diff options
author | haavardm@opera.com <haavardm@opera.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-28 16:20:32 +0000 |
---|---|---|
committer | haavardm@opera.com <haavardm@opera.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-28 16:20:32 +0000 |
commit | e1b2d73a2e4386c4ac1bc20c8920eb2247130adc (patch) | |
tree | d875cdd58e321790521921b5e967695d4faa0c0a /net/cert/cert_verify_proc_unittest.cc | |
parent | 6241d536a509d8c0aca57e542aab0e85ba064c5a (diff) | |
download | chromium_src-e1b2d73a2e4386c4ac1bc20c8920eb2247130adc.zip chromium_src-e1b2d73a2e4386c4ac1bc20c8920eb2247130adc.tar.gz chromium_src-e1b2d73a2e4386c4ac1bc20c8920eb2247130adc.tar.bz2 |
Introduce USE_OPENSSL_CERTS for certificate handling.
See discussion at chromium issue 338885.
When USE_OPENSSL_CERTS is defined, X509::OSCertHandle is now
typedef'ed to struct X509*.
When USE_OPENSSL is defined, USE_OPENSSL_CERTS will now be
defined for linux and Android, while being off for Mac and
Windows. This allows OpenSSL to be used while leaving
certificate handling to the OS.
OpenSSL cert verifying code will only be used on Linux.
This patch does not change any default behavior.
Bug=none
Test=none
Review URL: https://codereview.chromium.org/206453002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@260152 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/cert/cert_verify_proc_unittest.cc')
-rw-r--r-- | net/cert/cert_verify_proc_unittest.cc | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc index 3b6732d..6567d16 100644 --- a/net/cert/cert_verify_proc_unittest.cc +++ b/net/cert/cert_verify_proc_unittest.cc @@ -157,7 +157,7 @@ TEST_F(CertVerifyProcTest, DISABLED_WithoutRevocationChecking) { &verify_result)); } -#if defined(OS_ANDROID) || defined(USE_OPENSSL) +#if defined(OS_ANDROID) || defined(USE_OPENSSL_CERTS) // TODO(jnd): http://crbug.com/117478 - EV verification is not yet supported. #define MAYBE_EVVerification DISABLED_EVVerification #else @@ -724,7 +724,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) { NULL, empty_cert_list_, &verify_result); -#if defined(USE_OPENSSL) && !defined(OS_ANDROID) +#if defined(USE_OPENSSL_CERTS) && !defined(OS_ANDROID) // This certificate has two errors: "invalid key usage" and "untrusted CA". // However, OpenSSL returns only one (the latter), and we can't detect // the other errors. @@ -1407,7 +1407,7 @@ TEST_P(CertVerifyProcWeakDigestTest, Verify) { const WeakDigestTestData kVerifyRootCATestData[] = { { "weak_digest_md5_root.pem", "weak_digest_sha1_intermediate.pem", "weak_digest_sha1_ee.pem", false, false, false }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { "weak_digest_md4_root.pem", "weak_digest_sha1_intermediate.pem", "weak_digest_sha1_ee.pem", false, false, false }, @@ -1422,7 +1422,7 @@ INSTANTIATE_TEST_CASE_P(VerifyRoot, CertVerifyProcWeakDigestTest, const WeakDigestTestData kVerifyIntermediateCATestData[] = { { "weak_digest_sha1_root.pem", "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem", true, false, false }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem", false, true, false }, @@ -1445,7 +1445,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P( const WeakDigestTestData kVerifyEndEntityTestData[] = { { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem", true, false, false }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { "weak_digest_sha1_root.pem", "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem", false, true, false }, @@ -1469,7 +1469,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P(MAYBE_VerifyEndEntity, const WeakDigestTestData kVerifyIncompleteIntermediateTestData[] = { { NULL, "weak_digest_md5_intermediate.pem", "weak_digest_sha1_ee.pem", true, false, false }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { NULL, "weak_digest_md4_intermediate.pem", "weak_digest_sha1_ee.pem", false, true, false }, @@ -1494,7 +1494,7 @@ WRAPPED_INSTANTIATE_TEST_CASE_P( const WeakDigestTestData kVerifyIncompleteEETestData[] = { { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md5_ee.pem", true, false, false }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { NULL, "weak_digest_sha1_intermediate.pem", "weak_digest_md4_ee.pem", false, true, false }, @@ -1521,7 +1521,7 @@ const WeakDigestTestData kVerifyMixedTestData[] = { "weak_digest_md2_ee.pem", true, false, true }, { "weak_digest_sha1_root.pem", "weak_digest_md2_intermediate.pem", "weak_digest_md5_ee.pem", true, false, true }, -#if defined(USE_OPENSSL) || defined(OS_WIN) +#if defined(USE_OPENSSL_CERTS) || defined(OS_WIN) // MD4 is not supported by OS X / NSS { "weak_digest_sha1_root.pem", "weak_digest_md4_intermediate.pem", "weak_digest_md2_ee.pem", false, true, true }, |