Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(471)

Side by Side Diff: chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc

Issue 5535006: Add unittests for net::TestRootCerts and regenerate test certificates (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fix another hardcoded string Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « no previous file | chrome/common/net/x509_certificate_model_unittest.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h" 5 #include "chrome/browser/chromeos/policy/policy_cert_verifier.h"
6 6
7 #include "base/memory/ref_counted.h" 7 #include "base/memory/ref_counted.h"
8 #include "base/memory/scoped_ptr.h" 8 #include "base/memory/scoped_ptr.h"
9 #include "base/message_loop.h" 9 #include "base/message_loop.h"
10 #include "base/run_loop.h" 10 #include "base/run_loop.h"
(...skipping 134 matching lines...) Expand 10 before | Expand all | Expand 10 after
145 145
146 // The profile is not tainted. 146 // The profile is not tainted.
147 base::RunLoop().RunUntilIdle(); 147 base::RunLoop().RunUntilIdle();
148 EXPECT_FALSE( 148 EXPECT_FALSE(
149 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); 149 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce));
150 } 150 }
151 151
152 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) { 152 TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) {
153 // |ca_cert| is the issuer of |cert|. 153 // |ca_cert| is the issuer of |cert|.
154 scoped_refptr<net::X509Certificate> ca_cert = 154 scoped_refptr<net::X509Certificate> ca_cert =
155 LoadCertificate("root_ca_cert.crt", net::CA_CERT); 155 LoadCertificate("root_ca_cert.pem", net::CA_CERT);
156 ASSERT_TRUE(ca_cert.get()); 156 ASSERT_TRUE(ca_cert.get());
157 scoped_refptr<net::X509Certificate> cert = 157 scoped_refptr<net::X509Certificate> cert =
158 LoadCertificate("ok_cert.pem", net::SERVER_CERT); 158 LoadCertificate("ok_cert.pem", net::SERVER_CERT);
159 ASSERT_TRUE(cert.get()); 159 ASSERT_TRUE(cert.get());
160 160
161 // Make the database trust |ca_cert|. 161 // Make the database trust |ca_cert|.
162 net::CertificateList import_list; 162 net::CertificateList import_list;
163 import_list.push_back(ca_cert); 163 import_list.push_back(ca_cert);
164 net::NSSCertDatabase::ImportCertFailureList failure_list; 164 net::NSSCertDatabase::ImportCertFailureList failure_list;
165 ASSERT_TRUE(cert_db_->ImportCACerts( 165 ASSERT_TRUE(cert_db_->ImportCACerts(
(...skipping 33 matching lines...) Expand 10 before | Expand all | Expand 10 after
199 } 199 }
200 200
201 TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) { 201 TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) {
202 if (!SupportsAdditionalTrustAnchors()) { 202 if (!SupportsAdditionalTrustAnchors()) {
203 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required."; 203 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required.";
204 return; 204 return;
205 } 205 }
206 206
207 // |ca_cert| is the issuer of |cert|. 207 // |ca_cert| is the issuer of |cert|.
208 scoped_refptr<net::X509Certificate> ca_cert = 208 scoped_refptr<net::X509Certificate> ca_cert =
209 LoadCertificate("root_ca_cert.crt", net::CA_CERT); 209 LoadCertificate("root_ca_cert.pem", net::CA_CERT);
210 ASSERT_TRUE(ca_cert.get()); 210 ASSERT_TRUE(ca_cert.get());
211 scoped_refptr<net::X509Certificate> cert = 211 scoped_refptr<net::X509Certificate> cert =
212 LoadCertificate("ok_cert.pem", net::SERVER_CERT); 212 LoadCertificate("ok_cert.pem", net::SERVER_CERT);
213 ASSERT_TRUE(cert.get()); 213 ASSERT_TRUE(cert.get());
214 214
215 net::CertificateList additional_trust_anchors; 215 net::CertificateList additional_trust_anchors;
216 additional_trust_anchors.push_back(ca_cert); 216 additional_trust_anchors.push_back(ca_cert);
217 217
218 // Verify() successfully verifies |cert|, using |ca_cert| from the list of 218 // Verify() successfully verifies |cert|, using |ca_cert| from the list of
219 // |additional_trust_anchors|. 219 // |additional_trust_anchors|.
(...skipping 24 matching lines...) Expand all
244 } 244 }
245 245
246 TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) { 246 TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) {
247 if (!SupportsAdditionalTrustAnchors()) { 247 if (!SupportsAdditionalTrustAnchors()) {
248 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required."; 248 LOG(INFO) << "Test skipped on this platform. NSS >= 3.14.2 required.";
249 return; 249 return;
250 } 250 }
251 251
252 // |ca_cert| is the issuer of |cert|. 252 // |ca_cert| is the issuer of |cert|.
253 scoped_refptr<net::X509Certificate> ca_cert = 253 scoped_refptr<net::X509Certificate> ca_cert =
254 LoadCertificate("root_ca_cert.crt", net::CA_CERT); 254 LoadCertificate("root_ca_cert.pem", net::CA_CERT);
255 ASSERT_TRUE(ca_cert.get()); 255 ASSERT_TRUE(ca_cert.get());
256 scoped_refptr<net::X509Certificate> cert = 256 scoped_refptr<net::X509Certificate> cert =
257 LoadCertificate("ok_cert.pem", net::SERVER_CERT); 257 LoadCertificate("ok_cert.pem", net::SERVER_CERT);
258 ASSERT_TRUE(cert.get()); 258 ASSERT_TRUE(cert.get());
259 259
260 net::CertificateList additional_trust_anchors; 260 net::CertificateList additional_trust_anchors;
261 additional_trust_anchors.push_back(ca_cert); 261 additional_trust_anchors.push_back(ca_cert);
262 262
263 // |cert| is untrusted, so Verify() fails. 263 // |cert| is untrusted, so Verify() fails.
264 net::CertVerifyResult verify_result; 264 net::CertVerifyResult verify_result;
(...skipping 58 matching lines...) Expand 10 before | Expand all | Expand 10 after
323 // Note: this hits the cached result from the first Verify() in this test. 323 // Note: this hits the cached result from the first Verify() in this test.
324 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error); 324 EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error);
325 325
326 // The profile is still tainted. 326 // The profile is still tainted.
327 base::RunLoop().RunUntilIdle(); 327 base::RunLoop().RunUntilIdle();
328 EXPECT_TRUE( 328 EXPECT_TRUE(
329 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce)); 329 profile_->GetPrefs()->GetBoolean(prefs::kUsedPolicyCertificatesOnce));
330 } 330 }
331 331
332 } // namespace policy 332 } // namespace policy
OLDNEW
« no previous file with comments | « no previous file | chrome/common/net/x509_certificate_model_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698