Upstream version 5.34.104.0
[platform/framework/web/crosswalk.git] / src / net / cert / nss_profile_filter_chromeos_unittest.cc
index 8f38061..60ceeb1 100644 (file)
@@ -76,6 +76,8 @@ class NSSProfileFilterChromeOSTest : public testing::Test {
         crypto::GetPublicSlotForChromeOSUser(user_1_.username_hash()),
         private_slot_1.Pass());
 
+    profile_filter_1_copy_ = profile_filter_1_;
+
     crypto::ScopedPK11Slot private_slot_2(crypto::GetPrivateSlotForChromeOSUser(
         user_2_.username_hash(),
         base::Callback<void(crypto::ScopedPK11Slot)>()));
@@ -97,13 +99,17 @@ class NSSProfileFilterChromeOSTest : public testing::Test {
   NSSProfileFilterChromeOS no_slots_profile_filter_;
   NSSProfileFilterChromeOS profile_filter_1_;
   NSSProfileFilterChromeOS profile_filter_2_;
+  NSSProfileFilterChromeOS profile_filter_1_copy_;
 };
 
-TEST_F(NSSProfileFilterChromeOSTest, TempCertAllowed) {
+TEST_F(NSSProfileFilterChromeOSTest, TempCertNotAllowed) {
   EXPECT_EQ(NULL, certs_[0]->os_cert_handle()->slot);
-  EXPECT_TRUE(no_slots_profile_filter_.IsCertAllowed(certs_[0]));
-  EXPECT_TRUE(profile_filter_1_.IsCertAllowed(certs_[0]));
-  EXPECT_TRUE(profile_filter_2_.IsCertAllowed(certs_[0]));
+  EXPECT_FALSE(
+      no_slots_profile_filter_.IsCertAllowed(certs_[0]->os_cert_handle()));
+  EXPECT_FALSE(profile_filter_1_.IsCertAllowed(certs_[0]->os_cert_handle()));
+  EXPECT_FALSE(
+      profile_filter_1_copy_.IsCertAllowed(certs_[0]->os_cert_handle()));
+  EXPECT_FALSE(profile_filter_2_.IsCertAllowed(certs_[0]->os_cert_handle()));
 }
 
 TEST_F(NSSProfileFilterChromeOSTest, InternalSlotAllowed) {
@@ -111,6 +117,7 @@ TEST_F(NSSProfileFilterChromeOSTest, InternalSlotAllowed) {
   ASSERT_TRUE(internal_slot.get());
   EXPECT_TRUE(no_slots_profile_filter_.IsModuleAllowed(internal_slot.get()));
   EXPECT_TRUE(profile_filter_1_.IsModuleAllowed(internal_slot.get()));
+  EXPECT_TRUE(profile_filter_1_copy_.IsModuleAllowed(internal_slot.get()));
   EXPECT_TRUE(profile_filter_2_.IsModuleAllowed(internal_slot.get()));
 
   crypto::ScopedPK11Slot internal_key_slot(PK11_GetInternalKeySlot());
@@ -118,6 +125,7 @@ TEST_F(NSSProfileFilterChromeOSTest, InternalSlotAllowed) {
   EXPECT_TRUE(
       no_slots_profile_filter_.IsModuleAllowed(internal_key_slot.get()));
   EXPECT_TRUE(profile_filter_1_.IsModuleAllowed(internal_key_slot.get()));
+  EXPECT_TRUE(profile_filter_1_copy_.IsModuleAllowed(internal_key_slot.get()));
   EXPECT_TRUE(profile_filter_2_.IsModuleAllowed(internal_key_slot.get()));
 }
 
@@ -126,13 +134,17 @@ TEST_F(NSSProfileFilterChromeOSTest, RootCertsAllowed) {
   ASSERT_TRUE(root_certs_slot.get());
   EXPECT_TRUE(no_slots_profile_filter_.IsModuleAllowed(root_certs_slot.get()));
   EXPECT_TRUE(profile_filter_1_.IsModuleAllowed(root_certs_slot.get()));
+  EXPECT_TRUE(profile_filter_1_copy_.IsModuleAllowed(root_certs_slot.get()));
   EXPECT_TRUE(profile_filter_2_.IsModuleAllowed(root_certs_slot.get()));
 
   CertificateList root_certs(ListCertsInSlot(root_certs_slot.get()));
   ASSERT_FALSE(root_certs.empty());
-  EXPECT_TRUE(no_slots_profile_filter_.IsCertAllowed(root_certs[0]));
-  EXPECT_TRUE(profile_filter_1_.IsCertAllowed(root_certs[0]));
-  EXPECT_TRUE(profile_filter_2_.IsCertAllowed(root_certs[0]));
+  EXPECT_TRUE(
+      no_slots_profile_filter_.IsCertAllowed(root_certs[0]->os_cert_handle()));
+  EXPECT_TRUE(profile_filter_1_.IsCertAllowed(root_certs[0]->os_cert_handle()));
+  EXPECT_TRUE(
+      profile_filter_1_copy_.IsCertAllowed(root_certs[0]->os_cert_handle()));
+  EXPECT_TRUE(profile_filter_2_.IsCertAllowed(root_certs[0]->os_cert_handle()));
 }
 
 TEST_F(NSSProfileFilterChromeOSTest, SoftwareSlots) {
@@ -163,14 +175,18 @@ TEST_F(NSSProfileFilterChromeOSTest, SoftwareSlots) {
                             "cert2",
                             PR_FALSE /* includeTrust (unused) */));
 
-  EXPECT_FALSE(no_slots_profile_filter_.IsCertAllowed(cert_1));
-  EXPECT_FALSE(no_slots_profile_filter_.IsCertAllowed(cert_2));
+  EXPECT_FALSE(
+      no_slots_profile_filter_.IsCertAllowed(cert_1->os_cert_handle()));
+  EXPECT_FALSE(
+      no_slots_profile_filter_.IsCertAllowed(cert_2->os_cert_handle()));
 
-  EXPECT_TRUE(profile_filter_1_.IsCertAllowed(cert_1));
-  EXPECT_FALSE(profile_filter_1_.IsCertAllowed(cert_2));
+  EXPECT_TRUE(profile_filter_1_.IsCertAllowed(cert_1->os_cert_handle()));
+  EXPECT_TRUE(profile_filter_1_copy_.IsCertAllowed(cert_1->os_cert_handle()));
+  EXPECT_FALSE(profile_filter_1_.IsCertAllowed(cert_2->os_cert_handle()));
+  EXPECT_FALSE(profile_filter_1_copy_.IsCertAllowed(cert_2->os_cert_handle()));
 
-  EXPECT_FALSE(profile_filter_2_.IsCertAllowed(cert_1));
-  EXPECT_TRUE(profile_filter_2_.IsCertAllowed(cert_2));
+  EXPECT_FALSE(profile_filter_2_.IsCertAllowed(cert_1->os_cert_handle()));
+  EXPECT_TRUE(profile_filter_2_.IsCertAllowed(cert_2->os_cert_handle()));
 }
 
 }  // namespace net