| Index: chrome/browser/chromeos/net/client_cert_store_chromeos_unittest.cc
|
| diff --git a/chrome/browser/chromeos/net/client_cert_store_chromeos_unittest.cc b/chrome/browser/chromeos/net/client_cert_store_chromeos_unittest.cc
|
| index 6cd545d612103c0ad9050cb037d723f39da9d53a..668d05bf60f979c47ceec04daee17e0b2849e800 100644
|
| --- a/chrome/browser/chromeos/net/client_cert_store_chromeos_unittest.cc
|
| +++ b/chrome/browser/chromeos/net/client_cert_store_chromeos_unittest.cc
|
| @@ -19,6 +19,7 @@
|
| #include "chrome/browser/chromeos/certificate_provider/certificate_provider.h"
|
| #include "crypto/scoped_test_nss_db.h"
|
| #include "net/cert/x509_certificate.h"
|
| +#include "net/ssl/client_cert_identity_test_util.h"
|
| #include "net/ssl/ssl_cert_request_info.h"
|
| #include "net/test/cert_test_util.h"
|
| #include "net/test/test_data_directory.h"
|
| @@ -74,10 +75,10 @@ class TestCertFilter : public ClientCertStoreChromeOS::CertFilter {
|
| scoped_refptr<net::X509Certificate> not_allowed_cert_;
|
| };
|
|
|
| -void SaveCertsAndQuitCallback(net::CertificateList* out_certs,
|
| - base::Closure quit_closure,
|
| - net::CertificateList in_certs) {
|
| - *out_certs = std::move(in_certs);
|
| +void SaveIdentitiesAndQuitCallback(net::ClientCertIdentityList* out_identities,
|
| + base::Closure quit_closure,
|
| + net::ClientCertIdentityList in_identities) {
|
| + *out_identities = std::move(in_identities);
|
| quit_closure.Run();
|
| }
|
|
|
| @@ -119,24 +120,24 @@ TEST_F(ClientCertStoreChromeOSTest, RequestWaitsForNSSInitAndSucceeds) {
|
| scoped_refptr<net::SSLCertRequestInfo> request_all(
|
| new net::SSLCertRequestInfo());
|
|
|
| - net::CertificateList selected_certs;
|
| + net::ClientCertIdentityList selected_identities;
|
| base::RunLoop run_loop;
|
| - store.GetClientCerts(*request_all,
|
| - base::Bind(SaveCertsAndQuitCallback, &selected_certs,
|
| - run_loop.QuitClosure()));
|
| + store.GetClientCerts(
|
| + *request_all, base::Bind(SaveIdentitiesAndQuitCallback,
|
| + &selected_identities, run_loop.QuitClosure()));
|
|
|
| {
|
| base::RunLoop run_loop_inner;
|
| run_loop_inner.RunUntilIdle();
|
| // GetClientCerts should wait for the initialization of the filter to
|
| // finish.
|
| - ASSERT_EQ(0u, selected_certs.size());
|
| + ASSERT_EQ(0u, selected_identities.size());
|
| EXPECT_TRUE(cert_filter->init_called());
|
| }
|
| cert_filter->FinishInit();
|
| run_loop.Run();
|
|
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| + ASSERT_EQ(1u, selected_identities.size());
|
| }
|
|
|
| // Ensure that cert requests, that are started after the filter was initialized,
|
| @@ -158,13 +159,13 @@ TEST_F(ClientCertStoreChromeOSTest, RequestsAfterNSSInitSucceed) {
|
| new net::SSLCertRequestInfo());
|
|
|
| base::RunLoop run_loop;
|
| - net::CertificateList selected_certs;
|
| - store.GetClientCerts(*request_all,
|
| - base::Bind(SaveCertsAndQuitCallback, &selected_certs,
|
| - run_loop.QuitClosure()));
|
| + net::ClientCertIdentityList selected_identities;
|
| + store.GetClientCerts(
|
| + *request_all, base::Bind(SaveIdentitiesAndQuitCallback,
|
| + &selected_identities, run_loop.QuitClosure()));
|
| run_loop.Run();
|
|
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| + ASSERT_EQ(1u, selected_identities.size());
|
| }
|
|
|
| TEST_F(ClientCertStoreChromeOSTest, Filter) {
|
| @@ -190,27 +191,27 @@ TEST_F(ClientCertStoreChromeOSTest, Filter) {
|
| {
|
| base::RunLoop run_loop;
|
| cert_filter->SetNotAllowedCert(cert_2);
|
| - net::CertificateList selected_certs;
|
| - store.GetClientCerts(*request_all,
|
| - base::Bind(SaveCertsAndQuitCallback, &selected_certs,
|
| - run_loop.QuitClosure()));
|
| + net::ClientCertIdentityList selected_identities;
|
| + store.GetClientCerts(
|
| + *request_all, base::Bind(SaveIdentitiesAndQuitCallback,
|
| + &selected_identities, run_loop.QuitClosure()));
|
| run_loop.Run();
|
|
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| - EXPECT_TRUE(cert_1->Equals(selected_certs[0].get()));
|
| + ASSERT_EQ(1u, selected_identities.size());
|
| + EXPECT_TRUE(cert_1->Equals(selected_identities[0]->certificate()));
|
| }
|
|
|
| {
|
| base::RunLoop run_loop;
|
| cert_filter->SetNotAllowedCert(cert_1);
|
| - net::CertificateList selected_certs;
|
| - store.GetClientCerts(*request_all,
|
| - base::Bind(SaveCertsAndQuitCallback, &selected_certs,
|
| - run_loop.QuitClosure()));
|
| + net::ClientCertIdentityList selected_identities;
|
| + store.GetClientCerts(
|
| + *request_all, base::Bind(SaveIdentitiesAndQuitCallback,
|
| + &selected_identities, run_loop.QuitClosure()));
|
| run_loop.Run();
|
|
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| - EXPECT_TRUE(cert_2->Equals(selected_certs[0].get()));
|
| + ASSERT_EQ(1u, selected_identities.size());
|
| + EXPECT_TRUE(cert_2->Equals(selected_identities[0]->certificate()));
|
| }
|
| }
|
|
|
| @@ -241,14 +242,14 @@ TEST_F(ClientCertStoreChromeOSTest, CertRequestMatching) {
|
| request->cert_authorities = authority_1;
|
|
|
| base::RunLoop run_loop;
|
| - net::CertificateList selected_certs;
|
| - store.GetClientCerts(*request,
|
| - base::Bind(SaveCertsAndQuitCallback, &selected_certs,
|
| - run_loop.QuitClosure()));
|
| + net::ClientCertIdentityList selected_identities;
|
| + store.GetClientCerts(
|
| + *request, base::Bind(SaveIdentitiesAndQuitCallback, &selected_identities,
|
| + run_loop.QuitClosure()));
|
| run_loop.Run();
|
|
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| - EXPECT_TRUE(cert_1->Equals(selected_certs[0].get()));
|
| + ASSERT_EQ(1u, selected_identities.size());
|
| + EXPECT_TRUE(cert_1->Equals(selected_identities[0]->certificate()));
|
| }
|
|
|
| } // namespace chromeos
|
|
|