summaryrefslogtreecommitdiff
path: root/chromium/net/cert/mock_cert_verifier.h
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/cert/mock_cert_verifier.h')
-rw-r--r--chromium/net/cert/mock_cert_verifier.h87
1 files changed, 87 insertions, 0 deletions
diff --git a/chromium/net/cert/mock_cert_verifier.h b/chromium/net/cert/mock_cert_verifier.h
new file mode 100644
index 00000000000..704c66b2b80
--- /dev/null
+++ b/chromium/net/cert/mock_cert_verifier.h
@@ -0,0 +1,87 @@
+// Copyright (c) 2012 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_CERT_MOCK_CERT_VERIFIER_H_
+#define NET_CERT_MOCK_CERT_VERIFIER_H_
+
+#include <list>
+
+#include "net/cert/cert_verifier.h"
+#include "net/cert/cert_verify_result.h"
+
+namespace net {
+
+class MockCertVerifier : public CertVerifier {
+ public:
+ // Creates a new MockCertVerifier. By default, any call to Verify() will
+ // result in the cert status being flagged as CERT_STATUS_INVALID and return
+ // an ERR_CERT_INVALID network error code. This behaviour can be overridden
+ // by calling set_default_result() to change the default return value for
+ // Verify() or by calling one of the AddResult*() methods to specifically
+ // handle a certificate or certificate and host.
+ MockCertVerifier();
+
+ virtual ~MockCertVerifier();
+
+ // CertVerifier implementation
+ virtual int Verify(X509Certificate* cert,
+ const std::string& hostname,
+ int flags,
+ CRLSet* crl_set,
+ CertVerifyResult* verify_result,
+ const CompletionCallback& callback,
+ RequestHandle* out_req,
+ const BoundNetLog& net_log) OVERRIDE;
+ virtual void CancelRequest(RequestHandle req) OVERRIDE;
+
+ // Sets the default return value for Verify() for certificates/hosts that do
+ // not have explicit results added via the AddResult*() methods.
+ void set_default_result(int default_result) {
+ default_result_ = default_result;
+ }
+
+ // Adds a rule that will cause any call to Verify() for |cert| to return rv,
+ // copying |verify_result| into the verified result.
+ // Note: Only the primary certificate of |cert| is checked. Any intermediate
+ // certificates will be ignored.
+ void AddResultForCert(X509Certificate* cert,
+ const CertVerifyResult& verify_result,
+ int rv);
+
+ // Same as AddResultForCert(), but further restricts it to only return for
+ // hostnames that match |host_pattern|.
+ void AddResultForCertAndHost(X509Certificate* cert,
+ const std::string& host_pattern,
+ const CertVerifyResult& verify_result,
+ int rv);
+
+ private:
+ struct Rule {
+ Rule(X509Certificate* cert,
+ const std::string& hostname,
+ const CertVerifyResult& result,
+ int rv)
+ : cert(cert),
+ hostname(hostname),
+ result(result),
+ rv(rv) {
+ DCHECK(cert);
+ DCHECK(result.verified_cert.get());
+ }
+
+ scoped_refptr<X509Certificate> cert;
+ std::string hostname;
+ CertVerifyResult result;
+ int rv;
+ };
+
+ typedef std::list<Rule> RuleList;
+
+ int default_result_;
+ RuleList rules_;
+};
+
+} // namespace net
+
+#endif // NET_CERT_MOCK_CERT_VERIFIER_H_