| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index b114ecc2dfe8509e3a951d1ede8e63417f25ebd5..099a31988bbd37238774fd46c9252c3dc638170d 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -10,7 +10,6 @@
|
| #endif
|
|
|
| #include <algorithm>
|
| -#include <string>
|
|
|
| #include "base/basictypes.h"
|
| #include "base/bind.h"
|
| @@ -99,6 +98,7 @@
|
|
|
| using base::ASCIIToUTF16;
|
| using base::Time;
|
| +using std::string;
|
|
|
| namespace net {
|
|
|
| @@ -5437,6 +5437,25 @@ TEST_F(URLRequestTestHTTP, NoCacheOnNetworkDelegateRedirect) {
|
| }
|
| }
|
|
|
| +// Make sure an HTTP request using the "unsafe" port 443 fails.
|
| +// See: https://crbug.com/436451
|
| +TEST_F(URLRequestTestHTTP, UnsafePort) {
|
| + TestDelegate d;
|
| + {
|
| + scoped_ptr<URLRequest> r(default_context_.CreateRequest(
|
| + GURL("http://www.google.com:443/"), DEFAULT_PRIORITY, &d, NULL));
|
| +
|
| + r->Start();
|
| + EXPECT_TRUE(r->is_pending());
|
| +
|
| + base::RunLoop().Run();
|
| +
|
| + EXPECT_FALSE(r->is_pending());
|
| + EXPECT_EQ(URLRequestStatus::FAILED, r->status().status());
|
| + EXPECT_EQ(ERR_UNSAFE_PORT, r->status().error());
|
| + }
|
| +}
|
| +
|
| // Tests that redirection to an unsafe URL is allowed when it has been marked as
|
| // safe.
|
| TEST_F(URLRequestTestHTTP, UnsafeRedirectToWhitelistedUnsafeURL) {
|
|
|