Chromium Code Reviews| Index: net/http/transport_security_state_unittest.cc |
| diff --git a/net/http/transport_security_state_unittest.cc b/net/http/transport_security_state_unittest.cc |
| index 2b16f21421459fd31b7275de4a373af2262df10e..f7a79c75c51d0393976142082a82df4d93919945 100644 |
| --- a/net/http/transport_security_state_unittest.cc |
| +++ b/net/http/transport_security_state_unittest.cc |
| @@ -1432,10 +1432,10 @@ TEST_F(TransportSecurityStateTest, HPKPReporting) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| HashValueVector good_hashes, bad_hashes; |
| @@ -1540,10 +1540,10 @@ TEST_F(TransportSecurityStateTest, UMAOnHPKPReportingFailure) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| HashValueVector good_hashes, bad_hashes; |
| @@ -1583,10 +1583,10 @@ TEST_F(TransportSecurityStateTest, HPKPReportOnly) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| TransportSecurityState state; |
| @@ -1650,10 +1650,10 @@ TEST_F(TransportSecurityStateTest, HPKPReportOnlyOnLocalRoot) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| std::string header = |
| @@ -1687,10 +1687,10 @@ TEST_F(TransportSecurityStateTest, HPKPReportOnlyParseErrors) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| std::string header = "pin-sha256=\"" + std::string(kGoodPin1) + |
| @@ -1742,10 +1742,10 @@ TEST_F(TransportSecurityStateTest, PreloadedPKPReportUri) { |
| // contents don't matter, as long as they are not the real google.com |
| // certs in the pins. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| HashValueVector bad_hashes; |
| @@ -1790,10 +1790,10 @@ TEST_F(TransportSecurityStateTest, HPKPReportUriToSameHost) { |
| // contents don't matter, as long as they are not the real google.com |
| // certs in the pins. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| HashValueVector bad_hashes; |
| @@ -1830,10 +1830,10 @@ TEST_F(TransportSecurityStateTest, HPKPReportRateLimiting) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| HashValueVector good_hashes, bad_hashes; |
| @@ -1951,6 +1951,14 @@ TEST_F(TransportSecurityStateTest, InvalidExpectCTHeader) { |
| ssl_info.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl_info.unverified_cert = cert1; |
| + ssl_info.cert = cert2; |
|
Ryan Sleevi
2017/06/05 19:04:14
These are all just correctness fixes
|
| TransportSecurityState state; |
| TransportSecurityStateTest::EnableStaticExpectCT(&state); |
| @@ -1975,6 +1983,14 @@ TEST_F(TransportSecurityStateTest, ExpectCTNonPublicRoot) { |
| ssl_info.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS; |
| ssl_info.is_issued_by_known_root = false; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl_info.unverified_cert = cert1; |
| + ssl_info.cert = cert2; |
| TransportSecurityState state; |
| TransportSecurityStateTest::EnableStaticExpectCT(&state); |
| @@ -1997,6 +2013,14 @@ TEST_F(TransportSecurityStateTest, ExpectCTComplianceNotAvailable) { |
| ssl_info.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl_info.unverified_cert = cert1; |
| + ssl_info.cert = cert2; |
| TransportSecurityState state; |
| TransportSecurityStateTest::EnableStaticExpectCT(&state); |
| @@ -2019,6 +2043,14 @@ TEST_F(TransportSecurityStateTest, ExpectCTCompliantCert) { |
| ssl_info.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl_info.unverified_cert = cert1; |
| + ssl_info.cert = cert2; |
| TransportSecurityState state; |
| TransportSecurityStateTest::EnableStaticExpectCT(&state); |
| @@ -2042,6 +2074,14 @@ TEST_F(TransportSecurityStateTest, ExpectCTNotPreloaded) { |
| ssl_info.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_DIVERSE_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl_info.unverified_cert = cert1; |
| + ssl_info.cert = cert2; |
| TransportSecurityState state; |
| TransportSecurityStateTest::EnableStaticExpectCT(&state); |
| @@ -2065,7 +2105,7 @@ TEST_F(TransportSecurityStateTest, ExpectCTReporter) { |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_DIVERSE_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| ASSERT_TRUE(cert1); |
| @@ -2106,10 +2146,10 @@ TEST_F(TransportSecurityStateTest, RepeatedExpectCTReportsForStaticExpectCT) { |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_DIVERSE_SCTS; |
| ssl_info.is_issued_by_known_root = true; |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| ssl_info.unverified_cert = cert1; |
| ssl_info.cert = cert2; |
| @@ -2428,9 +2468,11 @@ TEST_P(ExpectStapleErrorResponseTest, CheckResponseStatusSerialization) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| SSLInfo ssl_info; |
| ssl_info.cert = cert1; |
| @@ -2480,9 +2522,11 @@ TEST_P(ExpectStapleErrorCertStatusTest, CheckCertStatusSerialization) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| SSLInfo ssl_info; |
| ssl_info.cert = cert1; |
| @@ -2521,9 +2565,11 @@ TEST_F(TransportSecurityStateTest, ExpectStapleDoesNotReportValidStaple) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| SSLInfo ssl_info; |
| ssl_info.cert = cert1; |
| @@ -2555,9 +2601,11 @@ TEST_F(TransportSecurityStateTest, ExpectStapleRequiresPreload) { |
| // Two dummy certs to use as the server-sent and validated chains. The |
| // contents don't matter. |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| SSLInfo ssl_info; |
| ssl_info.cert = cert1; |
| @@ -2908,12 +2956,14 @@ TEST_F(TransportSecurityStateTest, DynamicExpectCTDeduping) { |
| ssl.ct_compliance_details_available = true; |
| ssl.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
| + |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| + |
| SignedCertificateTimestampAndStatusList sct_list; |
| base::test::ScopedFeatureList feature_list; |
| @@ -3075,6 +3125,15 @@ TEST_F(TransportSecurityStateTest, DynamicExpectCTNoComplianceDetails) { |
| ssl.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS; |
| + scoped_refptr<X509Certificate> cert1 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| + scoped_refptr<X509Certificate> cert2 = |
| + ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| + ASSERT_TRUE(cert2); |
| + ssl.unverified_cert = cert1; |
| + ssl.cert = cert2; |
| + |
| base::test::ScopedFeatureList feature_list; |
| feature_list.InitAndEnableFeature( |
| TransportSecurityState::kDynamicExpectCTFeature); |
| @@ -3097,14 +3156,16 @@ TEST_F(TransportSecurityStateTest, |
| ssl.ct_compliance_details_available = true; |
| ssl.ct_cert_policy_compliance = |
| ct::CertPolicyCompliance::CERT_POLICY_NOT_ENOUGH_SCTS; |
| + |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| ssl.unverified_cert = cert1; |
| ssl.cert = cert2; |
| + |
| MakeTestSCTAndStatus(ct::SignedCertificateTimestamp::SCT_EMBEDDED, "test_log", |
| std::string(), std::string(), base::Time::Now(), |
| ct::SCT_STATUS_INVALID_SIGNATURE, |
| @@ -3137,10 +3198,10 @@ TEST_F(TransportSecurityStateTest, CheckCTRequirementsWithExpectCT) { |
| const base::Time current_time(base::Time::Now()); |
| const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| SignedCertificateTimestampAndStatusList sct_list; |
| MakeTestSCTAndStatus(ct::SignedCertificateTimestamp::SCT_EMBEDDED, "test_log", |
| @@ -3266,10 +3327,10 @@ TEST_F(TransportSecurityStateTest, CheckCTRequirementsWithExpectCTAndDelegate) { |
| const base::Time current_time(base::Time::Now()); |
| const base::Time expiry = current_time + base::TimeDelta::FromSeconds(1000); |
| scoped_refptr<X509Certificate> cert1 = |
| - ImportCertFromFile(GetTestCertsDirectory(), "test_mail_google_com.pem"); |
| + ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"); |
| + ASSERT_TRUE(cert1); |
| scoped_refptr<X509Certificate> cert2 = |
| ImportCertFromFile(GetTestCertsDirectory(), "expired_cert.pem"); |
| - ASSERT_TRUE(cert1); |
| ASSERT_TRUE(cert2); |
| SignedCertificateTimestampAndStatusList sct_list; |
| MakeTestSCTAndStatus(ct::SignedCertificateTimestamp::SCT_EMBEDDED, "test_log", |