diff options
author | hclam@chromium.org <hclam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-04-28 22:04:24 +0000 |
---|---|---|
committer | hclam@chromium.org <hclam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-04-28 22:04:24 +0000 |
commit | 4dc832eb7a378a2834423be90ba269c66e54fd0c (patch) | |
tree | 6638d0d237f1ae3fbdc21d18adf29870f94e7664 /net/socket/ssl_server_socket_unittest.cc | |
parent | dada9ebc9be44916789b2275400f426a06e959d2 (diff) | |
download | chromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.zip chromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.tar.gz chromium_src-4dc832eb7a378a2834423be90ba269c66e54fd0c.tar.bz2 |
Skip cert verification if it is expected to be bad.
If server cert received is expected to be bad then don't perform the verification step.
BUG=None
TEST=net_unittests --gtest_filter=SSL*
Review URL: http://codereview.chromium.org/6898033
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@83420 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_server_socket_unittest.cc')
-rw-r--r-- | net/socket/ssl_server_socket_unittest.cc | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc index 4ff7481..25f386a 100644 --- a/net/socket/ssl_server_socket_unittest.cc +++ b/net/socket/ssl_server_socket_unittest.cc @@ -31,6 +31,7 @@ #include "net/base/net_errors.h" #include "net/base/net_log.h" #include "net/base/ssl_config_service.h" +#include "net/base/ssl_info.h" #include "net/base/x509_certificate.h" #include "net/socket/client_socket.h" #include "net/socket/client_socket_factory.h" @@ -251,7 +252,7 @@ class SSLServerSocketTest : public PlatformTest { // Certificate provided by the host doesn't need authority. net::SSLConfig::CertAndStatus cert_and_status; - cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID; + cert_and_status.cert_status = CERT_STATUS_AUTHORITY_INVALID; cert_and_status.cert = cert; ssl_config.allowed_bad_certs.push_back(cert_and_status); @@ -304,6 +305,11 @@ TEST_F(SSLServerSocketTest, Handshake) { if (server_ret == net::ERR_IO_PENDING) { EXPECT_EQ(net::OK, accept_callback.WaitForResult()); } + + // Make sure the cert status is expected. + SSLInfo ssl_info; + client_socket_->GetSSLInfo(&ssl_info); + EXPECT_EQ(CERT_STATUS_AUTHORITY_INVALID, ssl_info.cert_status); } TEST_F(SSLServerSocketTest, DataTransfer) { |