OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/multi_threaded_cert_verifier.h" | 5 #include "net/cert/multi_threaded_cert_verifier.h" |
6 | 6 |
7 #include "base/bind.h" | 7 #include "base/bind.h" |
8 #include "base/files/file_path.h" | 8 #include "base/files/file_path.h" |
9 #include "base/format_macros.h" | 9 #include "base/format_macros.h" |
10 #include "base/strings/stringprintf.h" | 10 #include "base/strings/stringprintf.h" |
(...skipping 21 matching lines...) Expand all Loading... |
32 } | 32 } |
33 | 33 |
34 class MockCertVerifyProc : public CertVerifyProc { | 34 class MockCertVerifyProc : public CertVerifyProc { |
35 public: | 35 public: |
36 MockCertVerifyProc() {} | 36 MockCertVerifyProc() {} |
37 | 37 |
38 private: | 38 private: |
39 virtual ~MockCertVerifyProc() {} | 39 virtual ~MockCertVerifyProc() {} |
40 | 40 |
41 // CertVerifyProc implementation | 41 // CertVerifyProc implementation |
42 virtual bool SupportsAdditionalTrustAnchors() const OVERRIDE { | 42 virtual bool SupportsAdditionalTrustAnchors() const override { |
43 return false; | 43 return false; |
44 } | 44 } |
45 | 45 |
46 virtual int VerifyInternal(X509Certificate* cert, | 46 virtual int VerifyInternal(X509Certificate* cert, |
47 const std::string& hostname, | 47 const std::string& hostname, |
48 int flags, | 48 int flags, |
49 CRLSet* crl_set, | 49 CRLSet* crl_set, |
50 const CertificateList& additional_trust_anchors, | 50 const CertificateList& additional_trust_anchors, |
51 CertVerifyResult* verify_result) OVERRIDE { | 51 CertVerifyResult* verify_result) override { |
52 verify_result->Reset(); | 52 verify_result->Reset(); |
53 verify_result->verified_cert = cert; | 53 verify_result->verified_cert = cert; |
54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; | 54 verify_result->cert_status = CERT_STATUS_COMMON_NAME_INVALID; |
55 return ERR_CERT_COMMON_NAME_INVALID; | 55 return ERR_CERT_COMMON_NAME_INVALID; |
56 } | 56 } |
57 }; | 57 }; |
58 | 58 |
59 class MockCertTrustAnchorProvider : public CertTrustAnchorProvider { | 59 class MockCertTrustAnchorProvider : public CertTrustAnchorProvider { |
60 public: | 60 public: |
61 MockCertTrustAnchorProvider() {} | 61 MockCertTrustAnchorProvider() {} |
(...skipping 414 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
476 Mock::VerifyAndClearExpectations(&trust_provider); | 476 Mock::VerifyAndClearExpectations(&trust_provider); |
477 ASSERT_EQ(ERR_IO_PENDING, error); | 477 ASSERT_EQ(ERR_IO_PENDING, error); |
478 EXPECT_TRUE(request_handle); | 478 EXPECT_TRUE(request_handle); |
479 error = callback.WaitForResult(); | 479 error = callback.WaitForResult(); |
480 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); | 480 EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
481 ASSERT_EQ(3u, verifier_.requests()); | 481 ASSERT_EQ(3u, verifier_.requests()); |
482 ASSERT_EQ(1u, verifier_.cache_hits()); | 482 ASSERT_EQ(1u, verifier_.cache_hits()); |
483 } | 483 } |
484 | 484 |
485 } // namespace net | 485 } // namespace net |
OLD | NEW |