Index: net/cert/cert_policy_enforcer_unittest.cc |
diff --git a/net/cert/cert_policy_enforcer_unittest.cc b/net/cert/cert_policy_enforcer_unittest.cc |
index de840c6e2daba8dc851ad7c9a486d44484a0c819..9299761b9ad83542601bb1f940839431a40f7d8b 100644 |
--- a/net/cert/cert_policy_enforcer_unittest.cc |
+++ b/net/cert/cert_policy_enforcer_unittest.cc |
@@ -7,6 +7,7 @@ |
#include <string> |
#include "base/memory/scoped_ptr.h" |
+#include "base/version.h" |
#include "net/base/test_data_directory.h" |
#include "net/cert/ct_ev_whitelist.h" |
#include "net/cert/ct_verify_result.h" |
@@ -33,6 +34,8 @@ class DummyEVCertsWhitelist : public ct::EVCertsWhitelist { |
return canned_contains_response_; |
} |
+ base::Version Version() const override { return base::Version(); } |
+ |
protected: |
~DummyEVCertsWhitelist() override {} |
@@ -74,8 +77,8 @@ TEST_F(CertPolicyEnforcerTest, ConformsToCTEVPolicyWithNonEmbeddedSCTs) { |
FillResultWithSCTsOfOrigin( |
ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION, 2, &result); |
- EXPECT_TRUE( |
- policy_enforcer_->DoesConformToCTEVPolicy(chain_.get(), nullptr, result)); |
+ EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy(chain_.get(), nullptr, |
+ result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, ConformsToCTEVPolicyWithEmbeddedSCTs) { |
@@ -84,8 +87,8 @@ TEST_F(CertPolicyEnforcerTest, ConformsToCTEVPolicyWithEmbeddedSCTs) { |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 5, |
&result); |
- EXPECT_TRUE( |
- policy_enforcer_->DoesConformToCTEVPolicy(chain_.get(), nullptr, result)); |
+ EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy(chain_.get(), nullptr, |
+ result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, DoesNotConformToCTEVPolicyNotEnoughSCTs) { |
@@ -99,13 +102,13 @@ TEST_F(CertPolicyEnforcerTest, DoesNotConformToCTEVPolicyNotEnoughSCTs) { |
&result); |
EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy( |
- chain_.get(), non_including_whitelist.get(), result)); |
+ chain_.get(), non_including_whitelist.get(), result, BoundNetLog())); |
// ... but should be OK if whitelisted. |
scoped_refptr<ct::EVCertsWhitelist> whitelist( |
new DummyEVCertsWhitelist(true, true)); |
EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy( |
- chain_.get(), whitelist.get(), result)); |
+ chain_.get(), whitelist.get(), result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, DoesNotEnforceCTPolicyIfNotRequired) { |
@@ -116,7 +119,8 @@ TEST_F(CertPolicyEnforcerTest, DoesNotEnforceCTPolicyIfNotRequired) { |
&result); |
// Expect true despite the chain not having enough SCTs as the policy |
// is not enforced. |
- EXPECT_TRUE(enforcer->DoesConformToCTEVPolicy(chain_.get(), nullptr, result)); |
+ EXPECT_TRUE(enforcer->DoesConformToCTEVPolicy(chain_.get(), nullptr, result, |
+ BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, DoesNotConformToPolicyInvalidDates) { |
@@ -126,12 +130,12 @@ TEST_F(CertPolicyEnforcerTest, DoesNotConformToPolicyInvalidDates) { |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 5, |
&result); |
EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy( |
- no_valid_dates_cert.get(), nullptr, result)); |
+ no_valid_dates_cert.get(), nullptr, result, BoundNetLog())); |
// ... but should be OK if whitelisted. |
scoped_refptr<ct::EVCertsWhitelist> whitelist( |
new DummyEVCertsWhitelist(true, true)); |
EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy( |
- chain_.get(), whitelist.get(), result)); |
+ chain_.get(), whitelist.get(), result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, |
@@ -152,15 +156,15 @@ TEST_F(CertPolicyEnforcerTest, |
for (size_t j = 0; j < curr_required_scts - 1; ++j) { |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, |
1, &result); |
- EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy(cert.get(), |
- nullptr, result)) |
+ EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy( |
+ cert.get(), nullptr, result, BoundNetLog())) |
<< " for: " << curr_validity << " and " << curr_required_scts |
<< " scts=" << result.verified_scts.size() << " j=" << j; |
} |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 1, |
&result); |
- EXPECT_TRUE( |
- policy_enforcer_->DoesConformToCTEVPolicy(cert.get(), nullptr, result)); |
+ EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy( |
+ cert.get(), nullptr, result, BoundNetLog())); |
} |
} |
@@ -172,7 +176,7 @@ TEST_F(CertPolicyEnforcerTest, ConformsToPolicyByEVWhitelistPresence) { |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 1, |
&result); |
EXPECT_TRUE(policy_enforcer_->DoesConformToCTEVPolicy( |
- chain_.get(), whitelist.get(), result)); |
+ chain_.get(), whitelist.get(), result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, IgnoresInvalidEVWhitelist) { |
@@ -183,15 +187,15 @@ TEST_F(CertPolicyEnforcerTest, IgnoresInvalidEVWhitelist) { |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 1, |
&result); |
EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy( |
- chain_.get(), whitelist.get(), result)); |
+ chain_.get(), whitelist.get(), result, BoundNetLog())); |
} |
TEST_F(CertPolicyEnforcerTest, IgnoresNullEVWhitelist) { |
ct::CTVerifyResult result; |
FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 1, |
&result); |
- EXPECT_FALSE( |
- policy_enforcer_->DoesConformToCTEVPolicy(chain_.get(), nullptr, result)); |
+ EXPECT_FALSE(policy_enforcer_->DoesConformToCTEVPolicy( |
+ chain_.get(), nullptr, result, BoundNetLog())); |
} |
} // namespace |