| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 // This test suite uses SSLClientSocket to test the implementation of | 5 // This test suite uses SSLClientSocket to test the implementation of |
| 6 // SSLServerSocket. In order to establish connections between the sockets | 6 // SSLServerSocket. In order to establish connections between the sockets |
| 7 // we need two additional classes: | 7 // we need two additional classes: |
| 8 // 1. FakeSocket | 8 // 1. FakeSocket |
| 9 // Connects SSL socket to FakeDataChannel. This class is just a stub. | 9 // Connects SSL socket to FakeDataChannel. This class is just a stub. |
| 10 // | 10 // |
| (...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 89 class MockCTPolicyEnforcer : public CTPolicyEnforcer { | 89 class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
| 90 public: | 90 public: |
| 91 MockCTPolicyEnforcer() = default; | 91 MockCTPolicyEnforcer() = default; |
| 92 ~MockCTPolicyEnforcer() override = default; | 92 ~MockCTPolicyEnforcer() override = default; |
| 93 ct::CertPolicyCompliance DoesConformToCertPolicy( | 93 ct::CertPolicyCompliance DoesConformToCertPolicy( |
| 94 X509Certificate* cert, | 94 X509Certificate* cert, |
| 95 const SCTList& verified_scts, | 95 const SCTList& verified_scts, |
| 96 const NetLogWithSource& net_log) override { | 96 const NetLogWithSource& net_log) override { |
| 97 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; | 97 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
| 98 } | 98 } |
| 99 | |
| 100 ct::EVPolicyCompliance DoesConformToCTEVPolicy( | |
| 101 X509Certificate* cert, | |
| 102 const ct::EVCertsWhitelist* ev_whitelist, | |
| 103 const SCTList& verified_scts, | |
| 104 const NetLogWithSource& net_log) override { | |
| 105 return ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS; | |
| 106 } | |
| 107 }; | 99 }; |
| 108 | 100 |
| 109 class FakeDataChannel { | 101 class FakeDataChannel { |
| 110 public: | 102 public: |
| 111 FakeDataChannel() | 103 FakeDataChannel() |
| 112 : read_buf_len_(0), | 104 : read_buf_len_(0), |
| 113 closed_(false), | 105 closed_(false), |
| 114 write_called_after_close_(false), | 106 write_called_after_close_(false), |
| 115 weak_factory_(this) { | 107 weak_factory_(this) { |
| 116 } | 108 } |
| (...skipping 983 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1100 int server_ret = server_socket_->Handshake(handshake_callback.callback()); | 1092 int server_ret = server_socket_->Handshake(handshake_callback.callback()); |
| 1101 | 1093 |
| 1102 client_ret = connect_callback.GetResult(client_ret); | 1094 client_ret = connect_callback.GetResult(client_ret); |
| 1103 server_ret = handshake_callback.GetResult(server_ret); | 1095 server_ret = handshake_callback.GetResult(server_ret); |
| 1104 | 1096 |
| 1105 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); | 1097 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
| 1106 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); | 1098 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
| 1107 } | 1099 } |
| 1108 | 1100 |
| 1109 } // namespace net | 1101 } // namespace net |
| OLD | NEW |