| Index: chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| diff --git a/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc b/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| index 205048c31bf135e200e8169a707d1d665f70e713..8efa1050a4e4d0413d0052ed51fe22284254674a 100644
|
| --- a/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| +++ b/chrome/browser/ssl/chrome_ssl_host_state_delegate_test.cc
|
| @@ -66,66 +66,46 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, QueryPolicy) {
|
| // Verifying that all three of the certs we will be looking at are denied
|
| // before any action has been taken.
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kExampleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kExampleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| // Simulate a user decision to allow an invalid certificate exception for
|
| // kWWWGoogleHost.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
|
|
| // Verify that only kWWWGoogleHost is allowed and that the other two certs
|
| // being tested still are denied.
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kExampleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kExampleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| // Simulate a user decision to allow an invalid certificate exception for
|
| // kExampleHost.
|
| - state->AllowCert(
|
| - kExampleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kExampleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
|
|
| // Verify that both kWWWGoogleHost and kExampleHost have allow exceptions
|
| // while kGoogleHost still is denied.
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kExampleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kExampleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // HasPolicyAndRevoke unit tests the expected behavior of calling
|
| @@ -142,10 +122,8 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, HasPolicyAndRevoke) {
|
|
|
| // Simulate a user decision to allow an invalid certificate exception for
|
| // kWWWGoogleHost and for kExampleHost.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| - state->AllowCert(
|
| - kExampleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kExampleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
|
|
| // Verify that HasAllowException correctly acknowledges that a user decision
|
| // has been made about kWWWGoogleHost. Then verify that HasAllowException
|
| @@ -154,10 +132,8 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, HasPolicyAndRevoke) {
|
| state->RevokeUserAllowExceptions(kWWWGoogleHost);
|
| EXPECT_FALSE(state->HasAllowException(kWWWGoogleHost));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| // Verify that the revocation of the kWWWGoogleHost decision does not affect
|
| // the Allow for kExampleHost.
|
| @@ -184,8 +160,7 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, Clear) {
|
|
|
| // Simulate a user decision to allow an invalid certificate exception for
|
| // kWWWGoogleHost and for kExampleHost.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
|
|
| // Do a full clear, then make sure that both kWWWGoogleHost, which had a
|
| // decision made, and kExampleHost, which was untouched, are now in a denied
|
| @@ -193,16 +168,12 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, Clear) {
|
| state->Clear();
|
| EXPECT_FALSE(state->HasAllowException(kWWWGoogleHost));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| EXPECT_FALSE(state->HasAllowException(kExampleHost));
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kExampleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kExampleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // DidHostRunInsecureContent unit tests the expected behavior of calling
|
| @@ -244,22 +215,19 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, PRE_QueryPolicyExpired) {
|
|
|
| // The certificate has never been seen before, so it should be UNKNOWN and
|
| // should also indicate that it hasn't expired.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
|
|
| // After allowing the certificate, a query should say that it is allowed and
|
| // also specify that it hasn't expired.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::ALLOWED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
| }
|
|
|
| @@ -277,20 +245,18 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest, QueryPolicyExpired) {
|
| // The browser content has restart thus expiring the user decision made above,
|
| // so it should indicate that the certificate and error are DENIED but also
|
| // that they expired since the last query.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_TRUE(expired_previous_decision);
|
|
|
| // However, with a new query, it should indicate that no new expiration has
|
| // occurred.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
| }
|
|
|
| @@ -315,31 +281,28 @@ IN_PROC_BROWSER_TEST_F(IncognitoSSLHostStateDelegateTest, PRE_AfterRestart) {
|
|
|
| // Add a cert exception to the profile and then verify that it still exists
|
| // in the incognito profile.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
|
|
| scoped_ptr<Profile> incognito(profile->CreateOffTheRecordProfile());
|
| content::SSLHostStateDelegate* incognito_state =
|
| incognito->GetSSLHostStateDelegate();
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - incognito_state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::ALLOWED,
|
| + incognito_state->QueryPolicy(
|
| + kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| // Add a cert exception to the incognito profile. It will be checked after
|
| // restart that this exception does not exist. Note the different cert URL and
|
| // error than above thus mapping to a second exception. Also validate that it
|
| // was not added as an exception to the regular profile.
|
| - incognito_state->AllowCert(
|
| - kGoogleHost, *cert.get(), net::CERT_STATUS_COMMON_NAME_INVALID);
|
| + incognito_state->AllowCert(kGoogleHost, *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID);
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_COMMON_NAME_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kGoogleHost, *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
|
| }
|
|
|
| // AfterRestart ensures that any cert decisions made in an incognito profile are
|
| @@ -357,10 +320,8 @@ IN_PROC_BROWSER_TEST_F(IncognitoSSLHostStateDelegateTest, AfterRestart) {
|
| // (non-incognito) profile still exists and was not cleared after the
|
| // incognito session ended.
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| scoped_ptr<Profile> incognito(profile->CreateOffTheRecordProfile());
|
| content::SSLHostStateDelegate* incognito_state =
|
| @@ -369,8 +330,7 @@ IN_PROC_BROWSER_TEST_F(IncognitoSSLHostStateDelegateTest, AfterRestart) {
|
| // Verify that the exception added before restart to the incognito profile was
|
| // cleared when the incognito session ended.
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - incognito_state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| + incognito_state->QueryPolicy(kGoogleHost, *cert,
|
| net::CERT_STATUS_COMMON_NAME_INVALID,
|
| &unused_value));
|
| }
|
| @@ -394,13 +354,10 @@ IN_PROC_BROWSER_TEST_F(ForGetSSLHostStateDelegateTest, PRE_AfterRestart) {
|
| content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
|
| bool unused_value;
|
|
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(ForGetSSLHostStateDelegateTest, AfterRestart) {
|
| @@ -414,10 +371,8 @@ IN_PROC_BROWSER_TEST_F(ForGetSSLHostStateDelegateTest, AfterRestart) {
|
| // The cert should now be |DENIED| because the profile is set to forget cert
|
| // exceptions after session end.
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // Tests to make sure that if the remember value is set to 0, any decisions made
|
| @@ -451,13 +406,10 @@ IN_PROC_BROWSER_TEST_F(ForgetInstantlySSLHostStateDelegateTest,
|
| // emphasize that instant forget works.
|
| clock->SetNow(base::Time::NowFromSystemTime());
|
|
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // Tests to make sure that if the remember value is set to a non-zero value,
|
| @@ -480,13 +432,10 @@ IN_PROC_BROWSER_TEST_F(RememberSSLHostStateDelegateTest, PRE_AfterRestart) {
|
| content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
|
| bool unused_value;
|
|
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| IN_PROC_BROWSER_TEST_F(RememberSSLHostStateDelegateTest, AfterRestart) {
|
| @@ -509,20 +458,16 @@ IN_PROC_BROWSER_TEST_F(RememberSSLHostStateDelegateTest, AfterRestart) {
|
| // This should only pass if the cert was allowed before the test was restart
|
| // and thus has now been rememebered across browser restarts.
|
| EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
|
|
| // Simulate the clock advancing by the specified delta.
|
| clock->Advance(base::TimeDelta::FromSeconds(kDeltaOneDayInSeconds + 1));
|
|
|
| // The cert should now be |DENIED| because the specified delta has passed.
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kWWWGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // The same test as ChromeSSLHostStateDelegateTest.QueryPolicyExpired but now
|
| @@ -549,22 +494,19 @@ IN_PROC_BROWSER_TEST_F(RememberSSLHostStateDelegateTest, QueryPolicyExpired) {
|
|
|
| // The certificate has never been seen before, so it should be UNKONWN and
|
| // should also indicate that it hasn't expired.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
|
|
| // After allowing the certificate, a query should say that it is allowed and
|
| // also specify that it hasn't expired.
|
| - state->AllowCert(
|
| - kWWWGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| - EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + state->AllowCert(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::ALLOWED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
|
|
| // Simulate the clock advancing by the specified delta.
|
| @@ -573,20 +515,18 @@ IN_PROC_BROWSER_TEST_F(RememberSSLHostStateDelegateTest, QueryPolicyExpired) {
|
| // The decision expiration time has come, so it should indicate that the
|
| // certificate and error are DENIED but also that they expired since the last
|
| // query.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_TRUE(expired_previous_decision);
|
|
|
| // However, with a new query, it should indicate that no new expiration has
|
| // occurred.
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kWWWGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &expired_previous_decision));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy(kWWWGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID,
|
| + &expired_previous_decision));
|
| EXPECT_FALSE(expired_previous_decision);
|
| }
|
|
|
| @@ -616,14 +556,11 @@ IN_PROC_BROWSER_TEST_F(RemoveBrowsingHistorySSLHostStateDelegateTest,
|
|
|
| // Add an exception for an invalid certificate. Then remove the last hour's
|
| // worth of browsing history and verify that the exception has been deleted.
|
| - state->AllowCert(
|
| - kGoogleHost, *cert.get(), net::CERT_STATUS_DATE_INVALID);
|
| + state->AllowCert(kGoogleHost, *cert, net::CERT_STATUS_DATE_INVALID);
|
| RemoveAndWait(profile);
|
| EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy(kGoogleHost,
|
| - *cert.get(),
|
| - net::CERT_STATUS_DATE_INVALID,
|
| - &unused_value));
|
| + state->QueryPolicy(kGoogleHost, *cert,
|
| + net::CERT_STATUS_DATE_INVALID, &unused_value));
|
| }
|
|
|
| // Tests to make sure that localhost certificate errors are treated as
|
| @@ -642,17 +579,15 @@ IN_PROC_BROWSER_TEST_F(ChromeSSLHostStateDelegateTest,
|
| content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
|
| bool unused_value;
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy("localhost",
|
| - *cert.get(),
|
| - net::CERT_STATUS_COMMON_NAME_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy("localhost", *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::DENIED,
|
| - state->QueryPolicy("127.0.0.1",
|
| - *cert.get(),
|
| - net::CERT_STATUS_COMMON_NAME_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::DENIED,
|
| + state->QueryPolicy("127.0.0.1", *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
|
| }
|
|
|
| // When the flag is set, requests to localhost with invalid certificates
|
| @@ -676,15 +611,13 @@ IN_PROC_BROWSER_TEST_F(AllowLocalhostErrorsSSLHostStateDelegateTest,
|
| content::SSLHostStateDelegate* state = profile->GetSSLHostStateDelegate();
|
| bool unused_value;
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy("localhost",
|
| - *cert.get(),
|
| - net::CERT_STATUS_COMMON_NAME_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::ALLOWED,
|
| + state->QueryPolicy("localhost", *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
|
|
|
| - EXPECT_EQ(content::SSLHostStateDelegate::ALLOWED,
|
| - state->QueryPolicy("127.0.0.1",
|
| - *cert.get(),
|
| - net::CERT_STATUS_COMMON_NAME_INVALID,
|
| - &unused_value));
|
| + EXPECT_EQ(
|
| + content::SSLHostStateDelegate::ALLOWED,
|
| + state->QueryPolicy("127.0.0.1", *cert,
|
| + net::CERT_STATUS_COMMON_NAME_INVALID, &unused_value));
|
| }
|
|
|