| Index: chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc
|
| diff --git a/chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc b/chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc
|
| index fd440cfa35c820fcb0720ea21ee3f0d53e70bc24..aea0574133ea269f625bc36cb66a596e95dbfa8f 100644
|
| --- a/chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc
|
| +++ b/chrome/browser/chromeos/policy/policy_cert_verifier_browsertest.cc
|
| @@ -106,7 +106,7 @@ class PolicyCertVerifierTest : public testing::Test {
|
| TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) {
|
| scoped_refptr<net::X509Certificate> cert =
|
| LoadCertificate("ok_cert.pem", net::SERVER_CERT);
|
| - ASSERT_TRUE(cert);
|
| + ASSERT_TRUE(cert.get());
|
|
|
| // |cert| is untrusted, so Verify() fails.
|
| net::CertVerifyResult verify_result;
|
| @@ -114,9 +114,14 @@ TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) {
|
| net::CertVerifier::RequestHandle request_handle;
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list_));
|
| - int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + int error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| ASSERT_EQ(net::ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -127,9 +132,14 @@ TEST_F(PolicyCertVerifierTest, VerifyUntrustedCert) {
|
| // path.
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list_));
|
| - error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error);
|
|
|
| @@ -143,10 +153,10 @@ TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) {
|
| // |ca_cert| is the issuer of |cert|.
|
| scoped_refptr<net::X509Certificate> ca_cert =
|
| LoadCertificate("root_ca_cert.crt", net::CA_CERT);
|
| - ASSERT_TRUE(ca_cert);
|
| + ASSERT_TRUE(ca_cert.get());
|
| scoped_refptr<net::X509Certificate> cert =
|
| LoadCertificate("ok_cert.pem", net::SERVER_CERT);
|
| - ASSERT_TRUE(cert);
|
| + ASSERT_TRUE(cert.get());
|
|
|
| // Make the database trust |ca_cert|.
|
| net::CertificateList import_list;
|
| @@ -167,9 +177,14 @@ TEST_F(PolicyCertVerifierTest, VerifyTrustedCert) {
|
| net::CertVerifier::RequestHandle request_handle;
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list_));
|
| - int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + int error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| ASSERT_EQ(net::ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -192,10 +207,10 @@ TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) {
|
| // |ca_cert| is the issuer of |cert|.
|
| scoped_refptr<net::X509Certificate> ca_cert =
|
| LoadCertificate("root_ca_cert.crt", net::CA_CERT);
|
| - ASSERT_TRUE(ca_cert);
|
| + ASSERT_TRUE(ca_cert.get());
|
| scoped_refptr<net::X509Certificate> cert =
|
| LoadCertificate("ok_cert.pem", net::SERVER_CERT);
|
| - ASSERT_TRUE(cert);
|
| + ASSERT_TRUE(cert.get());
|
|
|
| net::CertificateList additional_trust_anchors;
|
| additional_trust_anchors.push_back(ca_cert);
|
| @@ -207,9 +222,14 @@ TEST_F(PolicyCertVerifierTest, VerifyUsingAdditionalTrustAnchor) {
|
| net::CertVerifier::RequestHandle request_handle;
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(additional_trust_anchors));
|
| - int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + int error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| ASSERT_EQ(net::ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -232,10 +252,10 @@ TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) {
|
| // |ca_cert| is the issuer of |cert|.
|
| scoped_refptr<net::X509Certificate> ca_cert =
|
| LoadCertificate("root_ca_cert.crt", net::CA_CERT);
|
| - ASSERT_TRUE(ca_cert);
|
| + ASSERT_TRUE(ca_cert.get());
|
| scoped_refptr<net::X509Certificate> cert =
|
| LoadCertificate("ok_cert.pem", net::SERVER_CERT);
|
| - ASSERT_TRUE(cert);
|
| + ASSERT_TRUE(cert.get());
|
|
|
| net::CertificateList additional_trust_anchors;
|
| additional_trust_anchors.push_back(ca_cert);
|
| @@ -246,9 +266,14 @@ TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) {
|
| net::CertVerifier::RequestHandle request_handle;
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list_));
|
| - int error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + int error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| ASSERT_EQ(net::ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -263,9 +288,14 @@ TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) {
|
| // Verify() again with the additional trust anchors.
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(additional_trust_anchors));
|
| - error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| ASSERT_EQ(net::ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -281,9 +311,14 @@ TEST_F(PolicyCertVerifierTest, ProfileRemainsTainted) {
|
| // Verifying after removing the trust anchors should now fail.
|
| EXPECT_CALL(trust_provider_, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list_));
|
| - error = cert_verifier_->Verify(cert, "127.0.0.1", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, net::BoundNetLog());
|
| + error = cert_verifier_->Verify(cert.get(),
|
| + "127.0.0.1",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + net::BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider_);
|
| // Note: this hits the cached result from the first Verify() in this test.
|
| EXPECT_EQ(net::ERR_CERT_AUTHORITY_INVALID, error);
|
|
|