| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/quic_stream_factory.h" | 5 #include "net/quic/quic_stream_factory.h" |
| 6 | 6 |
| 7 #include "base/run_loop.h" | 7 #include "base/run_loop.h" |
| 8 #include "base/strings/string_util.h" | 8 #include "base/strings/string_util.h" |
| 9 #include "net/base/test_data_directory.h" | 9 #include "net/base/test_data_directory.h" |
| 10 #include "net/cert/cert_verifier.h" | 10 #include "net/cert/cert_verifier.h" |
| (...skipping 477 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 488 HostPortPair server1("www.example.org", 443); | 488 HostPortPair server1("www.example.org", 443); |
| 489 HostPortPair server2("mail.example.org", 443); | 489 HostPortPair server2("mail.example.org", 443); |
| 490 | 490 |
| 491 // Load a cert that is valid for: | 491 // Load a cert that is valid for: |
| 492 // www.example.org (server1) | 492 // www.example.org (server1) |
| 493 // mail.example.org (server2) | 493 // mail.example.org (server2) |
| 494 // www.example.com | 494 // www.example.com |
| 495 base::FilePath certs_dir = GetTestCertsDirectory(); | 495 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 496 scoped_refptr<X509Certificate> test_cert( | 496 scoped_refptr<X509Certificate> test_cert( |
| 497 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 497 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 498 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 498 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| 499 ProofVerifyDetailsChromium verify_details; | 499 ProofVerifyDetailsChromium verify_details; |
| 500 verify_details.cert_verify_result.verified_cert = test_cert; | 500 verify_details.cert_verify_result.verified_cert = test_cert; |
| 501 verify_details.cert_verify_result.is_issued_by_known_root = true; | 501 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 502 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 503 | 503 |
| 504 host_resolver_.set_synchronous_mode(true); | 504 host_resolver_.set_synchronous_mode(true); |
| 505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 505 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); | 506 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 507 | 507 |
| 508 QuicStreamRequest request(&factory_); | 508 QuicStreamRequest request(&factory_); |
| (...skipping 44 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 553 HostPortPair server2("mail.google.com", 443); | 553 HostPortPair server2("mail.google.com", 443); |
| 554 | 554 |
| 555 // Load a cert that is valid for: | 555 // Load a cert that is valid for: |
| 556 // www.example.org (server1) | 556 // www.example.org (server1) |
| 557 // mail.example.org | 557 // mail.example.org |
| 558 // www.example.com | 558 // www.example.com |
| 559 // But is not valid for mail.google.com (server2). | 559 // But is not valid for mail.google.com (server2). |
| 560 base::FilePath certs_dir = GetTestCertsDirectory(); | 560 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 561 scoped_refptr<X509Certificate> test_cert( | 561 scoped_refptr<X509Certificate> test_cert( |
| 562 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 562 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 563 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 563 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| 564 ProofVerifyDetailsChromium verify_details; | 564 ProofVerifyDetailsChromium verify_details; |
| 565 verify_details.cert_verify_result.verified_cert = test_cert; | 565 verify_details.cert_verify_result.verified_cert = test_cert; |
| 566 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 566 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 567 | 567 |
| 568 | 568 |
| 569 host_resolver_.set_synchronous_mode(true); | 569 host_resolver_.set_synchronous_mode(true); |
| 570 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 570 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| 571 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); | 571 host_resolver_.rules()->AddIPLiteralRule(server2.host(), "192.168.0.1", ""); |
| 572 | 572 |
| 573 QuicStreamRequest request(&factory_); | 573 QuicStreamRequest request(&factory_); |
| (...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 619 uint8 backup_pin = 2; | 619 uint8 backup_pin = 2; |
| 620 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 620 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 621 backup_pin); | 621 backup_pin); |
| 622 | 622 |
| 623 // Load a cert that is valid for: | 623 // Load a cert that is valid for: |
| 624 // www.example.org (server1) | 624 // www.example.org (server1) |
| 625 // mail.example.org (server2) | 625 // mail.example.org (server2) |
| 626 base::FilePath certs_dir = GetTestCertsDirectory(); | 626 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 627 scoped_refptr<X509Certificate> test_cert( | 627 scoped_refptr<X509Certificate> test_cert( |
| 628 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 628 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 629 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 629 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| 630 ProofVerifyDetailsChromium verify_details; | 630 ProofVerifyDetailsChromium verify_details; |
| 631 verify_details.cert_verify_result.verified_cert = test_cert; | 631 verify_details.cert_verify_result.verified_cert = test_cert; |
| 632 verify_details.cert_verify_result.is_issued_by_known_root = true; | 632 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 633 verify_details.cert_verify_result.public_key_hashes.push_back( | 633 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 634 test::GetTestHashValue(primary_pin)); | 634 test::GetTestHashValue(primary_pin)); |
| 635 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 635 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 636 | 636 |
| 637 | 637 |
| 638 host_resolver_.set_synchronous_mode(true); | 638 host_resolver_.set_synchronous_mode(true); |
| 639 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 639 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| (...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 690 uint8 bad_pin = 3; | 690 uint8 bad_pin = 3; |
| 691 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, | 691 test::AddPin(&transport_security_state_, "mail.example.org", primary_pin, |
| 692 backup_pin); | 692 backup_pin); |
| 693 | 693 |
| 694 // Load a cert that is valid for: | 694 // Load a cert that is valid for: |
| 695 // www.example.org (server1) | 695 // www.example.org (server1) |
| 696 // mail.example.org (server2) | 696 // mail.example.org (server2) |
| 697 base::FilePath certs_dir = GetTestCertsDirectory(); | 697 base::FilePath certs_dir = GetTestCertsDirectory(); |
| 698 scoped_refptr<X509Certificate> test_cert( | 698 scoped_refptr<X509Certificate> test_cert( |
| 699 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); | 699 ImportCertFromFile(certs_dir, "spdy_pooling.pem")); |
| 700 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert); | 700 ASSERT_NE(static_cast<X509Certificate*>(NULL), test_cert.get()); |
| 701 ProofVerifyDetailsChromium verify_details; | 701 ProofVerifyDetailsChromium verify_details; |
| 702 verify_details.cert_verify_result.verified_cert = test_cert; | 702 verify_details.cert_verify_result.verified_cert = test_cert; |
| 703 verify_details.cert_verify_result.is_issued_by_known_root = true; | 703 verify_details.cert_verify_result.is_issued_by_known_root = true; |
| 704 verify_details.cert_verify_result.public_key_hashes.push_back( | 704 verify_details.cert_verify_result.public_key_hashes.push_back( |
| 705 test::GetTestHashValue(bad_pin)); | 705 test::GetTestHashValue(bad_pin)); |
| 706 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); | 706 crypto_client_stream_factory_.set_proof_verify_details(&verify_details); |
| 707 | 707 |
| 708 | 708 |
| 709 host_resolver_.set_synchronous_mode(true); | 709 host_resolver_.set_synchronous_mode(true); |
| 710 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); | 710 host_resolver_.rules()->AddIPLiteralRule(server1.host(), "192.168.0.1", ""); |
| (...skipping 580 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1291 QuicCryptoClientConfig::CachedState* cached2 = | 1291 QuicCryptoClientConfig::CachedState* cached2 = |
| 1292 crypto_config->LookupOrCreate(server_id2); | 1292 crypto_config->LookupOrCreate(server_id2); |
| 1293 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); | 1293 EXPECT_NE(cached1->source_address_token(), cached2->source_address_token()); |
| 1294 EXPECT_TRUE(cached2->source_address_token().empty()); | 1294 EXPECT_TRUE(cached2->source_address_token().empty()); |
| 1295 EXPECT_FALSE(cached2->proof_valid()); | 1295 EXPECT_FALSE(cached2->proof_valid()); |
| 1296 } | 1296 } |
| 1297 } | 1297 } |
| 1298 | 1298 |
| 1299 } // namespace test | 1299 } // namespace test |
| 1300 } // namespace net | 1300 } // namespace net |
| OLD | NEW |