Index: chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
diff --git a/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc b/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
index 15bd9354096ff16ae1159479a74a306cba628ab4..d482d5972a331c642732c59ec8e8dbd1921d5e51 100644 |
--- a/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
+++ b/chrome/common/extensions/api/networking_private/networking_private_crypto_unittest.cc |
@@ -46,30 +46,6 @@ |
"wM9asRj3tJA5VRFbLbsit1VI7IaRCk9rsSKkpBUaVeKbPLz+y/Z6JonXXT6AxsfgUSKDd4B7" |
"MYLrTwMQfGuUaaaKko6ldKIrovjrcPloQr1Hxb2bipFcjLmG7nxQLoS6vQ==" |
"-----END CERTIFICATE-----"; |
- static const char kICAData[] = |
- "-----BEGIN CERTIFICATE-----" |
- "MIIDzTCCArWgAwIBAgIBAzANBgkqhkiG9w0BAQUFADB1MQswCQYDVQQGEwJVUzET" |
- "MBEGA1UECAwKQ2FsaWZvcm5pYTEWMBQGA1UEBwwNTW91bnRhaW4gVmlldzETMBEG" |
- "A1UECgwKR29vZ2xlIEluYzENMAsGA1UECwwEQ2FzdDEVMBMGA1UEAwwMQ2FzdCBS" |
- "b290IENBMB4XDTE0MDQwMjIwNTg1NFoXDTE5MDQwMjIwNTg1NFowfTELMAkGA1UE" |
- "BhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDU1vdW50YWluIFZp" |
- "ZXcxEzARBgNVBAoMCkdvb2dsZSBJbmMxEjAQBgNVBAsMCUdvb2dsZSBUVjEYMBYG" |
- "A1UEAwwPRXVyZWthIEdlbjEgSUNBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB" |
- "CgKCAQEAvCKAvYD2OiEAO652XjV/PcNkXFWUhjQvBYcozfdpjBezUKe4gvrfx0Mt" |
- "1n6roG+3E3KApEcVwSCZUM3sFGIJW6SYzdJBtjZO/+guMjBKgahCo2ybM27KsvVT" |
- "ZuAnU4YahR6nOT9Kd477VGZm+1hUwF45x/VQBgvgitTO4WpVH4sXAOZpoyfmCCVp" |
- "PBKdjQUs1i6iMd60UlDWIEnecaD5rSBAEvHdJevV5rg29NaPf8pD3NcQW+Y/UYqF" |
- "s/P/9gMtyyNPnK0Y55MFjKxSmvdM6Zl6vm5+TQrjxhypk/o6pZFdHL1m68xg3IZ0" |
- "ys/4khyYfVf6YUeeq4C35EiAKpLFGwIDAQABo2AwXjAPBgNVHRMECDAGAQH/AgEA" |
- "MB0GA1UdDgQWBBQyr35sod0oQuWz4VmnWjnJ/4pinzAfBgNVHSMEGDAWgBR8mh59" |
- "33lUvNfMXsqZhkV5ZXQoGTALBgNVHQ8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEB" |
- "ABPENY9iGt6qsc5yq4JOO6EEqYbKVtkSf1AqW2yJc4M4EZ65eA6bpj9EVIKvDxYq" |
- "NI7q40f7jCXiS+Y73OXFaC3Xue8+DV7WVjAvf9QYy79ohnbqadA4U/Sb7vw4AzwT" |
- "KCMlH2fUJ5PCNFfTj6lAkeZOhxtegnEMTIB8zvXEb42H0hN4UxRRhCeKS9tIlAmI" |
- "Ql1ib0jTDDN6IgQYslrx0dyZzBAsRocq/d3ycXX71iMykoIHZ7rNJ2bDMddRdFk2" |
- "D0Ljj4fZjrQNyD4mot/9mqSrF1Q2/AdWQO3pJONcXRWRynJ4Ian3sWdq2B5Dq8Iz" |
- "kqrjM7lOq9YEQ+hMRdmOHP4=" |
- "-----END CERTIFICATE-----"; |
static const char kName[] = "eureka8997"; |
static const char kSsdpUdn[] = "c5b2a83b-5958-7ce6-b179-e1f44699429b"; |
static const char kHotspotBssid[] = "00:1A:11:FF:AC:DF"; |
@@ -115,43 +91,26 @@ |
// Checking basic verification operation. |
EXPECT_TRUE(networking_private_crypto::VerifyCredentials( |
- kCertData, std::vector<std::string>(), signed_data, unsigned_data, |
- kHotspotBssid)); |
- |
- // Checking verification operation with an ICA |
- std::vector<std::string> icas; |
- icas.push_back(kICAData); |
- EXPECT_TRUE(networking_private_crypto::VerifyCredentials( |
- kCertData, icas, signed_data, unsigned_data, kHotspotBssid)); |
+ kCertData, signed_data, unsigned_data, kHotspotBssid)); |
// Checking that verification fails when the certificate is signed, but |
// subject is malformed. |
EXPECT_FALSE(networking_private_crypto::VerifyCredentials( |
- kBadSubjectCertData, std::vector<std::string>(), signed_data, |
- unsigned_data, kHotspotBssid)); |
+ kBadSubjectCertData, signed_data, unsigned_data, kHotspotBssid)); |
// Checking that verification fails when certificate has invalid format. |
EXPECT_FALSE(networking_private_crypto::VerifyCredentials( |
- kBadCertData, std::vector<std::string>(), signed_data, unsigned_data, |
- kHotspotBssid)); |
- |
- // Checking that verification fails if we supply a bad ICA. |
- std::vector<std::string> bad_icas; |
- bad_icas.push_back(kCertData); |
- EXPECT_FALSE(networking_private_crypto::VerifyCredentials( |
- kCertData, bad_icas, signed_data, unsigned_data, kHotspotBssid)); |
+ kBadCertData, signed_data, unsigned_data, kHotspotBssid)); |
// Checking that verification fails when Hotspot Bssid is invalid. |
EXPECT_FALSE(networking_private_crypto::VerifyCredentials( |
- kCertData, std::vector<std::string>(), signed_data, unsigned_data, |
- kBadHotspotBssid)); |
+ kCertData, signed_data, unsigned_data, kBadHotspotBssid)); |
// Checking that verification fails when there is bad nonce in unsigned_data. |
unsigned_data = base::StringPrintf( |
"%s,%s,%s,%s,%s", kName, kSsdpUdn, kHotspotBssid, kPublicKey, kBadNonce); |
EXPECT_FALSE(networking_private_crypto::VerifyCredentials( |
- kCertData, std::vector<std::string>(), signed_data, unsigned_data, |
- kHotspotBssid)); |
+ kCertData, signed_data, unsigned_data, kHotspotBssid)); |
} |
// Test that networking_private_crypto::EncryptByteString behaves as expected. |