| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/socket_test_util.h" | 5 #include "net/socket/socket_test_util.h" |
| 6 | 6 |
| 7 #include <algorithm> | 7 #include <algorithm> |
| 8 #include <vector> | 8 #include <vector> |
| 9 | 9 |
| 10 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
| (...skipping 224 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 235 reads_.push_back(MockRead(ASYNC, data, length)); | 235 reads_.push_back(MockRead(ASYNC, data, length)); |
| 236 } | 236 } |
| 237 | 237 |
| 238 SSLSocketDataProvider::SSLSocketDataProvider(IoMode mode, int result) | 238 SSLSocketDataProvider::SSLSocketDataProvider(IoMode mode, int result) |
| 239 : connect(mode, result), | 239 : connect(mode, result), |
| 240 next_proto_status(SSLClientSocket::kNextProtoUnsupported), | 240 next_proto_status(SSLClientSocket::kNextProtoUnsupported), |
| 241 was_npn_negotiated(false), | 241 was_npn_negotiated(false), |
| 242 protocol_negotiated(SSLClientSocket::kProtoUnknown), | 242 protocol_negotiated(SSLClientSocket::kProtoUnknown), |
| 243 client_cert_sent(false), | 243 client_cert_sent(false), |
| 244 cert_request_info(NULL), | 244 cert_request_info(NULL), |
| 245 origin_bound_cert_type(CLIENT_CERT_INVALID_TYPE) { | 245 domain_bound_cert_type(CLIENT_CERT_INVALID_TYPE) { |
| 246 } | 246 } |
| 247 | 247 |
| 248 SSLSocketDataProvider::~SSLSocketDataProvider() { | 248 SSLSocketDataProvider::~SSLSocketDataProvider() { |
| 249 } | 249 } |
| 250 | 250 |
| 251 void SSLSocketDataProvider::SetNextProto(SSLClientSocket::NextProto proto) { | 251 void SSLSocketDataProvider::SetNextProto(SSLClientSocket::NextProto proto) { |
| 252 was_npn_negotiated = true; | 252 was_npn_negotiated = true; |
| 253 next_proto_status = SSLClientSocket::kNextProtoNegotiated; | 253 next_proto_status = SSLClientSocket::kNextProtoNegotiated; |
| 254 protocol_negotiated = proto; | 254 protocol_negotiated = proto; |
| 255 next_proto = SSLClientSocket::NextProtoToString(proto); | 255 next_proto = SSLClientSocket::NextProtoToString(proto); |
| (...skipping 433 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 689 | 689 |
| 690 int MockClientSocket::ExportKeyingMaterial(const base::StringPiece& label, | 690 int MockClientSocket::ExportKeyingMaterial(const base::StringPiece& label, |
| 691 bool has_context, | 691 bool has_context, |
| 692 const base::StringPiece& context, | 692 const base::StringPiece& context, |
| 693 unsigned char* out, | 693 unsigned char* out, |
| 694 unsigned int outlen) { | 694 unsigned int outlen) { |
| 695 memset(out, 'A', outlen); | 695 memset(out, 'A', outlen); |
| 696 return OK; | 696 return OK; |
| 697 } | 697 } |
| 698 | 698 |
| 699 OriginBoundCertService* MockClientSocket::GetOriginBoundCertService() const { | 699 ServerBoundCertService* MockClientSocket::GetServerBoundCertService() const { |
| 700 NOTREACHED(); | 700 NOTREACHED(); |
| 701 return NULL; | 701 return NULL; |
| 702 } | 702 } |
| 703 | 703 |
| 704 SSLClientSocket::NextProtoStatus | 704 SSLClientSocket::NextProtoStatus |
| 705 MockClientSocket::GetNextProto(std::string* proto, std::string* server_protos) { | 705 MockClientSocket::GetNextProto(std::string* proto, std::string* server_protos) { |
| 706 proto->clear(); | 706 proto->clear(); |
| 707 server_protos->clear(); | 707 server_protos->clear(); |
| 708 return SSLClientSocket::kNextProtoUnsupported; | 708 return SSLClientSocket::kNextProtoUnsupported; |
| 709 } | 709 } |
| (...skipping 415 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1125 return -1; | 1125 return -1; |
| 1126 } | 1126 } |
| 1127 | 1127 |
| 1128 base::TimeDelta MockSSLClientSocket::GetConnectTimeMicros() const { | 1128 base::TimeDelta MockSSLClientSocket::GetConnectTimeMicros() const { |
| 1129 return base::TimeDelta::FromMicroseconds(-1); | 1129 return base::TimeDelta::FromMicroseconds(-1); |
| 1130 } | 1130 } |
| 1131 | 1131 |
| 1132 void MockSSLClientSocket::GetSSLInfo(SSLInfo* ssl_info) { | 1132 void MockSSLClientSocket::GetSSLInfo(SSLInfo* ssl_info) { |
| 1133 ssl_info->Reset(); | 1133 ssl_info->Reset(); |
| 1134 ssl_info->cert = data_->cert; | 1134 ssl_info->cert = data_->cert; |
| 1135 ssl_info->client_cert_sent = WasOriginBoundCertSent() || | 1135 ssl_info->client_cert_sent = WasDomainBoundCertSent() || |
| 1136 data_->client_cert_sent; | 1136 data_->client_cert_sent; |
| 1137 } | 1137 } |
| 1138 | 1138 |
| 1139 void MockSSLClientSocket::GetSSLCertRequestInfo( | 1139 void MockSSLClientSocket::GetSSLCertRequestInfo( |
| 1140 SSLCertRequestInfo* cert_request_info) { | 1140 SSLCertRequestInfo* cert_request_info) { |
| 1141 DCHECK(cert_request_info); | 1141 DCHECK(cert_request_info); |
| 1142 if (data_->cert_request_info) { | 1142 if (data_->cert_request_info) { |
| 1143 cert_request_info->host_and_port = | 1143 cert_request_info->host_and_port = |
| 1144 data_->cert_request_info->host_and_port; | 1144 data_->cert_request_info->host_and_port; |
| 1145 cert_request_info->client_certs = data_->cert_request_info->client_certs; | 1145 cert_request_info->client_certs = data_->cert_request_info->client_certs; |
| (...skipping 25 matching lines...) Expand all Loading... |
| 1171 return protocol_negotiated_; | 1171 return protocol_negotiated_; |
| 1172 return data_->protocol_negotiated; | 1172 return data_->protocol_negotiated; |
| 1173 } | 1173 } |
| 1174 | 1174 |
| 1175 void MockSSLClientSocket::set_protocol_negotiated( | 1175 void MockSSLClientSocket::set_protocol_negotiated( |
| 1176 SSLClientSocket::NextProto protocol_negotiated) { | 1176 SSLClientSocket::NextProto protocol_negotiated) { |
| 1177 is_protocol_negotiated_set_ = true; | 1177 is_protocol_negotiated_set_ = true; |
| 1178 protocol_negotiated_ = protocol_negotiated; | 1178 protocol_negotiated_ = protocol_negotiated; |
| 1179 } | 1179 } |
| 1180 | 1180 |
| 1181 bool MockSSLClientSocket::WasOriginBoundCertSent() const { | 1181 bool MockSSLClientSocket::WasDomainBoundCertSent() const { |
| 1182 return data_->origin_bound_cert_type != CLIENT_CERT_INVALID_TYPE; | 1182 return data_->domain_bound_cert_type != CLIENT_CERT_INVALID_TYPE; |
| 1183 } | 1183 } |
| 1184 | 1184 |
| 1185 SSLClientCertType MockSSLClientSocket::origin_bound_cert_type() const { | 1185 SSLClientCertType MockSSLClientSocket::domain_bound_cert_type() const { |
| 1186 return data_->origin_bound_cert_type; | 1186 return data_->domain_bound_cert_type; |
| 1187 } | 1187 } |
| 1188 | 1188 |
| 1189 SSLClientCertType MockSSLClientSocket::set_origin_bound_cert_type( | 1189 SSLClientCertType MockSSLClientSocket::set_domain_bound_cert_type( |
| 1190 SSLClientCertType type) { | 1190 SSLClientCertType type) { |
| 1191 return data_->origin_bound_cert_type = type; | 1191 return data_->domain_bound_cert_type = type; |
| 1192 } | 1192 } |
| 1193 | 1193 |
| 1194 OriginBoundCertService* MockSSLClientSocket::GetOriginBoundCertService() const { | 1194 ServerBoundCertService* MockSSLClientSocket::GetServerBoundCertService() const { |
| 1195 return data_->origin_bound_cert_service; | 1195 return data_->server_bound_cert_service; |
| 1196 } | 1196 } |
| 1197 | 1197 |
| 1198 void MockSSLClientSocket::OnReadComplete(const MockRead& data) { | 1198 void MockSSLClientSocket::OnReadComplete(const MockRead& data) { |
| 1199 NOTIMPLEMENTED(); | 1199 NOTIMPLEMENTED(); |
| 1200 } | 1200 } |
| 1201 | 1201 |
| 1202 MockUDPClientSocket::MockUDPClientSocket(SocketDataProvider* data, | 1202 MockUDPClientSocket::MockUDPClientSocket(SocketDataProvider* data, |
| 1203 net::NetLog* net_log) | 1203 net::NetLog* net_log) |
| 1204 : connected_(false), | 1204 : connected_(false), |
| 1205 data_(data), | 1205 data_(data), |
| (...skipping 414 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1620 | 1620 |
| 1621 const char kSOCKS5OkRequest[] = | 1621 const char kSOCKS5OkRequest[] = |
| 1622 { 0x05, 0x01, 0x00, 0x03, 0x04, 'h', 'o', 's', 't', 0x00, 0x50 }; | 1622 { 0x05, 0x01, 0x00, 0x03, 0x04, 'h', 'o', 's', 't', 0x00, 0x50 }; |
| 1623 const int kSOCKS5OkRequestLength = arraysize(kSOCKS5OkRequest); | 1623 const int kSOCKS5OkRequestLength = arraysize(kSOCKS5OkRequest); |
| 1624 | 1624 |
| 1625 const char kSOCKS5OkResponse[] = | 1625 const char kSOCKS5OkResponse[] = |
| 1626 { 0x05, 0x00, 0x00, 0x01, 127, 0, 0, 1, 0x00, 0x50 }; | 1626 { 0x05, 0x00, 0x00, 0x01, 127, 0, 0, 1, 0x00, 0x50 }; |
| 1627 const int kSOCKS5OkResponseLength = arraysize(kSOCKS5OkResponse); | 1627 const int kSOCKS5OkResponseLength = arraysize(kSOCKS5OkResponse); |
| 1628 | 1628 |
| 1629 } // namespace net | 1629 } // namespace net |
| OLD | NEW |