diff options
author | rkn@chromium.org <rkn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-07-21 16:55:17 +0000 |
---|---|---|
committer | rkn@chromium.org <rkn@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-07-21 16:55:17 +0000 |
commit | feb79bcd1b3f755b1125ba471c4e17c7b7ede66d (patch) | |
tree | 612c11cda543dbb6342d87613274a62aa08d8100 /net/socket/ssl_client_socket_unittest.cc | |
parent | 6b4adc7d6f8787274a0fcf080777032521912e0c (diff) | |
download | chromium_src-feb79bcd1b3f755b1125ba471c4e17c7b7ede66d.zip chromium_src-feb79bcd1b3f755b1125ba471c4e17c7b7ede66d.tar.gz chromium_src-feb79bcd1b3f755b1125ba471c4e17c7b7ede66d.tar.bz2 |
Added an OriginBoundCertStore field to the SSLClientSocketNSS class and
did the plumbing to pass this field through the layers. In addition,
this CL groups several fields together into a single struct |SSLClientSocket::Context|.
BUG=None
TEST=None
Review URL: http://codereview.chromium.org/7315009
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@93416 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_client_socket_unittest.cc')
-rw-r--r-- | net/socket/ssl_client_socket_unittest.cc | 12 |
1 files changed, 9 insertions, 3 deletions
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc index 9946c90..4feabaf 100644 --- a/net/socket/ssl_client_socket_unittest.cc +++ b/net/socket/ssl_client_socket_unittest.cc @@ -36,11 +36,13 @@ class SSLClientSocketTest : public PlatformTest { net::StreamSocket* transport_socket, const net::HostPortPair& host_and_port, const net::SSLConfig& ssl_config) { + net::SSLClientSocketContext context; + context.cert_verifier = cert_verifier_.get(); return socket_factory_->CreateSSLClientSocket(transport_socket, host_and_port, ssl_config, NULL, - cert_verifier_.get()); + context); } net::ClientSocketFactory* socket_factory_; @@ -79,10 +81,12 @@ TEST_F(SSLClientSocketTest, Connect) { rv = callback.WaitForResult(); EXPECT_EQ(net::OK, rv); + net::SSLClientSocketContext context; + context.cert_verifier = cert_verifier_.get(); scoped_ptr<net::SSLClientSocket> sock( socket_factory_->CreateSSLClientSocket( transport, test_server.host_port_pair(), kDefaultSSLConfig, - NULL, cert_verifier_.get())); + NULL, context)); EXPECT_FALSE(sock->IsConnected()); @@ -374,10 +378,12 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) { rv = callback.WaitForResult(); EXPECT_EQ(net::OK, rv); + net::SSLClientSocketContext context; + context.cert_verifier = cert_verifier_.get(); scoped_ptr<net::SSLClientSocket> sock( socket_factory_->CreateSSLClientSocket( transport, test_server.host_port_pair(), kDefaultSSLConfig, - NULL, cert_verifier_.get())); + NULL, context)); rv = sock->Connect(&callback); if (rv == net::ERR_IO_PENDING) |