| Index: net/socket/ssl_client_socket_unittest.cc
|
| ===================================================================
|
| --- net/socket/ssl_client_socket_unittest.cc (revision 69359)
|
| +++ net/socket/ssl_client_socket_unittest.cc (working copy)
|
| @@ -5,6 +5,7 @@
|
| #include "net/socket/ssl_client_socket.h"
|
|
|
| #include "net/base/address_list.h"
|
| +#include "net/base/cert_verifier.h"
|
| #include "net/base/host_resolver.h"
|
| #include "net/base/io_buffer.h"
|
| #include "net/base/net_log.h"
|
| @@ -26,11 +27,24 @@
|
| class SSLClientSocketTest : public PlatformTest {
|
| public:
|
| SSLClientSocketTest()
|
| - : socket_factory_(net::ClientSocketFactory::GetDefaultFactory()) {
|
| + : socket_factory_(net::ClientSocketFactory::GetDefaultFactory()),
|
| + cert_verifier_(new net::CertVerifier) {
|
| }
|
|
|
| protected:
|
| + net::SSLClientSocket* CreateSSLClientSocket(
|
| + net::ClientSocket* transport_socket,
|
| + const net::HostPortPair& host_and_port,
|
| + const net::SSLConfig& ssl_config) {
|
| + return socket_factory_->CreateSSLClientSocket(transport_socket,
|
| + host_and_port,
|
| + ssl_config,
|
| + NULL,
|
| + cert_verifier_.get());
|
| + }
|
| +
|
| net::ClientSocketFactory* socket_factory_;
|
| + scoped_ptr<net::CertVerifier> cert_verifier_;
|
| };
|
|
|
| //-----------------------------------------------------------------------------
|
| @@ -67,7 +81,8 @@
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + transport, test_server.host_port_pair(), kDefaultSSLConfig,
|
| + NULL, cert_verifier_.get()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -107,8 +122,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -150,8 +165,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -196,8 +211,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -243,8 +258,8 @@
|
| ssl_config.client_cert = NULL;
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), ssl_config, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + ssl_config));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -289,8 +304,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| rv = sock->Connect(&callback);
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -345,7 +360,8 @@
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + transport, test_server.host_port_pair(), kDefaultSSLConfig,
|
| + NULL, cert_verifier_.get()));
|
|
|
| rv = sock->Connect(&callback);
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -398,8 +414,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| rv = sock->Connect(&callback);
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -448,8 +464,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| rv = sock->Connect(&callback);
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -518,8 +534,8 @@
|
| EXPECT_EQ(net::OK, rv);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), kDefaultSSLConfig, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + kDefaultSSLConfig));
|
|
|
| rv = sock->Connect(&callback);
|
| EXPECT_EQ(net::ERR_SSL_PROTOCOL_ERROR, rv);
|
| @@ -560,8 +576,8 @@
|
| ssl_config.disabled_cipher_suites.push_back(kCiphersToDisable[i]);
|
|
|
| scoped_ptr<net::SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(
|
| - transport, test_server.host_port_pair(), ssl_config, NULL));
|
| + CreateSSLClientSocket(transport, test_server.host_port_pair(),
|
| + ssl_config));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
|
|