| Index: net/ssl/channel_id_service_unittest.cc
|
| diff --git a/net/ssl/server_bound_cert_service_unittest.cc b/net/ssl/channel_id_service_unittest.cc
|
| similarity index 74%
|
| rename from net/ssl/server_bound_cert_service_unittest.cc
|
| rename to net/ssl/channel_id_service_unittest.cc
|
| index 2be073bb16c3b930dda083c631a3116970eab6b8..76e2d8463165d45d410e159dbbe363714c9e29cb 100644
|
| --- a/net/ssl/server_bound_cert_service_unittest.cc
|
| +++ b/net/ssl/channel_id_service_unittest.cc
|
| @@ -2,7 +2,7 @@
|
| // Use of this source code is governed by a BSD-style license that can be
|
| // found in the LICENSE file.
|
|
|
| -#include "net/ssl/server_bound_cert_service.h"
|
| +#include "net/ssl/channel_id_service.h"
|
|
|
| #include <string>
|
| #include <vector>
|
| @@ -17,7 +17,7 @@
|
| #include "net/base/test_completion_callback.h"
|
| #include "net/cert/asn1_util.h"
|
| #include "net/cert/x509_certificate.h"
|
| -#include "net/ssl/default_server_bound_cert_store.h"
|
| +#include "net/ssl/default_channel_id_store.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| namespace net {
|
| @@ -50,19 +50,19 @@ class FailingTaskRunner : public base::TaskRunner {
|
| DISALLOW_COPY_AND_ASSIGN(FailingTaskRunner);
|
| };
|
|
|
| -class MockServerBoundCertStoreWithAsyncGet
|
| - : public DefaultServerBoundCertStore {
|
| +class MockChannelIDStoreWithAsyncGet
|
| + : public DefaultChannelIDStore {
|
| public:
|
| - MockServerBoundCertStoreWithAsyncGet()
|
| - : DefaultServerBoundCertStore(NULL), cert_count_(0) {}
|
| + MockChannelIDStoreWithAsyncGet()
|
| + : DefaultChannelIDStore(NULL), cert_count_(0) {}
|
|
|
| - virtual int GetServerBoundCert(const std::string& server_identifier,
|
| + virtual int GetChannelID(const std::string& server_identifier,
|
| base::Time* expiration_time,
|
| std::string* private_key_result,
|
| std::string* cert_result,
|
| const GetCertCallback& callback) OVERRIDE;
|
|
|
| - virtual void SetServerBoundCert(const std::string& server_identifier,
|
| + virtual void SetChannelID(const std::string& server_identifier,
|
| base::Time creation_time,
|
| base::Time expiration_time,
|
| const std::string& private_key,
|
| @@ -72,7 +72,7 @@ class MockServerBoundCertStoreWithAsyncGet
|
|
|
| virtual int GetCertCount() OVERRIDE { return cert_count_; }
|
|
|
| - void CallGetServerBoundCertCallbackWithResult(int err,
|
| + void CallGetChannelIDCallbackWithResult(int err,
|
| base::Time expiration_time,
|
| const std::string& private_key,
|
| const std::string& cert);
|
| @@ -83,7 +83,7 @@ class MockServerBoundCertStoreWithAsyncGet
|
| int cert_count_;
|
| };
|
|
|
| -int MockServerBoundCertStoreWithAsyncGet::GetServerBoundCert(
|
| +int MockChannelIDStoreWithAsyncGet::GetChannelID(
|
| const std::string& server_identifier,
|
| base::Time* expiration_time,
|
| std::string* private_key_result,
|
| @@ -91,16 +91,16 @@ int MockServerBoundCertStoreWithAsyncGet::GetServerBoundCert(
|
| const GetCertCallback& callback) {
|
| server_identifier_ = server_identifier;
|
| callback_ = callback;
|
| - // Reset the cert count, it'll get incremented in either SetServerBoundCert or
|
| - // CallGetServerBoundCertCallbackWithResult.
|
| + // Reset the cert count, it'll get incremented in either SetChannelID or
|
| + // CallGetChannelIDCallbackWithResult.
|
| cert_count_ = 0;
|
| // Do nothing else: the results to be provided will be specified through
|
| - // CallGetServerBoundCertCallbackWithResult.
|
| + // CallGetChannelIDCallbackWithResult.
|
| return ERR_IO_PENDING;
|
| }
|
|
|
| void
|
| -MockServerBoundCertStoreWithAsyncGet::CallGetServerBoundCertCallbackWithResult(
|
| +MockChannelIDStoreWithAsyncGet::CallGetChannelIDCallbackWithResult(
|
| int err,
|
| base::Time expiration_time,
|
| const std::string& private_key,
|
| @@ -116,48 +116,48 @@ MockServerBoundCertStoreWithAsyncGet::CallGetServerBoundCertCallbackWithResult(
|
| cert));
|
| }
|
|
|
| -class ServerBoundCertServiceTest : public testing::Test {
|
| +class ChannelIDServiceTest : public testing::Test {
|
| public:
|
| - ServerBoundCertServiceTest()
|
| - : service_(new ServerBoundCertService(
|
| - new DefaultServerBoundCertStore(NULL),
|
| + ChannelIDServiceTest()
|
| + : service_(new ChannelIDService(
|
| + new DefaultChannelIDStore(NULL),
|
| base::MessageLoopProxy::current())) {
|
| }
|
|
|
| protected:
|
| - scoped_ptr<ServerBoundCertService> service_;
|
| + scoped_ptr<ChannelIDService> service_;
|
| };
|
|
|
| -TEST_F(ServerBoundCertServiceTest, GetDomainForHost) {
|
| +TEST_F(ChannelIDServiceTest, GetDomainForHost) {
|
| EXPECT_EQ("google.com",
|
| - ServerBoundCertService::GetDomainForHost("google.com"));
|
| + ChannelIDService::GetDomainForHost("google.com"));
|
| EXPECT_EQ("google.com",
|
| - ServerBoundCertService::GetDomainForHost("www.google.com"));
|
| + ChannelIDService::GetDomainForHost("www.google.com"));
|
| EXPECT_EQ("foo.appspot.com",
|
| - ServerBoundCertService::GetDomainForHost("foo.appspot.com"));
|
| + ChannelIDService::GetDomainForHost("foo.appspot.com"));
|
| EXPECT_EQ("bar.appspot.com",
|
| - ServerBoundCertService::GetDomainForHost("foo.bar.appspot.com"));
|
| + ChannelIDService::GetDomainForHost("foo.bar.appspot.com"));
|
| EXPECT_EQ("appspot.com",
|
| - ServerBoundCertService::GetDomainForHost("appspot.com"));
|
| + ChannelIDService::GetDomainForHost("appspot.com"));
|
| EXPECT_EQ("google.com",
|
| - ServerBoundCertService::GetDomainForHost("www.mail.google.com"));
|
| + ChannelIDService::GetDomainForHost("www.mail.google.com"));
|
| EXPECT_EQ("goto",
|
| - ServerBoundCertService::GetDomainForHost("goto"));
|
| + ChannelIDService::GetDomainForHost("goto"));
|
| EXPECT_EQ("127.0.0.1",
|
| - ServerBoundCertService::GetDomainForHost("127.0.0.1"));
|
| + ChannelIDService::GetDomainForHost("127.0.0.1"));
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, GetCacheMiss) {
|
| +TEST_F(ChannelIDServiceTest, GetCacheMiss) {
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Synchronous completion, because the store is initialized.
|
| std::string private_key, der_cert;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key, &der_cert, callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_FILE_NOT_FOUND, error);
|
| EXPECT_FALSE(request_handle.is_active());
|
| @@ -165,17 +165,17 @@ TEST_F(ServerBoundCertServiceTest, GetCacheMiss) {
|
| EXPECT_TRUE(der_cert.empty());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, CacheHit) {
|
| +TEST_F(ChannelIDServiceTest, CacheHit) {
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Asynchronous completion.
|
| std::string private_key_info1, der_cert1;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info1, &der_cert1,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -189,7 +189,7 @@ TEST_F(ServerBoundCertServiceTest, CacheHit) {
|
|
|
| // Synchronous completion.
|
| std::string private_key_info2, der_cert2;
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info2, &der_cert2,
|
| callback.callback(), &request_handle);
|
| EXPECT_FALSE(request_handle.is_active());
|
| @@ -200,7 +200,7 @@ TEST_F(ServerBoundCertServiceTest, CacheHit) {
|
|
|
| // Synchronous get.
|
| std::string private_key_info3, der_cert3;
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key_info3, &der_cert3, callback.callback(),
|
| &request_handle);
|
| EXPECT_FALSE(request_handle.is_active());
|
| @@ -214,15 +214,15 @@ TEST_F(ServerBoundCertServiceTest, CacheHit) {
|
| EXPECT_EQ(0u, service_->inflight_joins());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, StoreCerts) {
|
| +TEST_F(ChannelIDServiceTest, StoreCerts) {
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| std::string host1("encrypted.google.com");
|
| std::string private_key_info1, der_cert1;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host1, &private_key_info1, &der_cert1,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -233,7 +233,7 @@ TEST_F(ServerBoundCertServiceTest, StoreCerts) {
|
|
|
| std::string host2("www.verisign.com");
|
| std::string private_key_info2, der_cert2;
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host2, &private_key_info2, &der_cert2,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -244,7 +244,7 @@ TEST_F(ServerBoundCertServiceTest, StoreCerts) {
|
|
|
| std::string host3("www.twitter.com");
|
| std::string private_key_info3, der_cert3;
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host3, &private_key_info3, &der_cert3,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -262,25 +262,25 @@ TEST_F(ServerBoundCertServiceTest, StoreCerts) {
|
| }
|
|
|
| // Tests an inflight join.
|
| -TEST_F(ServerBoundCertServiceTest, InflightJoin) {
|
| +TEST_F(ChannelIDServiceTest, InflightJoin) {
|
| std::string host("encrypted.google.com");
|
| int error;
|
|
|
| std::string private_key_info1, der_cert1;
|
| TestCompletionCallback callback1;
|
| - ServerBoundCertService::RequestHandle request_handle1;
|
| + ChannelIDService::RequestHandle request_handle1;
|
|
|
| std::string private_key_info2, der_cert2;
|
| TestCompletionCallback callback2;
|
| - ServerBoundCertService::RequestHandle request_handle2;
|
| + ChannelIDService::RequestHandle request_handle2;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info1, &der_cert1,
|
| callback1.callback(), &request_handle1);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle1.is_active());
|
| // Should join with the original request.
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info2, &der_cert2,
|
| callback2.callback(), &request_handle2);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -298,26 +298,26 @@ TEST_F(ServerBoundCertServiceTest, InflightJoin) {
|
| }
|
|
|
| // Tests an inflight join of a Get request to a GetOrCreate request.
|
| -TEST_F(ServerBoundCertServiceTest, InflightJoinGetOrCreateAndGet) {
|
| +TEST_F(ChannelIDServiceTest, InflightJoinGetOrCreateAndGet) {
|
| std::string host("encrypted.google.com");
|
| int error;
|
|
|
| std::string private_key_info1, der_cert1;
|
| TestCompletionCallback callback1;
|
| - ServerBoundCertService::RequestHandle request_handle1;
|
| + ChannelIDService::RequestHandle request_handle1;
|
|
|
| std::string private_key_info2;
|
| std::string der_cert2;
|
| TestCompletionCallback callback2;
|
| - ServerBoundCertService::RequestHandle request_handle2;
|
| + ChannelIDService::RequestHandle request_handle2;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info1, &der_cert1,
|
| callback1.callback(), &request_handle1);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle1.is_active());
|
| // Should join with the original request.
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key_info2, &der_cert2, callback2.callback(),
|
| &request_handle2);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -335,14 +335,14 @@ TEST_F(ServerBoundCertServiceTest, InflightJoinGetOrCreateAndGet) {
|
| EXPECT_EQ(1u, service_->workers_created());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, ExtractValuesFromBytesEC) {
|
| +TEST_F(ChannelIDServiceTest, ExtractValuesFromBytesEC) {
|
| std::string host("encrypted.google.com");
|
| std::string private_key_info, der_cert;
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info, &der_cert, callback.callback(),
|
| &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| @@ -360,7 +360,7 @@ TEST_F(ServerBoundCertServiceTest, ExtractValuesFromBytesEC) {
|
| std::vector<uint8> key_vec(private_key_info.begin(), private_key_info.end());
|
| scoped_ptr<crypto::ECPrivateKey> private_key(
|
| crypto::ECPrivateKey::CreateFromEncryptedPrivateKeyInfo(
|
| - ServerBoundCertService::kEPKIPassword, key_vec, spki));
|
| + ChannelIDService::kEPKIPassword, key_vec, spki));
|
| EXPECT_TRUE(private_key != NULL);
|
|
|
| // Check that we can retrieve the cert from the bytes.
|
| @@ -370,13 +370,13 @@ TEST_F(ServerBoundCertServiceTest, ExtractValuesFromBytesEC) {
|
| }
|
|
|
| // Tests that the callback of a canceled request is never made.
|
| -TEST_F(ServerBoundCertServiceTest, CancelRequest) {
|
| +TEST_F(ChannelIDServiceTest, CancelRequest) {
|
| std::string host("encrypted.google.com");
|
| std::string private_key_info, der_cert;
|
| int error;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host,
|
| + error = service_->GetOrCreateChannelID(host,
|
| &private_key_info,
|
| &der_cert,
|
| base::Bind(&FailTest),
|
| @@ -386,8 +386,8 @@ TEST_F(ServerBoundCertServiceTest, CancelRequest) {
|
| request_handle.Cancel();
|
| EXPECT_FALSE(request_handle.is_active());
|
|
|
| - // Wait for reply from ServerBoundCertServiceWorker to be posted back to the
|
| - // ServerBoundCertService.
|
| + // Wait for reply from ChannelIDServiceWorker to be posted back to the
|
| + // ChannelIDService.
|
| base::MessageLoop::current()->RunUntilIdle();
|
|
|
| // Even though the original request was cancelled, the service will still
|
| @@ -396,14 +396,14 @@ TEST_F(ServerBoundCertServiceTest, CancelRequest) {
|
| }
|
|
|
| // Tests that destructing the RequestHandle cancels the request.
|
| -TEST_F(ServerBoundCertServiceTest, CancelRequestByHandleDestruction) {
|
| +TEST_F(ChannelIDServiceTest, CancelRequestByHandleDestruction) {
|
| std::string host("encrypted.google.com");
|
| std::string private_key_info, der_cert;
|
| int error;
|
| {
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host,
|
| + error = service_->GetOrCreateChannelID(host,
|
| &private_key_info,
|
| &der_cert,
|
| base::Bind(&FailTest),
|
| @@ -412,8 +412,8 @@ TEST_F(ServerBoundCertServiceTest, CancelRequestByHandleDestruction) {
|
| EXPECT_TRUE(request_handle.is_active());
|
| }
|
|
|
| - // Wait for reply from ServerBoundCertServiceWorker to be posted back to the
|
| - // ServerBoundCertService.
|
| + // Wait for reply from ChannelIDServiceWorker to be posted back to the
|
| + // ChannelIDService.
|
| base::MessageLoop::current()->RunUntilIdle();
|
|
|
| // Even though the original request was cancelled, the service will still
|
| @@ -421,13 +421,13 @@ TEST_F(ServerBoundCertServiceTest, CancelRequestByHandleDestruction) {
|
| EXPECT_EQ(1, service_->cert_count());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, DestructionWithPendingRequest) {
|
| +TEST_F(ChannelIDServiceTest, DestructionWithPendingRequest) {
|
| std::string host("encrypted.google.com");
|
| std::string private_key_info, der_cert;
|
| int error;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host,
|
| + error = service_->GetOrCreateChannelID(host,
|
| &private_key_info,
|
| &der_cert,
|
| base::Bind(&FailTest),
|
| @@ -435,12 +435,12 @@ TEST_F(ServerBoundCertServiceTest, DestructionWithPendingRequest) {
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle.is_active());
|
|
|
| - // Cancel request and destroy the ServerBoundCertService.
|
| + // Cancel request and destroy the ChannelIDService.
|
| request_handle.Cancel();
|
| service_.reset();
|
|
|
| - // ServerBoundCertServiceWorker should not post anything back to the
|
| - // non-existent ServerBoundCertService, but run the loop just to be sure it
|
| + // ChannelIDServiceWorker should not post anything back to the
|
| + // non-existent ChannelIDService, but run the loop just to be sure it
|
| // doesn't.
|
| base::MessageLoop::current()->RunUntilIdle();
|
|
|
| @@ -450,18 +450,18 @@ TEST_F(ServerBoundCertServiceTest, DestructionWithPendingRequest) {
|
| // Tests that shutting down the sequenced worker pool and then making new
|
| // requests gracefully fails.
|
| // This is a regression test for http://crbug.com/236387
|
| -TEST_F(ServerBoundCertServiceTest, RequestAfterPoolShutdown) {
|
| +TEST_F(ChannelIDServiceTest, RequestAfterPoolShutdown) {
|
| scoped_refptr<FailingTaskRunner> task_runner(new FailingTaskRunner);
|
| - service_.reset(new ServerBoundCertService(
|
| - new DefaultServerBoundCertStore(NULL), task_runner));
|
| + service_.reset(new ChannelIDService(
|
| + new DefaultChannelIDStore(NULL), task_runner));
|
|
|
| // Make a request that will force synchronous completion.
|
| std::string host("encrypted.google.com");
|
| std::string private_key_info, der_cert;
|
| int error;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host,
|
| + error = service_->GetOrCreateChannelID(host,
|
| &private_key_info,
|
| &der_cert,
|
| base::Bind(&FailTest),
|
| @@ -472,25 +472,25 @@ TEST_F(ServerBoundCertServiceTest, RequestAfterPoolShutdown) {
|
| }
|
|
|
| // Tests that simultaneous creation of different certs works.
|
| -TEST_F(ServerBoundCertServiceTest, SimultaneousCreation) {
|
| +TEST_F(ChannelIDServiceTest, SimultaneousCreation) {
|
| int error;
|
|
|
| std::string host1("encrypted.google.com");
|
| std::string private_key_info1, der_cert1;
|
| TestCompletionCallback callback1;
|
| - ServerBoundCertService::RequestHandle request_handle1;
|
| + ChannelIDService::RequestHandle request_handle1;
|
|
|
| std::string host2("foo.com");
|
| std::string private_key_info2, der_cert2;
|
| TestCompletionCallback callback2;
|
| - ServerBoundCertService::RequestHandle request_handle2;
|
| + ChannelIDService::RequestHandle request_handle2;
|
|
|
| std::string host3("bar.com");
|
| std::string private_key_info3, der_cert3;
|
| TestCompletionCallback callback3;
|
| - ServerBoundCertService::RequestHandle request_handle3;
|
| + ChannelIDService::RequestHandle request_handle3;
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host1,
|
| + error = service_->GetOrCreateChannelID(host1,
|
| &private_key_info1,
|
| &der_cert1,
|
| callback1.callback(),
|
| @@ -498,7 +498,7 @@ TEST_F(ServerBoundCertServiceTest, SimultaneousCreation) {
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle1.is_active());
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host2,
|
| + error = service_->GetOrCreateChannelID(host2,
|
| &private_key_info2,
|
| &der_cert2,
|
| callback2.callback(),
|
| @@ -506,7 +506,7 @@ TEST_F(ServerBoundCertServiceTest, SimultaneousCreation) {
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle2.is_active());
|
|
|
| - error = service_->GetOrCreateDomainBoundCert(host3,
|
| + error = service_->GetOrCreateChannelID(host3,
|
| &private_key_info3,
|
| &der_cert3,
|
| callback3.callback(),
|
| @@ -541,15 +541,15 @@ TEST_F(ServerBoundCertServiceTest, SimultaneousCreation) {
|
| EXPECT_EQ(3, service_->cert_count());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, Expiration) {
|
| - ServerBoundCertStore* store = service_->GetCertStore();
|
| +TEST_F(ChannelIDServiceTest, Expiration) {
|
| + ChannelIDStore* store = service_->GetChannelIDStore();
|
| base::Time now = base::Time::Now();
|
| - store->SetServerBoundCert("good",
|
| + store->SetChannelID("good",
|
| now,
|
| now + base::TimeDelta::FromDays(1),
|
| "a",
|
| "b");
|
| - store->SetServerBoundCert("expired",
|
| + store->SetChannelID("expired",
|
| now - base::TimeDelta::FromDays(2),
|
| now - base::TimeDelta::FromDays(1),
|
| "c",
|
| @@ -558,11 +558,11 @@ TEST_F(ServerBoundCertServiceTest, Expiration) {
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Cert is valid - synchronous completion.
|
| std::string private_key_info1, der_cert1;
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| "good", &private_key_info1, &der_cert1,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(OK, error);
|
| @@ -573,7 +573,7 @@ TEST_F(ServerBoundCertServiceTest, Expiration) {
|
|
|
| // Expired cert is valid as well - synchronous completion.
|
| std::string private_key_info2, der_cert2;
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| "expired", &private_key_info2, &der_cert2,
|
| callback.callback(), &request_handle);
|
| EXPECT_EQ(OK, error);
|
| @@ -583,27 +583,27 @@ TEST_F(ServerBoundCertServiceTest, Expiration) {
|
| EXPECT_STREQ("d", der_cert2.c_str());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOrCreateNoCertsInStore) {
|
| - MockServerBoundCertStoreWithAsyncGet* mock_store =
|
| - new MockServerBoundCertStoreWithAsyncGet();
|
| - service_ = scoped_ptr<ServerBoundCertService>(new ServerBoundCertService(
|
| +TEST_F(ChannelIDServiceTest, AsyncStoreGetOrCreateNoCertsInStore) {
|
| + MockChannelIDStoreWithAsyncGet* mock_store =
|
| + new MockChannelIDStoreWithAsyncGet();
|
| + service_ = scoped_ptr<ChannelIDService>(new ChannelIDService(
|
| mock_store, base::MessageLoopProxy::current()));
|
|
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Asynchronous completion with no certs in the store.
|
| std::string private_key_info, der_cert;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info, &der_cert, callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle.is_active());
|
|
|
| - mock_store->CallGetServerBoundCertCallbackWithResult(
|
| + mock_store->CallGetChannelIDCallbackWithResult(
|
| ERR_FILE_NOT_FOUND, base::Time(), std::string(), std::string());
|
|
|
| error = callback.WaitForResult();
|
| @@ -614,27 +614,27 @@ TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOrCreateNoCertsInStore) {
|
| EXPECT_FALSE(request_handle.is_active());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, AsyncStoreGetNoCertsInStore) {
|
| - MockServerBoundCertStoreWithAsyncGet* mock_store =
|
| - new MockServerBoundCertStoreWithAsyncGet();
|
| - service_ = scoped_ptr<ServerBoundCertService>(new ServerBoundCertService(
|
| +TEST_F(ChannelIDServiceTest, AsyncStoreGetNoCertsInStore) {
|
| + MockChannelIDStoreWithAsyncGet* mock_store =
|
| + new MockChannelIDStoreWithAsyncGet();
|
| + service_ = scoped_ptr<ChannelIDService>(new ChannelIDService(
|
| mock_store, base::MessageLoopProxy::current()));
|
|
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Asynchronous completion with no certs in the store.
|
| std::string private_key, der_cert;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key, &der_cert, callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle.is_active());
|
|
|
| - mock_store->CallGetServerBoundCertCallbackWithResult(
|
| + mock_store->CallGetChannelIDCallbackWithResult(
|
| ERR_FILE_NOT_FOUND, base::Time(), std::string(), std::string());
|
|
|
| error = callback.WaitForResult();
|
| @@ -645,27 +645,27 @@ TEST_F(ServerBoundCertServiceTest, AsyncStoreGetNoCertsInStore) {
|
| EXPECT_FALSE(request_handle.is_active());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOrCreateOneCertInStore) {
|
| - MockServerBoundCertStoreWithAsyncGet* mock_store =
|
| - new MockServerBoundCertStoreWithAsyncGet();
|
| - service_ = scoped_ptr<ServerBoundCertService>(new ServerBoundCertService(
|
| +TEST_F(ChannelIDServiceTest, AsyncStoreGetOrCreateOneCertInStore) {
|
| + MockChannelIDStoreWithAsyncGet* mock_store =
|
| + new MockChannelIDStoreWithAsyncGet();
|
| + service_ = scoped_ptr<ChannelIDService>(new ChannelIDService(
|
| mock_store, base::MessageLoopProxy::current()));
|
|
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Asynchronous completion with a cert in the store.
|
| std::string private_key_info, der_cert;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key_info, &der_cert, callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle.is_active());
|
|
|
| - mock_store->CallGetServerBoundCertCallbackWithResult(
|
| + mock_store->CallGetChannelIDCallbackWithResult(
|
| OK, base::Time(), "ab", "cd");
|
|
|
| error = callback.WaitForResult();
|
| @@ -681,27 +681,27 @@ TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOrCreateOneCertInStore) {
|
| EXPECT_FALSE(request_handle.is_active());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOneCertInStore) {
|
| - MockServerBoundCertStoreWithAsyncGet* mock_store =
|
| - new MockServerBoundCertStoreWithAsyncGet();
|
| - service_ = scoped_ptr<ServerBoundCertService>(new ServerBoundCertService(
|
| +TEST_F(ChannelIDServiceTest, AsyncStoreGetOneCertInStore) {
|
| + MockChannelIDStoreWithAsyncGet* mock_store =
|
| + new MockChannelIDStoreWithAsyncGet();
|
| + service_ = scoped_ptr<ChannelIDService>(new ChannelIDService(
|
| mock_store, base::MessageLoopProxy::current()));
|
|
|
| std::string host("encrypted.google.com");
|
|
|
| int error;
|
| TestCompletionCallback callback;
|
| - ServerBoundCertService::RequestHandle request_handle;
|
| + ChannelIDService::RequestHandle request_handle;
|
|
|
| // Asynchronous completion with a cert in the store.
|
| std::string private_key, der_cert;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key, &der_cert, callback.callback(), &request_handle);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle.is_active());
|
|
|
| - mock_store->CallGetServerBoundCertCallbackWithResult(
|
| + mock_store->CallGetChannelIDCallbackWithResult(
|
| OK, base::Time(), "ab", "cd");
|
|
|
| error = callback.WaitForResult();
|
| @@ -716,10 +716,10 @@ TEST_F(ServerBoundCertServiceTest, AsyncStoreGetOneCertInStore) {
|
| EXPECT_FALSE(request_handle.is_active());
|
| }
|
|
|
| -TEST_F(ServerBoundCertServiceTest, AsyncStoreGetThenCreateNoCertsInStore) {
|
| - MockServerBoundCertStoreWithAsyncGet* mock_store =
|
| - new MockServerBoundCertStoreWithAsyncGet();
|
| - service_ = scoped_ptr<ServerBoundCertService>(new ServerBoundCertService(
|
| +TEST_F(ChannelIDServiceTest, AsyncStoreGetThenCreateNoCertsInStore) {
|
| + MockChannelIDStoreWithAsyncGet* mock_store =
|
| + new MockChannelIDStoreWithAsyncGet();
|
| + service_ = scoped_ptr<ChannelIDService>(new ChannelIDService(
|
| mock_store, base::MessageLoopProxy::current()));
|
|
|
| std::string host("encrypted.google.com");
|
| @@ -728,25 +728,25 @@ TEST_F(ServerBoundCertServiceTest, AsyncStoreGetThenCreateNoCertsInStore) {
|
|
|
| // Asynchronous get with no certs in the store.
|
| TestCompletionCallback callback1;
|
| - ServerBoundCertService::RequestHandle request_handle1;
|
| + ChannelIDService::RequestHandle request_handle1;
|
| std::string private_key1, der_cert1;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetDomainBoundCert(
|
| + error = service_->GetChannelID(
|
| host, &private_key1, &der_cert1, callback1.callback(), &request_handle1);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle1.is_active());
|
|
|
| // Asynchronous get/create with no certs in the store.
|
| TestCompletionCallback callback2;
|
| - ServerBoundCertService::RequestHandle request_handle2;
|
| + ChannelIDService::RequestHandle request_handle2;
|
| std::string private_key2, der_cert2;
|
| EXPECT_EQ(0, service_->cert_count());
|
| - error = service_->GetOrCreateDomainBoundCert(
|
| + error = service_->GetOrCreateChannelID(
|
| host, &private_key2, &der_cert2, callback2.callback(), &request_handle2);
|
| EXPECT_EQ(ERR_IO_PENDING, error);
|
| EXPECT_TRUE(request_handle2.is_active());
|
|
|
| - mock_store->CallGetServerBoundCertCallbackWithResult(
|
| + mock_store->CallGetChannelIDCallbackWithResult(
|
| ERR_FILE_NOT_FOUND, base::Time(), std::string(), std::string());
|
|
|
| // Even though the first request didn't ask to create a cert, it gets joined
|
|
|