OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include <cert.h> | 5 #include <cert.h> |
6 #include <pk11pub.h> | 6 #include <pk11pub.h> |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
(...skipping 306 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
317 EXPECT_TRUE(wifi1->connected()); | 317 EXPECT_TRUE(wifi1->connected()); |
318 } | 318 } |
319 | 319 |
320 TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) { | 320 TEST_F(NetworkLibraryStubTest, NetworkConnectWifiWithCertPattern) { |
321 scoped_ptr<base::DictionaryValue> onc_root = | 321 scoped_ptr<base::DictionaryValue> onc_root = |
322 onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc"); | 322 onc::test_utils::ReadTestDictionary("toplevel_wifi_eap_clientcert.onc"); |
323 base::ListValue* certificates; | 323 base::ListValue* certificates; |
324 onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates, | 324 onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates, |
325 &certificates); | 325 &certificates); |
326 | 326 |
327 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 327 onc::CertificateImporter importer(true /* allow webtrust */); |
328 false /* don't allow webtrust */); | |
329 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, | 328 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, |
330 importer.ParseAndStoreCertificates(*certificates)); | 329 importer.ParseAndStoreCertificates(*certificates)); |
331 | 330 |
332 WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); | 331 WifiNetwork* wifi = cros_->FindWifiNetworkByPath("wifi_cert_pattern"); |
333 | 332 |
334 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 333 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
335 wifi->SetEnrollmentDelegate(enrollment_delegate); | 334 wifi->SetEnrollmentDelegate(enrollment_delegate); |
336 EXPECT_FALSE(enrollment_delegate->did_enroll); | 335 EXPECT_FALSE(enrollment_delegate->did_enroll); |
337 EXPECT_FALSE(enrollment_delegate->correct_args); | 336 EXPECT_FALSE(enrollment_delegate->correct_args); |
338 | 337 |
339 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi); | 338 ASSERT_NE(static_cast<const WifiNetwork*>(NULL), wifi); |
340 EXPECT_FALSE(wifi->connected()); | 339 EXPECT_FALSE(wifi->connected()); |
341 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi)); | 340 EXPECT_TRUE(cros_->CanConnectToNetwork(wifi)); |
342 EXPECT_FALSE(wifi->connected()); | 341 EXPECT_FALSE(wifi->connected()); |
343 wifi->AttemptConnection( | 342 wifi->AttemptConnection( |
344 base::Bind(&WifiNetworkConnectCallback, cros_, wifi)); | 343 base::Bind(&WifiNetworkConnectCallback, cros_, wifi)); |
345 EXPECT_TRUE(wifi->connected()); | 344 EXPECT_TRUE(wifi->connected()); |
346 EXPECT_TRUE(enrollment_delegate->did_enroll); | 345 EXPECT_TRUE(enrollment_delegate->did_enroll); |
347 EXPECT_TRUE(enrollment_delegate->correct_args); | 346 EXPECT_TRUE(enrollment_delegate->correct_args); |
348 } | 347 } |
349 | 348 |
350 TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) { | 349 TEST_F(NetworkLibraryStubTest, NetworkConnectVPNWithCertPattern) { |
351 scoped_ptr<base::DictionaryValue> onc_root = | 350 scoped_ptr<base::DictionaryValue> onc_root = |
352 onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc"); | 351 onc::test_utils::ReadTestDictionary("toplevel_openvpn_clientcert.onc"); |
353 base::ListValue* certificates; | 352 base::ListValue* certificates; |
354 onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates, | 353 onc_root->GetListWithoutPathExpansion(onc::toplevel_config::kCertificates, |
355 &certificates); | 354 &certificates); |
356 | 355 |
357 onc::CertificateImporter importer(onc::ONC_SOURCE_USER_IMPORT, | 356 onc::CertificateImporter importer(true /* allow webtrust */); |
358 false /* don't allow webtrust */); | |
359 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, | 357 ASSERT_EQ(onc::CertificateImporter::IMPORT_OK, |
360 importer.ParseAndStoreCertificates(*certificates)); | 358 importer.ParseAndStoreCertificates(*certificates)); |
361 | 359 |
362 VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern"); | 360 VirtualNetwork* vpn = cros_->FindVirtualNetworkByPath("vpn_cert_pattern"); |
363 | 361 |
364 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); | 362 StubEnrollmentDelegate* enrollment_delegate = new StubEnrollmentDelegate(); |
365 vpn->SetEnrollmentDelegate(enrollment_delegate); | 363 vpn->SetEnrollmentDelegate(enrollment_delegate); |
366 EXPECT_FALSE(enrollment_delegate->did_enroll); | 364 EXPECT_FALSE(enrollment_delegate->did_enroll); |
367 EXPECT_FALSE(enrollment_delegate->correct_args); | 365 EXPECT_FALSE(enrollment_delegate->correct_args); |
368 | 366 |
(...skipping 128 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
497 | 495 |
498 // TODO(stevenjb): Test network profiles. | 496 // TODO(stevenjb): Test network profiles. |
499 | 497 |
500 // TODO(stevenjb): Test network devices. | 498 // TODO(stevenjb): Test network devices. |
501 | 499 |
502 // TODO(stevenjb): Test data plans. | 500 // TODO(stevenjb): Test data plans. |
503 | 501 |
504 // TODO(stevenjb): Test monitor network / device. | 502 // TODO(stevenjb): Test monitor network / device. |
505 | 503 |
506 } // namespace chromeos | 504 } // namespace chromeos |
OLD | NEW |