Index: net/ssl/client_cert_store_unittest-inl.h |
diff --git a/net/ssl/client_cert_store_unittest-inl.h b/net/ssl/client_cert_store_unittest-inl.h |
index df561f3b9abffe71a1d5919d38d923f3b81690d4..ca877a393bb6de28b33ee9221090a53de400ff08 100644 |
--- a/net/ssl/client_cert_store_unittest-inl.h |
+++ b/net/ssl/client_cert_store_unittest-inl.h |
@@ -52,7 +52,7 @@ const unsigned char kAuthorityRootDN[] = { |
// the platform implementation should implement this method: |
// bool SelectClientCerts(const CertificateList& input_certs, |
// const SSLCertRequestInfo& cert_request_info, |
-// CertificateList* selected_certs); |
+// ClientCertIdentityList* selected_identities); |
template <typename T> |
class ClientCertStoreTest : public ::testing::Test { |
public: |
@@ -62,14 +62,14 @@ class ClientCertStoreTest : public ::testing::Test { |
TYPED_TEST_CASE_P(ClientCertStoreTest); |
TYPED_TEST_P(ClientCertStoreTest, EmptyQuery) { |
- std::vector<scoped_refptr<X509Certificate> > certs; |
+ CertificateList certs; |
scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); |
- std::vector<scoped_refptr<X509Certificate> > selected_certs; |
- bool rv = this->delegate_.SelectClientCerts( |
- certs, *request.get(), &selected_certs); |
+ ClientCertIdentityList selected_identities; |
+ bool rv = this->delegate_.SelectClientCerts(certs, *request.get(), |
+ &selected_identities); |
EXPECT_TRUE(rv); |
- EXPECT_EQ(0u, selected_certs.size()); |
+ EXPECT_EQ(0u, selected_identities.size()); |
} |
// Verify that CertRequestInfo with empty |cert_authorities| matches all |
@@ -83,12 +83,12 @@ TYPED_TEST_P(ClientCertStoreTest, AllIssuersAllowed) { |
certs.push_back(cert); |
scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); |
- std::vector<scoped_refptr<X509Certificate> > selected_certs; |
- bool rv = this->delegate_.SelectClientCerts( |
- certs, *request.get(), &selected_certs); |
+ ClientCertIdentityList selected_identities; |
+ bool rv = this->delegate_.SelectClientCerts(certs, *request.get(), |
+ &selected_identities); |
EXPECT_TRUE(rv); |
- ASSERT_EQ(1u, selected_certs.size()); |
- EXPECT_TRUE(selected_certs[0]->Equals(cert.get())); |
+ ASSERT_EQ(1u, selected_identities.size()); |
+ EXPECT_TRUE(selected_identities[0]->certificate()->Equals(cert.get())); |
} |
// Verify that certificates are correctly filtered against CertRequestInfo with |
@@ -119,12 +119,12 @@ TYPED_TEST_P(ClientCertStoreTest, DISABLED_CertAuthorityFiltering) { |
scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo()); |
request->cert_authorities = authority_1; |
- std::vector<scoped_refptr<X509Certificate> > selected_certs; |
- bool rv = this->delegate_.SelectClientCerts( |
- certs, *request.get(), &selected_certs); |
+ ClientCertIdentityList selected_identities; |
+ bool rv = this->delegate_.SelectClientCerts(certs, *request.get(), |
+ &selected_identities); |
EXPECT_TRUE(rv); |
- ASSERT_EQ(1u, selected_certs.size()); |
- EXPECT_TRUE(selected_certs[0]->Equals(cert_1.get())); |
+ ASSERT_EQ(1u, selected_identities.size()); |
+ EXPECT_TRUE(selected_identities[0]->certificate()->Equals(cert_1.get())); |
} |
REGISTER_TYPED_TEST_CASE_P(ClientCertStoreTest, |