diff options
author | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2019-07-31 15:50:41 +0200 |
---|---|---|
committer | Allan Sandfeld Jensen <allan.jensen@qt.io> | 2019-08-30 12:35:23 +0000 |
commit | 7b2ffa587235a47d4094787d72f38102089f402a (patch) | |
tree | 30e82af9cbab08a7fa028bb18f4f2987a3f74dfa /chromium/device/fido/u2f_command_constructor_unittest.cc | |
parent | d94af01c90575348c4e81a418257f254b6f8d225 (diff) | |
download | qtwebengine-chromium-7b2ffa587235a47d4094787d72f38102089f402a.tar.gz |
BASELINE: Update Chromium to 76.0.3809.94
Change-Id: I321c3f5f929c105aec0f98c5091ef6108822e647
Reviewed-by: Michael BrĂ¼ning <michael.bruning@qt.io>
Diffstat (limited to 'chromium/device/fido/u2f_command_constructor_unittest.cc')
-rw-r--r-- | chromium/device/fido/u2f_command_constructor_unittest.cc | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/chromium/device/fido/u2f_command_constructor_unittest.cc b/chromium/device/fido/u2f_command_constructor_unittest.cc index deadbc8b87f..31205600314 100644 --- a/chromium/device/fido/u2f_command_constructor_unittest.cc +++ b/chromium/device/fido/u2f_command_constructor_unittest.cc @@ -20,7 +20,7 @@ namespace { CtapMakeCredentialRequest ConstructMakeCredentialRequest() { PublicKeyCredentialRpEntity rp("acme.com"); - rp.SetRpName("acme.com"); + rp.name = "acme.com"; PublicKeyCredentialUserEntity user( fido_parsing_utils::Materialize(test_data::kUserId)); @@ -73,7 +73,7 @@ TEST(U2fCommandConstructorTest, TestConvertCtapMakeCredentialToU2fRegister) { TEST(U2fCommandConstructorTest, TestU2fRegisterCredentialAlgorithmRequirement) { PublicKeyCredentialRpEntity rp("acme.com"); - rp.SetRpName("acme.com"); + rp.name = "acme.com"; PublicKeyCredentialUserEntity user( fido_parsing_utils::Materialize(test_data::kUserId)); @@ -90,15 +90,15 @@ TEST(U2fCommandConstructorTest, TestU2fRegisterCredentialAlgorithmRequirement) { TEST(U2fCommandConstructorTest, TestU2fRegisterUserVerificationRequirement) { auto make_credential_param = ConstructMakeCredentialRequest(); - make_credential_param.SetUserVerification( - UserVerificationRequirement::kRequired); + make_credential_param.user_verification = + UserVerificationRequirement::kRequired; EXPECT_FALSE(IsConvertibleToU2fRegisterCommand(make_credential_param)); } TEST(U2fCommandConstructorTest, TestU2fRegisterResidentKeyRequirement) { auto make_credential_param = ConstructMakeCredentialRequest(); - make_credential_param.SetResidentKeyRequired(true); + make_credential_param.resident_key_required = true; EXPECT_FALSE(IsConvertibleToU2fRegisterCommand(make_credential_param)); } @@ -118,7 +118,7 @@ TEST(U2fCommandConstructorTest, TestConvertCtapGetAssertionToU2fSignRequest) { allowed_list.push_back(PublicKeyCredentialDescriptor( CredentialType::kPublicKey, fido_parsing_utils::Materialize(test_data::kU2fSignKeyHandle))); - get_assertion_req.SetAllowList(std::move(allowed_list)); + get_assertion_req.allow_list = std::move(allowed_list); const auto u2f_sign_command = ConvertToU2fSignCommand( get_assertion_req, ApplicationParameterType::kPrimary, @@ -141,8 +141,8 @@ TEST(U2fCommandConstructorTest, TestU2fSignUserVerificationRequirement) { allowed_list.push_back(PublicKeyCredentialDescriptor( CredentialType::kPublicKey, fido_parsing_utils::Materialize(test_data::kU2fSignKeyHandle))); - get_assertion_req.SetAllowList(std::move(allowed_list)); - get_assertion_req.SetUserVerification(UserVerificationRequirement::kRequired); + get_assertion_req.allow_list = std::move(allowed_list); + get_assertion_req.user_verification = UserVerificationRequirement::kRequired; EXPECT_FALSE(IsConvertibleToU2fSignCommand(get_assertion_req)); } |