| Index: net/ssl/client_cert_store_unittest-inl.h
|
| diff --git a/net/ssl/client_cert_store_unittest-inl.h b/net/ssl/client_cert_store_unittest-inl.h
|
| deleted file mode 100644
|
| index a0e29dc83b5a732c757687b2f9a17e82b5b0ec47..0000000000000000000000000000000000000000
|
| --- a/net/ssl/client_cert_store_unittest-inl.h
|
| +++ /dev/null
|
| @@ -1,128 +0,0 @@
|
| -// Copyright 2013 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#ifndef NET_SSL_CLIENT_CERT_STORE_UNITTEST_INL_H_
|
| -#define NET_SSL_CLIENT_CERT_STORE_UNITTEST_INL_H_
|
| -
|
| -#include <string>
|
| -#include <vector>
|
| -
|
| -#include "base/files/file_path.h"
|
| -#include "base/memory/ref_counted.h"
|
| -#include "base/memory/scoped_ptr.h"
|
| -#include "net/base/test_data_directory.h"
|
| -#include "net/test/cert_test_util.h"
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -
|
| -namespace net {
|
| -
|
| -namespace {
|
| -
|
| -// "CN=B CA" - DER encoded DN of the issuer of client_1.pem
|
| -const unsigned char kAuthority1DN[] = {
|
| - 0x30, 0x0f, 0x31, 0x0d, 0x30, 0x0b, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c,
|
| - 0x04, 0x42, 0x20, 0x43, 0x41
|
| -};
|
| -
|
| -// "CN=E CA" - DER encoded DN of the issuer of client_2.pem
|
| -unsigned char kAuthority2DN[] = {
|
| - 0x30, 0x0f, 0x31, 0x0d, 0x30, 0x0b, 0x06, 0x03, 0x55, 0x04, 0x03, 0x0c,
|
| - 0x04, 0x45, 0x20, 0x43, 0x41
|
| -};
|
| -
|
| -} // namespace
|
| -
|
| -// Use a templated test to provide common testcases for all the platform
|
| -// implementations of ClientCertStore. These cases test the client cert
|
| -// filtering behavior.
|
| -//
|
| -// NOTE: If any test cases are added, removed, or renamed, the
|
| -// REGISTER_TYPED_TEST_CASE_P macro at the bottom of this file must be updated.
|
| -//
|
| -// The type T provided as the third argument to INSTANTIATE_TYPED_TEST_CASE_P by
|
| -// the platform implementation should implement this method:
|
| -// bool SelectClientCerts(const CertificateList& input_certs,
|
| -// const SSLCertRequestInfo& cert_request_info,
|
| -// CertificateList* selected_certs);
|
| -template <typename T>
|
| -class ClientCertStoreTest : public ::testing::Test {
|
| - public:
|
| - T delegate_;
|
| -};
|
| -
|
| -TYPED_TEST_CASE_P(ClientCertStoreTest);
|
| -
|
| -TYPED_TEST_P(ClientCertStoreTest, EmptyQuery) {
|
| - std::vector<scoped_refptr<X509Certificate> > certs;
|
| - scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo());
|
| -
|
| - std::vector<scoped_refptr<X509Certificate> > selected_certs;
|
| - bool rv = this->delegate_.SelectClientCerts(
|
| - certs, *request.get(), &selected_certs);
|
| - EXPECT_TRUE(rv);
|
| - EXPECT_EQ(0u, selected_certs.size());
|
| -}
|
| -
|
| -// Verify that CertRequestInfo with empty |cert_authorities| matches all
|
| -// issuers, rather than no issuers.
|
| -TYPED_TEST_P(ClientCertStoreTest, AllIssuersAllowed) {
|
| - scoped_refptr<X509Certificate> cert(
|
| - ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem"));
|
| - ASSERT_TRUE(cert.get());
|
| -
|
| - std::vector<scoped_refptr<X509Certificate> > certs;
|
| - certs.push_back(cert);
|
| - scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo());
|
| -
|
| - std::vector<scoped_refptr<X509Certificate> > selected_certs;
|
| - bool rv = this->delegate_.SelectClientCerts(
|
| - certs, *request.get(), &selected_certs);
|
| - EXPECT_TRUE(rv);
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| - EXPECT_TRUE(selected_certs[0]->Equals(cert.get()));
|
| -}
|
| -
|
| -// Verify that certificates are correctly filtered against CertRequestInfo with
|
| -// |cert_authorities| containing only |authority_1_DN|.
|
| -TYPED_TEST_P(ClientCertStoreTest, CertAuthorityFiltering) {
|
| - scoped_refptr<X509Certificate> cert_1(
|
| - ImportCertFromFile(GetTestCertsDirectory(), "client_1.pem"));
|
| - ASSERT_TRUE(cert_1.get());
|
| - scoped_refptr<X509Certificate> cert_2(
|
| - ImportCertFromFile(GetTestCertsDirectory(), "client_2.pem"));
|
| - ASSERT_TRUE(cert_2.get());
|
| -
|
| - std::vector<std::string> authority_1(
|
| - 1, std::string(reinterpret_cast<const char*>(kAuthority1DN),
|
| - sizeof(kAuthority1DN)));
|
| - std::vector<std::string> authority_2(
|
| - 1, std::string(reinterpret_cast<const char*>(kAuthority2DN),
|
| - sizeof(kAuthority2DN)));
|
| - EXPECT_TRUE(cert_1->IsIssuedByEncoded(authority_1));
|
| - EXPECT_FALSE(cert_1->IsIssuedByEncoded(authority_2));
|
| - EXPECT_TRUE(cert_2->IsIssuedByEncoded(authority_2));
|
| - EXPECT_FALSE(cert_2->IsIssuedByEncoded(authority_1));
|
| -
|
| - std::vector<scoped_refptr<X509Certificate> > certs;
|
| - certs.push_back(cert_1);
|
| - certs.push_back(cert_2);
|
| - scoped_refptr<SSLCertRequestInfo> request(new SSLCertRequestInfo());
|
| - request->cert_authorities = authority_1;
|
| -
|
| - std::vector<scoped_refptr<X509Certificate> > selected_certs;
|
| - bool rv = this->delegate_.SelectClientCerts(
|
| - certs, *request.get(), &selected_certs);
|
| - EXPECT_TRUE(rv);
|
| - ASSERT_EQ(1u, selected_certs.size());
|
| - EXPECT_TRUE(selected_certs[0]->Equals(cert_1.get()));
|
| -}
|
| -
|
| -REGISTER_TYPED_TEST_CASE_P(ClientCertStoreTest,
|
| - EmptyQuery,
|
| - AllIssuersAllowed,
|
| - CertAuthorityFiltering);
|
| -
|
| -} // namespace net
|
| -
|
| -#endif // NET_SSL_CLIENT_CERT_STORE_UNITTEST_INL_H_
|
|
|