 ADD_FAILURE() << "Certificate selected"; | 67 results_->continue_with_certificate_called = true; | 
| 68 // TODO(mattm): Add a test of selecting the 2nd certificate (if possible). | |
| 52 } | 69 } | 
| 53 | 70 | 
| 54 private: | 71 private: | 
| 55 bool* destroyed_; | 72 TestClientCertificateDelegateResults* results_; | 
| 56 | 73 | 
| 57 DISALLOW_COPY_AND_ASSIGN(TestClientCertificateDelegate); | 74 DISALLOW_COPY_AND_ASSIGN(TestClientCertificateDelegate); | 
| 58 }; | 75 }; | 
| 59 | 76 | 
| 60 } // namespace | 77 } // namespace | 
| 61 | 78 | 
| 62 class SSLClientCertificateSelectorCocoaTest | 79 class SSLClientCertificateSelectorCocoaTest | 
| 63 : public SSLClientCertificateSelectorTestBase { | 80 : public SSLClientCertificateSelectorTestBase { | 
| 64 public: | 81 public: | 
| 65 ~SSLClientCertificateSelectorCocoaTest() override; | 82 ~SSLClientCertificateSelectorCocoaTest() override; | 
| 66 | 83 | 
| 67 // InProcessBrowserTest: | 84 // InProcessBrowserTest: | 
| 68 void SetUpInProcessBrowserTestFixture() override; | 85 void SetUpInProcessBrowserTestFixture() override; | 
| 69 | 86 | 
| 70 net::CertificateList GetTestCertificateList(); | 87 net::ClientCertIdentityList GetTestCertificateList(); | 
| 71 | 88 | 
| 72 private: | 89 protected: | 
| 73 scoped_refptr<net::X509Certificate> mit_davidben_cert_; | 90 scoped_refptr<net::X509Certificate> client_cert1_; | 
| 74 scoped_refptr<net::X509Certificate> foaf_me_chromium_test_cert_; | 91 scoped_refptr<net::X509Certificate> client_cert2_; | 
| 75 net::CertificateList client_cert_list_; | 92 std::string pkcs8_key1_; | 
| 93 std::string pkcs8_key2_; | |
| 94 net::ScopedTestKeychain scoped_keychain_; | |
| 95 base::ScopedCFTypeRef<SecIdentityRef> sec_identity1_; | |
| 96 base::ScopedCFTypeRef<SecIdentityRef> sec_identity2_; | |
| 76 }; | 97 }; | 
| 77 | 98 | 
| 78 SSLClientCertificateSelectorCocoaTest:: | 99 SSLClientCertificateSelectorCocoaTest:: | 
| 79 ~SSLClientCertificateSelectorCocoaTest() = default; | 100 ~SSLClientCertificateSelectorCocoaTest() = default; | 
| 80 | 101 | 
| 81 void SSLClientCertificateSelectorCocoaTest::SetUpInProcessBrowserTestFixture() { | 102 void SSLClientCertificateSelectorCocoaTest::SetUpInProcessBrowserTestFixture() { | 
| 82 SSLClientCertificateSelectorTestBase::SetUpInProcessBrowserTestFixture(); | 103 SSLClientCertificateSelectorTestBase::SetUpInProcessBrowserTestFixture(); | 
| 83 | 104 | 
| 84 base::FilePath certs_dir = net::GetTestCertsDirectory(); | 105 base::FilePath certs_dir = net::GetTestCertsDirectory(); | 
| 85 | 106 | 
| 86 mit_davidben_cert_ = net::ImportCertFromFile(certs_dir, "mit.davidben.der"); | 107 client_cert1_ = net::ImportCertFromFile(certs_dir, "client_1.pem"); | 
| 
davidben
2017/06/07 23:06:16
...that's still in there? Hah.
 
mattm
2017/06/08 21:47:55
yep, still hanging on. Looks like 3 more refs beyo
 | |
| 87 ASSERT_TRUE(mit_davidben_cert_.get()); | 108 ASSERT_TRUE(client_cert1_); | 
| 109 client_cert2_ = net::ImportCertFromFile(certs_dir, "client_2.pem"); | |
| 110 ASSERT_TRUE(client_cert2_); | |
| 88 | 111 | 
| 89 foaf_me_chromium_test_cert_ = | 112 ASSERT_TRUE(base::ReadFileToString(certs_dir.AppendASCII("client_1.pk8"), | 
| 90 net::ImportCertFromFile(certs_dir, "foaf.me.chromium-test-cert.der"); | 113 &pkcs8_key1_)); | 
| 91 ASSERT_TRUE(foaf_me_chromium_test_cert_.get()); | 114 ASSERT_TRUE(base::ReadFileToString(certs_dir.AppendASCII("client_2.pk8"), | 
| 115 &pkcs8_key2_)); | |
| 92 | 116 | 
| 93 client_cert_list_.push_back(mit_davidben_cert_); | 117 ASSERT_TRUE(scoped_keychain_.Initialize()); | 
| 94 client_cert_list_.push_back(foaf_me_chromium_test_cert_); | 118 | 
| 119 sec_identity1_ = net::ImportCertAndKeyToKeychain( | |
| 120 client_cert1_.get(), pkcs8_key1_, scoped_keychain_.keychain()); | |
| 121 ASSERT_TRUE(sec_identity1_); | |
| 122 sec_identity2_ = net::ImportCertAndKeyToKeychain( | |
| 123 client_cert2_.get(), pkcs8_key2_, scoped_keychain_.keychain()); | |
| 124 ASSERT_TRUE(sec_identity2_); | |
| 95 } | 125 } | 
| 96 | 126 | 
| 97 net::CertificateList | 127 net::ClientCertIdentityList | 
| 98 SSLClientCertificateSelectorCocoaTest::GetTestCertificateList() { | 128 SSLClientCertificateSelectorCocoaTest::GetTestCertificateList() { | 
| 99 return client_cert_list_; | 129 net::ClientCertIdentityList client_cert_list; | 
| 130 client_cert_list.push_back(base::MakeUnique<net::ClientCertIdentityMac>( | |
| 131 client_cert1_, base::ScopedCFTypeRef<SecIdentityRef>(sec_identity1_))); | |
| 132 client_cert_list.push_back(base::MakeUnique<net::ClientCertIdentityMac>( | |
| 133 client_cert2_, base::ScopedCFTypeRef<SecIdentityRef>(sec_identity2_))); | |
| 134 return client_cert_list; | |
| 
davidben
2017/06/07 23:06:16
Nit: Does return {base::MakeUnique<...>(...), base
 
mattm
2017/06/08 21:47:55
Unfortunately not, I did try that but afaict initi
 | |
| 100 } | 135 } | 
| 101 | 136 | 
| 102 // Flaky on 10.7; crbug.com/313243 | 137 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, Basic) { | 
| 103 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, DISABLED_Basic) { | |
| 104 // TODO(kbr): re-enable: http://crbug.com/222296 | |
| 105 return; | |
| 106 | |
| 107 content::WebContents* web_contents = | 138 content::WebContents* web_contents = | 
| 108 browser()->tab_strip_model()->GetActiveWebContents(); | 139 browser()->tab_strip_model()->GetActiveWebContents(); | 
| 109 WebContentsModalDialogManager* web_contents_modal_dialog_manager = | 140 WebContentsModalDialogManager* web_contents_modal_dialog_manager = | 
| 110 WebContentsModalDialogManager::FromWebContents(web_contents); | 141 WebContentsModalDialogManager::FromWebContents(web_contents); | 
| 111 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | 142 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | 
| 112 | 143 | 
| 113 bool destroyed = false; | 144 TestClientCertificateDelegateResults results; | 
| 114 SSLClientCertificateSelectorCocoa* selector = [ | 145 SSLClientCertificateSelectorCocoa* selector = [ | 
| 115 [SSLClientCertificateSelectorCocoa alloc] | 146 [SSLClientCertificateSelectorCocoa alloc] | 
| 116 initWithBrowserContext:web_contents->GetBrowserContext() | 147 initWithBrowserContext:web_contents->GetBrowserContext() | 
| 117 certRequestInfo:auth_requestor_->cert_request_info_.get() | 148 certRequestInfo:auth_requestor_->cert_request_info_.get() | 
| 118 delegate:base::WrapUnique(new TestClientCertificateDelegate( | 149 delegate:base::WrapUnique( | 
| 119 &destroyed))]; | 150 new TestClientCertificateDelegate(&results))]; | 
| 120 [selector displayForWebContents:web_contents | 151 [selector displayForWebContents:web_contents | 
| 121 clientCerts:GetTestCertificateList()]; | 152 clientCerts:GetTestCertificateList()]; | 
| 122 content::RunAllPendingInMessageLoop(); | 153 content::RunAllPendingInMessageLoop(); | 
| 123 EXPECT_TRUE([selector panel]); | 154 EXPECT_TRUE([selector panel]); | 
| 124 EXPECT_TRUE(web_contents_modal_dialog_manager->IsDialogActive()); | 155 EXPECT_TRUE(web_contents_modal_dialog_manager->IsDialogActive()); | 
| 125 | 156 | 
| 126 WebContentsModalDialogManager::TestApi test_api( | 157 WebContentsModalDialogManager::TestApi test_api( | 
| 127 web_contents_modal_dialog_manager); | 158 web_contents_modal_dialog_manager); | 
| 128 test_api.CloseAllDialogs(); | 159 test_api.CloseAllDialogs(); | 
| 129 content::RunAllPendingInMessageLoop(); | 160 content::RunAllPendingInMessageLoop(); | 
| 130 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | 161 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | 
| 131 | 162 | 
| 132 EXPECT_TRUE(destroyed); | 163 EXPECT_TRUE(results.destroyed); | 
| 164 EXPECT_FALSE(results.continue_with_certificate_called); | |
| 165 } | |
| 166 | |
| 167 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, Cancel) { | |
| 168 content::WebContents* web_contents = | |
| 169 browser()->tab_strip_model()->GetActiveWebContents(); | |
| 170 WebContentsModalDialogManager* web_contents_modal_dialog_manager = | |
| 171 WebContentsModalDialogManager::FromWebContents(web_contents); | |
| 172 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 173 | |
| 174 TestClientCertificateDelegateResults results; | |
| 175 SSLClientCertificateSelectorCocoa* selector = [ | |
| 176 [SSLClientCertificateSelectorCocoa alloc] | |
| 177 initWithBrowserContext:web_contents->GetBrowserContext() | |
| 178 certRequestInfo:auth_requestor_->cert_request_info_.get() | |
| 179 delegate:base::WrapUnique( | |
| 180 new TestClientCertificateDelegate(&results))]; | |
| 181 [selector displayForWebContents:web_contents | |
| 182 clientCerts:GetTestCertificateList()]; | |
| 183 content::RunAllPendingInMessageLoop(); | |
| 184 EXPECT_TRUE([selector panel]); | |
| 185 EXPECT_TRUE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 186 | |
| 187 // Cancel the selector. Dunno if there is a better way to do this. | |
| 188 [[selector panel] _dismissWithCode:NSFileHandlingPanelCancelButton]; | |
| 189 content::RunAllPendingInMessageLoop(); | |
| 190 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 191 | |
| 192 // ContinueWithCertificate(nullptr, nullptr) should have been called. | |
| 193 EXPECT_TRUE(results.destroyed); | |
| 194 EXPECT_TRUE(results.continue_with_certificate_called); | |
| 195 EXPECT_FALSE(results.cert); | |
| 196 EXPECT_FALSE(results.key); | |
| 197 } | |
| 198 | |
| 199 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, Accept) { | |
| 200 content::WebContents* web_contents = | |
| 201 browser()->tab_strip_model()->GetActiveWebContents(); | |
| 202 WebContentsModalDialogManager* web_contents_modal_dialog_manager = | |
| 203 WebContentsModalDialogManager::FromWebContents(web_contents); | |
| 204 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 205 | |
| 206 TestClientCertificateDelegateResults results; | |
| 207 SSLClientCertificateSelectorCocoa* selector = [ | |
| 208 [SSLClientCertificateSelectorCocoa alloc] | |
| 209 initWithBrowserContext:web_contents->GetBrowserContext() | |
| 210 certRequestInfo:auth_requestor_->cert_request_info_.get() | |
| 211 delegate:base::WrapUnique( | |
| 212 new TestClientCertificateDelegate(&results))]; | |
| 213 [selector displayForWebContents:web_contents | |
| 214 clientCerts:GetTestCertificateList()]; | |
| 215 content::RunAllPendingInMessageLoop(); | |
| 216 EXPECT_TRUE([selector panel]); | |
| 217 EXPECT_TRUE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 218 | |
| 219 // Accept the selection. Dunno if there is a better way to do this. | |
| 220 [[selector panel] _dismissWithCode:NSFileHandlingPanelOKButton]; | |
| 221 content::RunAllPendingInMessageLoop(); | |
| 222 EXPECT_FALSE(web_contents_modal_dialog_manager->IsDialogActive()); | |
| 223 | |
| 224 // The first cert in the list should have been selected. | |
| 225 EXPECT_TRUE(results.destroyed); | |
| 226 EXPECT_TRUE(results.continue_with_certificate_called); | |
| 227 EXPECT_EQ(client_cert1_, results.cert); | |
| 228 ASSERT_TRUE(results.key); | |
| 229 | |
| 230 // All Mac keys are expected to have the same hash preferences. | |
| 231 std::vector<net::SSLPrivateKey::Hash> expected_hashes = { | |
| 232 net::SSLPrivateKey::Hash::SHA512, net::SSLPrivateKey::Hash::SHA384, | |
| 233 net::SSLPrivateKey::Hash::SHA256, net::SSLPrivateKey::Hash::SHA1, | |
| 234 }; | |
| 235 EXPECT_EQ(expected_hashes, results.key->GetDigestPreferences()); | |
| 236 | |
| 237 TestSSLPrivateKeyMatches(results.key.get(), pkcs8_key1_); | |
| 133 } | 238 } | 
| 134 | 239 | 
| 135 // Test that switching to another tab correctly hides the sheet. | 240 // Test that switching to another tab correctly hides the sheet. | 
| 136 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, HideShow) { | 241 IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorCocoaTest, HideShow) { | 
| 137 content::WebContents* web_contents = | 242 content::WebContents* web_contents = | 
| 138 browser()->tab_strip_model()->GetActiveWebContents(); | 243 browser()->tab_strip_model()->GetActiveWebContents(); | 
| 244 TestClientCertificateDelegateResults results; | |
| 139 SSLClientCertificateSelectorCocoa* selector = [ | 245 SSLClientCertificateSelectorCocoa* selector = [ | 
| 140 [SSLClientCertificateSelectorCocoa alloc] | 246 [SSLClientCertificateSelectorCocoa alloc] | 
| 141 initWithBrowserContext:web_contents->GetBrowserContext() | 247 initWithBrowserContext:web_contents->GetBrowserContext() | 
| 142 certRequestInfo:auth_requestor_->cert_request_info_.get() | 248 certRequestInfo:auth_requestor_->cert_request_info_.get() | 
| 143 delegate:base::WrapUnique( | 249 delegate:base::WrapUnique( | 
| 144 new TestClientCertificateDelegate(nullptr))]; | 250 new TestClientCertificateDelegate(&results))]; | 
| 145 [selector displayForWebContents:web_contents | 251 [selector displayForWebContents:web_contents | 
| 146 clientCerts:GetTestCertificateList()]; | 252 clientCerts:GetTestCertificateList()]; | 
| 147 content::RunAllPendingInMessageLoop(); | 253 content::RunAllPendingInMessageLoop(); | 
| 148 | 254 | 
| 149 NSWindow* sheetWindow = [[selector overlayWindow] attachedSheet]; | 255 NSWindow* sheetWindow = [[selector overlayWindow] attachedSheet]; | 
| 150 EXPECT_EQ(1.0, [sheetWindow alphaValue]); | 256 EXPECT_EQ(1.0, [sheetWindow alphaValue]); | 
| 151 | 257 | 
| 152 // Switch to another tab and verify that the sheet is hidden. Interaction with | 258 // Switch to another tab and verify that the sheet is hidden. Interaction with | 
| 153 // the tab underneath should not be blocked. | 259 // the tab underneath should not be blocked. | 
| 154 AddBlankTabAndShow(browser()); | 260 AddBlankTabAndShow(browser()); | 
| 155 EXPECT_EQ(0.0, [sheetWindow alphaValue]); | 261 EXPECT_EQ(0.0, [sheetWindow alphaValue]); | 
| 156 EXPECT_TRUE([[selector overlayWindow] ignoresMouseEvents]); | 262 EXPECT_TRUE([[selector overlayWindow] ignoresMouseEvents]); | 
| 157 | 263 | 
| 158 // Switch back and verify that the sheet is shown. Interaction with the tab | 264 // Switch back and verify that the sheet is shown. Interaction with the tab | 
| 159 // underneath should be blocked while the sheet is showing. | 265 // underneath should be blocked while the sheet is showing. | 
| 160 chrome::SelectNumberedTab(browser(), 0); | 266 chrome::SelectNumberedTab(browser(), 0); | 
| 161 EXPECT_EQ(1.0, [sheetWindow alphaValue]); | 267 EXPECT_EQ(1.0, [sheetWindow alphaValue]); | 
| 162 EXPECT_FALSE([[selector overlayWindow] ignoresMouseEvents]); | 268 EXPECT_FALSE([[selector overlayWindow] ignoresMouseEvents]); | 
| 269 | |
| 270 EXPECT_FALSE(results.destroyed); | |
| 271 EXPECT_FALSE(results.continue_with_certificate_called); | |
| 163 } | 272 } | 
| 164 | 273 | 
| 165 @interface DeallocTrackingSSLClientCertificateSelectorCocoa | 274 @interface DeallocTrackingSSLClientCertificateSelectorCocoa | 
| 166 : SSLClientCertificateSelectorCocoa | 275 : SSLClientCertificateSelectorCocoa | 
| 167 @property(nonatomic) BOOL* wasDeallocated; | 276 @property(nonatomic) BOOL* wasDeallocated; | 
| 168 @end | 277 @end | 
| 169 | 278 | 
| 170 @implementation DeallocTrackingSSLClientCertificateSelectorCocoa | 279 @implementation DeallocTrackingSSLClientCertificateSelectorCocoa | 
| 171 @synthesize wasDeallocated = wasDeallocated_; | 280 @synthesize wasDeallocated = wasDeallocated_; | 
| 172 | 281 | 
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 209 userInfo:@{ | 318 userInfo:@{ | 
| 210 @"NSScrollerStyle" : @(NSScrollerStyleLegacy) | 319 @"NSScrollerStyle" : @(NSScrollerStyleLegacy) | 
| 211 }]; | 320 }]; | 
| 212 [[NSNotificationCenter defaultCenter] | 321 [[NSNotificationCenter defaultCenter] | 
| 213 postNotificationName:NSPreferredScrollerStyleDidChangeNotification | 322 postNotificationName:NSPreferredScrollerStyleDidChangeNotification | 
| 214 object:nil | 323 object:nil | 
| 215 userInfo:@{ | 324 userInfo:@{ | 
| 216 @"NSScrollerStyle" : @(NSScrollerStyleOverlay) | 325 @"NSScrollerStyle" : @(NSScrollerStyleOverlay) | 
| 217 }]; | 326 }]; | 
| 218 } | 327 } | 
| OLD | NEW |