Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(99)

Unified Diff: net/base/ssl_client_auth_cache_unittest.cc

Issue 4568002: Remember if a user declines to provide a server with a client certificate (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Forgot about unittests Created 10 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/ssl_client_auth_cache_unittest.cc
diff --git a/net/base/ssl_client_auth_cache_unittest.cc b/net/base/ssl_client_auth_cache_unittest.cc
index 85b3d5e3f223c3774a2d3ecdb689015b97835c8c..d123d0462147f280f01480cf30a0a0b39361c5cb 100644
--- a/net/base/ssl_client_auth_cache_unittest.cc
+++ b/net/base/ssl_client_auth_cache_unittest.cc
@@ -5,6 +5,7 @@
#include "net/base/ssl_client_auth_cache.h"
#include "base/time.h"
+#include "net/base/x509_certificate.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace net {
@@ -27,32 +28,43 @@ TEST(SSLClientAuthCacheTest, LookupAddRemove) {
scoped_refptr<X509Certificate> cert3(
new X509Certificate("foo3", "CA", start_date, expiration_date));
+ X509Certificate* cached_cert = NULL;
// Lookup non-existent client certificate.
- EXPECT_TRUE(cache.Lookup(server1) == NULL);
+ EXPECT_FALSE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
// Add client certificate for server1.
cache.Add(server1, cert1.get());
- EXPECT_EQ(cert1.get(), cache.Lookup(server1));
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(cert1.get(), cached_cert);
// Add client certificate for server2.
cache.Add(server2, cert2.get());
- EXPECT_EQ(cert1.get(), cache.Lookup(server1));
- EXPECT_EQ(cert2.get(), cache.Lookup(server2));
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(cert1.get(), cached_cert);
+ EXPECT_TRUE(cache.Lookup(server2, &cached_cert));
+ EXPECT_EQ(cert2.get(), cached_cert);
// Overwrite the client certificate for server1.
cache.Add(server1, cert3.get());
- EXPECT_EQ(cert3.get(), cache.Lookup(server1));
- EXPECT_EQ(cert2.get(), cache.Lookup(server2));
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(cert3.get(), cached_cert);
+ EXPECT_TRUE(cache.Lookup(server2, &cached_cert));
+ EXPECT_EQ(cert2.get(), cached_cert);
// Remove client certificate of server1.
cache.Remove(server1);
- EXPECT_TRUE(cache.Lookup(server1) == NULL);
- EXPECT_EQ(cert2.get(), cache.Lookup(server2));
+ EXPECT_FALSE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
+ EXPECT_TRUE(cache.Lookup(server2, &cached_cert));
+ EXPECT_EQ(cert2.get(), cached_cert);
// Remove non-existent client certificate.
cache.Remove(server1);
- EXPECT_TRUE(cache.Lookup(server1) == NULL);
- EXPECT_EQ(cert2.get(), cache.Lookup(server2));
+ EXPECT_FALSE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
+ EXPECT_TRUE(cache.Lookup(server2, &cached_cert));
+ EXPECT_EQ(cert2.get(), cached_cert);
}
// Check that if the server differs only by port number, it is considered
@@ -74,8 +86,48 @@ TEST(SSLClientAuthCacheTest, LookupWithPort) {
cache.Add(server1, cert1.get());
cache.Add(server2, cert2.get());
- EXPECT_EQ(cert1.get(), cache.Lookup(server1));
- EXPECT_EQ(cert2.get(), cache.Lookup(server2));
+ X509Certificate* cached_cert = NULL;
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(cert1.get(), cached_cert);
+ EXPECT_TRUE(cache.Lookup(server2, &cached_cert));
+ EXPECT_EQ(cert2.get(), cached_cert);
+}
+
+// Check that the a NULL certificate, indicating the user has declined to send
+// a certificate, is properly cached.
+TEST(SSLClientAuthCacheTest, LookupNullPreference) {
+ SSLClientAuthCache cache;
+ base::Time start_date = base::Time::Now();
+ base::Time expiration_date = start_date + base::TimeDelta::FromDays(1);
+
+ std::string server1("foo:443");
+ scoped_refptr<X509Certificate> cert1(
+ new X509Certificate("foo", "CA", start_date, expiration_date));
+
+ cache.Add(server1, NULL);
+
+ X509Certificate* cached_cert = cert1.get();
+ // Make sure that |cached_cert| is updated to NULL, indicating the user
+ // declined to send a certificate to |server1|.
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
+
+ // Remove the existing cached certificate. Make sure that |cached_cert|
+ // is still updated to NULL, but that Lookup() returns false.
+ cache.Remove(server1);
+ cached_cert = cert1.get();
+ EXPECT_FALSE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
+
+ // Add a new preference for a specific certificate.
+ cache.Add(server1, cert1.get());
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(cert1.get(), cached_cert);
+
+ // Replace the specific preference with a NULL certificate.
+ cache.Add(server1, NULL);
+ EXPECT_TRUE(cache.Lookup(server1, &cached_cert));
+ EXPECT_EQ(NULL, cached_cert);
}
} // namespace net

Powered by Google App Engine
This is Rietveld 408576698