OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // This test suite uses SSLClientSocket to test the implementation of | 5 // This test suite uses SSLClientSocket to test the implementation of |
6 // SSLServerSocket. In order to establish connections between the sockets | 6 // SSLServerSocket. In order to establish connections between the sockets |
7 // we need two additional classes: | 7 // we need two additional classes: |
8 // 1. FakeSocket | 8 // 1. FakeSocket |
9 // Connects SSL socket to FakeDataChannel. This class is just a stub. | 9 // Connects SSL socket to FakeDataChannel. This class is just a stub. |
10 // | 10 // |
(...skipping 78 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
89 class MockCTPolicyEnforcer : public CTPolicyEnforcer { | 89 class MockCTPolicyEnforcer : public CTPolicyEnforcer { |
90 public: | 90 public: |
91 MockCTPolicyEnforcer() = default; | 91 MockCTPolicyEnforcer() = default; |
92 ~MockCTPolicyEnforcer() override = default; | 92 ~MockCTPolicyEnforcer() override = default; |
93 ct::CertPolicyCompliance DoesConformToCertPolicy( | 93 ct::CertPolicyCompliance DoesConformToCertPolicy( |
94 X509Certificate* cert, | 94 X509Certificate* cert, |
95 const SCTList& verified_scts, | 95 const SCTList& verified_scts, |
96 const NetLogWithSource& net_log) override { | 96 const NetLogWithSource& net_log) override { |
97 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; | 97 return ct::CertPolicyCompliance::CERT_POLICY_COMPLIES_VIA_SCTS; |
98 } | 98 } |
99 | |
100 ct::EVPolicyCompliance DoesConformToCTEVPolicy( | |
101 X509Certificate* cert, | |
102 const ct::EVCertsWhitelist* ev_whitelist, | |
103 const SCTList& verified_scts, | |
104 const NetLogWithSource& net_log) override { | |
105 return ct::EVPolicyCompliance::EV_POLICY_COMPLIES_VIA_SCTS; | |
106 } | |
107 }; | 99 }; |
108 | 100 |
109 class FakeDataChannel { | 101 class FakeDataChannel { |
110 public: | 102 public: |
111 FakeDataChannel() | 103 FakeDataChannel() |
112 : read_buf_len_(0), | 104 : read_buf_len_(0), |
113 closed_(false), | 105 closed_(false), |
114 write_called_after_close_(false), | 106 write_called_after_close_(false), |
115 weak_factory_(this) { | 107 weak_factory_(this) { |
116 } | 108 } |
(...skipping 983 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1100 int server_ret = server_socket_->Handshake(handshake_callback.callback()); | 1092 int server_ret = server_socket_->Handshake(handshake_callback.callback()); |
1101 | 1093 |
1102 client_ret = connect_callback.GetResult(client_ret); | 1094 client_ret = connect_callback.GetResult(client_ret); |
1103 server_ret = handshake_callback.GetResult(server_ret); | 1095 server_ret = handshake_callback.GetResult(server_ret); |
1104 | 1096 |
1105 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); | 1097 ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
1106 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); | 1098 ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
1107 } | 1099 } |
1108 | 1100 |
1109 } // namespace net | 1101 } // namespace net |
OLD | NEW |