summaryrefslogtreecommitdiffstats
path: root/ipc/sync_socket_unittest.cc
diff options
context:
space:
mode:
authorrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-23 14:17:15 +0000
committerrsleevi@chromium.org <rsleevi@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-07-23 14:17:15 +0000
commit23633b659e6bc5f672197eb90eb6ee50b843ba4a (patch)
tree4617f2efe95cd16cba64242c42b128941b63ed6e /ipc/sync_socket_unittest.cc
parentc1fa0025cc83f4a625830a1c91d8ab2c80c7be32 (diff)
downloadchromium_src-23633b659e6bc5f672197eb90eb6ee50b843ba4a.zip
chromium_src-23633b659e6bc5f672197eb90eb6ee50b843ba4a.tar.gz
chromium_src-23633b659e6bc5f672197eb90eb6ee50b843ba4a.tar.bz2
Fix FLAKY X509CertificateParseTest.CanParseFormat on OS X 10.5 when decoding PEM-encoded PKCS#7 certificates that are marked with PEM pre-encapsulation boundary of BEGIN CERTIFICATE.
OS X ignores the caller-supplied format if it determines that the incoming data is PEM encoded, attempting to parse using an internal routine that determines the incoming format based on the PEM block header. On 10.5, this results in invalid certificate handles being returned, because the data is not actually a certificate, and this propagates into invalid X509Certificates. By sanity checking the returned handles using the same method as CreateOSCertHandleFromBytes, the problem can be caught and the data can be decoded by PEMTokenizer into a format that 10.5 will respect. R=wtc BUG=49887 TEST=X509CertificateParseTest.CanParseFormat no longer fails on OS X 10.5 for variations /5 and /11 Review URL: http://codereview.chromium.org/3019019 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@53467 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'ipc/sync_socket_unittest.cc')
0 files changed, 0 insertions, 0 deletions