summaryrefslogtreecommitdiff
path: root/chromium/device/fido/u2f_command_constructor_unittest.cc
diff options
context:
space:
mode:
authorAllan Sandfeld Jensen <allan.jensen@qt.io>2019-07-31 15:50:41 +0200
committerAllan Sandfeld Jensen <allan.jensen@qt.io>2019-08-30 12:35:23 +0000
commit7b2ffa587235a47d4094787d72f38102089f402a (patch)
tree30e82af9cbab08a7fa028bb18f4f2987a3f74dfa /chromium/device/fido/u2f_command_constructor_unittest.cc
parentd94af01c90575348c4e81a418257f254b6f8d225 (diff)
downloadqtwebengine-chromium-7b2ffa587235a47d4094787d72f38102089f402a.tar.gz
BASELINE: Update Chromium to 76.0.3809.94
Change-Id: I321c3f5f929c105aec0f98c5091ef6108822e647 Reviewed-by: Michael BrĂ¼ning <michael.bruning@qt.io>
Diffstat (limited to 'chromium/device/fido/u2f_command_constructor_unittest.cc')
-rw-r--r--chromium/device/fido/u2f_command_constructor_unittest.cc16
1 files changed, 8 insertions, 8 deletions
diff --git a/chromium/device/fido/u2f_command_constructor_unittest.cc b/chromium/device/fido/u2f_command_constructor_unittest.cc
index deadbc8b87f..31205600314 100644
--- a/chromium/device/fido/u2f_command_constructor_unittest.cc
+++ b/chromium/device/fido/u2f_command_constructor_unittest.cc
@@ -20,7 +20,7 @@ namespace {
CtapMakeCredentialRequest ConstructMakeCredentialRequest() {
PublicKeyCredentialRpEntity rp("acme.com");
- rp.SetRpName("acme.com");
+ rp.name = "acme.com";
PublicKeyCredentialUserEntity user(
fido_parsing_utils::Materialize(test_data::kUserId));
@@ -73,7 +73,7 @@ TEST(U2fCommandConstructorTest, TestConvertCtapMakeCredentialToU2fRegister) {
TEST(U2fCommandConstructorTest, TestU2fRegisterCredentialAlgorithmRequirement) {
PublicKeyCredentialRpEntity rp("acme.com");
- rp.SetRpName("acme.com");
+ rp.name = "acme.com";
PublicKeyCredentialUserEntity user(
fido_parsing_utils::Materialize(test_data::kUserId));
@@ -90,15 +90,15 @@ TEST(U2fCommandConstructorTest, TestU2fRegisterCredentialAlgorithmRequirement) {
TEST(U2fCommandConstructorTest, TestU2fRegisterUserVerificationRequirement) {
auto make_credential_param = ConstructMakeCredentialRequest();
- make_credential_param.SetUserVerification(
- UserVerificationRequirement::kRequired);
+ make_credential_param.user_verification =
+ UserVerificationRequirement::kRequired;
EXPECT_FALSE(IsConvertibleToU2fRegisterCommand(make_credential_param));
}
TEST(U2fCommandConstructorTest, TestU2fRegisterResidentKeyRequirement) {
auto make_credential_param = ConstructMakeCredentialRequest();
- make_credential_param.SetResidentKeyRequired(true);
+ make_credential_param.resident_key_required = true;
EXPECT_FALSE(IsConvertibleToU2fRegisterCommand(make_credential_param));
}
@@ -118,7 +118,7 @@ TEST(U2fCommandConstructorTest, TestConvertCtapGetAssertionToU2fSignRequest) {
allowed_list.push_back(PublicKeyCredentialDescriptor(
CredentialType::kPublicKey,
fido_parsing_utils::Materialize(test_data::kU2fSignKeyHandle)));
- get_assertion_req.SetAllowList(std::move(allowed_list));
+ get_assertion_req.allow_list = std::move(allowed_list);
const auto u2f_sign_command = ConvertToU2fSignCommand(
get_assertion_req, ApplicationParameterType::kPrimary,
@@ -141,8 +141,8 @@ TEST(U2fCommandConstructorTest, TestU2fSignUserVerificationRequirement) {
allowed_list.push_back(PublicKeyCredentialDescriptor(
CredentialType::kPublicKey,
fido_parsing_utils::Materialize(test_data::kU2fSignKeyHandle)));
- get_assertion_req.SetAllowList(std::move(allowed_list));
- get_assertion_req.SetUserVerification(UserVerificationRequirement::kRequired);
+ get_assertion_req.allow_list = std::move(allowed_list);
+ get_assertion_req.user_verification = UserVerificationRequirement::kRequired;
EXPECT_FALSE(IsConvertibleToU2fSignCommand(get_assertion_req));
}