| Index: net/base/x509_certificate_unittest.cc
|
| diff --git a/net/base/x509_certificate_unittest.cc b/net/base/x509_certificate_unittest.cc
|
| index 6663a9fa445e51a50068eff3ea6cbd7c916dc658..a9426c4c42a5cde7263ee27b307993911339ad2b 100644
|
| --- a/net/base/x509_certificate_unittest.cc
|
| +++ b/net/base/x509_certificate_unittest.cc
|
| @@ -12,6 +12,7 @@
|
| #include "net/base/net_errors.h"
|
| #include "net/base/test_certificate_data.h"
|
| #include "net/base/x509_certificate.h"
|
| +#include "net/base/x509_chain.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
|
|
| // Unit tests aren't allowed to access external resources. Unfortunately, to
|
| @@ -244,9 +245,10 @@ void CheckGoogleCert(const scoped_refptr<X509Certificate>& google_cert,
|
| #if TEST_EV
|
| // TODO(avi): turn this on for the Mac once EV checking is implemented.
|
| CertVerifyResult verify_result;
|
| - int flags = X509Certificate::VERIFY_REV_CHECKING_ENABLED |
|
| - X509Certificate::VERIFY_EV_CERT;
|
| - EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result));
|
| + int flags = x509_chain::VERIFY_REV_CHECKING_ENABLED |
|
| + x509_chain::VERIFY_EV_CERT;
|
| + EXPECT_EQ(OK, x509_chain::VerifySSLServer(google_cert, "www.google.com",
|
| + flags, &verify_result));
|
| EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
| }
|
| @@ -364,8 +366,8 @@ TEST(X509CertificateTest, ThawteCertParsing) {
|
| EXPECT_EQ("www.thawte.com", dns_names[0]);
|
|
|
| #if TEST_EV
|
| - int flags = X509Certificate::VERIFY_REV_CHECKING_ENABLED |
|
| - X509Certificate::VERIFY_EV_CERT;
|
| + int flags = x509_chain::VERIFY_REV_CHECKING_ENABLED |
|
| + x509_chain::VERIFY_EV_CERT;
|
| CertVerifyResult verify_result;
|
| // EV cert verification requires revocation checking.
|
| EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
|
| @@ -393,8 +395,8 @@ TEST(X509CertificateTest, PaypalNullCertParsing) {
|
|
|
| int flags = 0;
|
| CertVerifyResult verify_result;
|
| - int error = paypal_null_cert->Verify("www.paypal.com", flags,
|
| - &verify_result);
|
| + int error = x509_chain::VerifySSLServer(paypal_null_cert, "www.paypal.com",
|
| + flags, &verify_result);
|
| EXPECT_NE(OK, error);
|
| // Either the system crypto library should correctly report a certificate
|
| // name mismatch, or our certificate blacklist should cause us to report an
|
| @@ -421,8 +423,8 @@ TEST(X509CertificateTest, UnoSoftCertParsing) {
|
|
|
| int flags = 0;
|
| CertVerifyResult verify_result;
|
| - int error = unosoft_hu_cert->Verify("www.unosoft.hu", flags,
|
| - &verify_result);
|
| + int error = x509_chain::VerifySSLServer(unosoft_hu_cert, "www.unosoft.hu",
|
| + flags, &verify_result);
|
| EXPECT_NE(OK, error);
|
| EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| }
|
| @@ -460,7 +462,8 @@ TEST(X509CertificateTest, IntermediateCARequireExplicitPolicy) {
|
|
|
| int flags = 0;
|
| CertVerifyResult verify_result;
|
| - int error = cert_chain->Verify("www.us.army.mil", flags, &verify_result);
|
| + int error = x509_chain::VerifySSLServer(server_cert, "www.us.army.mil",
|
| + flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| EXPECT_EQ(0, verify_result.cert_status);
|
| }
|
|
|