| Index: net/cert/x509_certificate_unittest.cc
|
| diff --git a/net/cert/x509_certificate_unittest.cc b/net/cert/x509_certificate_unittest.cc
|
| index 211e0ecd713b506df4898ead2fb6ba83eea8387e..158806ed7da53dba364da4e487b89940bbf1b36d 100644
|
| --- a/net/cert/x509_certificate_unittest.cc
|
| +++ b/net/cert/x509_certificate_unittest.cc
|
| @@ -617,111 +617,6 @@ TEST(X509CertificateTest, Pickle) {
|
| }
|
| }
|
|
|
| -TEST(X509CertificateTest, Policy) {
|
| - scoped_refptr<X509Certificate> google_cert(X509Certificate::CreateFromBytes(
|
| - reinterpret_cast<const char*>(google_der), sizeof(google_der)));
|
| -
|
| - scoped_refptr<X509Certificate> webkit_cert(X509Certificate::CreateFromBytes(
|
| - reinterpret_cast<const char*>(webkit_der), sizeof(webkit_der)));
|
| -
|
| - CertPolicy policy;
|
| -
|
| - // To begin with, everything should be unknown.
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_FALSE(policy.HasAllowedCert());
|
| - EXPECT_FALSE(policy.HasDeniedCert());
|
| -
|
| - // Test adding one certificate with one error.
|
| - policy.Allow(google_cert.get(), CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(CertPolicy::ALLOWED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(),
|
| - CERT_STATUS_DATE_INVALID | CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_TRUE(policy.HasAllowedCert());
|
| - EXPECT_FALSE(policy.HasDeniedCert());
|
| -
|
| - // Test saving the same certificate with a new error.
|
| - policy.Allow(google_cert.get(), CERT_STATUS_AUTHORITY_INVALID);
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::ALLOWED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_AUTHORITY_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_TRUE(policy.HasAllowedCert());
|
| - EXPECT_FALSE(policy.HasDeniedCert());
|
| -
|
| - // Test adding one certificate with two errors.
|
| - policy.Allow(google_cert.get(),
|
| - CERT_STATUS_DATE_INVALID | CERT_STATUS_AUTHORITY_INVALID);
|
| - EXPECT_EQ(CertPolicy::ALLOWED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::ALLOWED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_AUTHORITY_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_TRUE(policy.HasAllowedCert());
|
| - EXPECT_FALSE(policy.HasDeniedCert());
|
| -
|
| - // Test removing a certificate that was previously allowed.
|
| - policy.Deny(google_cert.get(), CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_FALSE(policy.HasAllowedCert());
|
| - EXPECT_TRUE(policy.HasDeniedCert());
|
| -
|
| - // Test removing a certificate that was previously unknown.
|
| - policy.Deny(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID);
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_FALSE(policy.HasAllowedCert());
|
| - EXPECT_TRUE(policy.HasDeniedCert());
|
| -
|
| - // Test saving a certificate that was previously denied.
|
| - policy.Allow(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID);
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::ALLOWED,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_TRUE(policy.HasAllowedCert());
|
| - EXPECT_TRUE(policy.HasDeniedCert());
|
| -
|
| - // Test denying an overlapping certificate.
|
| - policy.Allow(google_cert.get(),
|
| - CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_DATE_INVALID);
|
| - policy.Deny(google_cert.get(), CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(google_cert.get(), CERT_STATUS_DATE_INVALID));
|
| - EXPECT_EQ(CertPolicy::UNKNOWN,
|
| - policy.Check(google_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(google_cert.get(),
|
| - CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_DATE_INVALID));
|
| -
|
| - // Test denying an overlapping certificate (other direction).
|
| - policy.Allow(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID);
|
| - policy.Deny(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID);
|
| - policy.Deny(webkit_cert.get(), CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_COMMON_NAME_INVALID));
|
| - EXPECT_EQ(CertPolicy::DENIED,
|
| - policy.Check(webkit_cert.get(), CERT_STATUS_DATE_INVALID));
|
| -}
|
| -
|
| TEST(X509CertificateTest, IntermediateCertificates) {
|
| scoped_refptr<X509Certificate> webkit_cert(
|
| X509Certificate::CreateFromBytes(
|
|
|