summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_server_socket_unittest.cc
diff options
context:
space:
mode:
authorhclam@chromium.org <hclam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-28 22:04:24 +0000
committerhclam@chromium.org <hclam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-04-28 22:04:24 +0000
commit4dc832eb7a378a2834423be90ba269c66e54fd0c (patch)
tree6638d0d237f1ae3fbdc21d18adf29870f94e7664 /net/socket/ssl_server_socket_unittest.cc
parentdada9ebc9be44916789b2275400f426a06e959d2 (diff)
downloadchromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.zip
chromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.tar.gz
chromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.tar.bz2
Skip cert verification if it is expected to be bad.
If server cert received is expected to be bad then don't perform the verification step. BUG=None TEST=net_unittests --gtest_filter=SSL* Review URL: http://codereview.chromium.org/6898033 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@83420 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_server_socket_unittest.cc')
-rw-r--r--net/socket/ssl_server_socket_unittest.cc8
1 files changed, 7 insertions, 1 deletions
diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc
index 4ff7481..25f386a 100644
--- a/net/socket/ssl_server_socket_unittest.cc
+++ b/net/socket/ssl_server_socket_unittest.cc
@@ -31,6 +31,7 @@
#include "net/base/net_errors.h"
#include "net/base/net_log.h"
#include "net/base/ssl_config_service.h"
+#include "net/base/ssl_info.h"
#include "net/base/x509_certificate.h"
#include "net/socket/client_socket.h"
#include "net/socket/client_socket_factory.h"
@@ -251,7 +252,7 @@ class SSLServerSocketTest : public PlatformTest {
// Certificate provided by the host doesn't need authority.
net::SSLConfig::CertAndStatus cert_and_status;
- cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID;
+ cert_and_status.cert_status = CERT_STATUS_AUTHORITY_INVALID;
cert_and_status.cert = cert;
ssl_config.allowed_bad_certs.push_back(cert_and_status);
@@ -304,6 +305,11 @@ TEST_F(SSLServerSocketTest, Handshake) {
if (server_ret == net::ERR_IO_PENDING) {
EXPECT_EQ(net::OK, accept_callback.WaitForResult());
}
+
+ // Make sure the cert status is expected.
+ SSLInfo ssl_info;
+ client_socket_->GetSSLInfo(&ssl_info);
+ EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, ssl_info.cert_status);
}
TEST_F(SSLServerSocketTest, DataTransfer) {