| Index: net/base/cert_database_nss_unittest.cc
|
| diff --git a/net/base/cert_database_nss_unittest.cc b/net/base/cert_database_nss_unittest.cc
|
| index 468c8703304e2cc4baa31fc89937069242977d47..679afc491ad8e881ebf09979090de49fd638acd1 100644
|
| --- a/net/base/cert_database_nss_unittest.cc
|
| +++ b/net/base/cert_database_nss_unittest.cc
|
| @@ -184,8 +184,8 @@ TEST_F(CertDatabaseNSSTest, ImportCACert_SSLTrust) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_SSL,
|
| - &failed));
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_SSL,
|
| + &failed));
|
|
|
| EXPECT_EQ(0U, failed.size());
|
|
|
| @@ -216,8 +216,8 @@ TEST_F(CertDatabaseNSSTest, ImportCACert_EmailTrust) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_EMAIL,
|
| - &failed));
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_EMAIL,
|
| + &failed));
|
|
|
| EXPECT_EQ(0U, failed.size());
|
|
|
| @@ -247,8 +247,8 @@ TEST_F(CertDatabaseNSSTest, ImportCACert_ObjSignTrust) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_OBJ_SIGN,
|
| - &failed));
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_OBJ_SIGN,
|
| + &failed));
|
|
|
| EXPECT_EQ(0U, failed.size());
|
|
|
| @@ -278,8 +278,8 @@ TEST_F(CertDatabaseNSSTest, ImportCA_NotCACert) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true,
|
| - cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_SSL, &failed));
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::TRUSTED_SSL,
|
| + &failed));
|
| ASSERT_EQ(1U, failed.size());
|
| // Note: this compares pointers directly. It's okay in this case because
|
| // ImportCACerts returns the same pointers that were passed in. In the
|
| @@ -302,7 +302,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertHierarchy) {
|
| // work (see
|
| // http://mxr.mozilla.org/mozilla/source/security/nss/lib/certhigh/certvfy.c#752
|
| // "XXX This choice of trustType seems arbitrary.")
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(
|
| certs, CertDatabase::TRUSTED_SSL | CertDatabase::TRUSTED_EMAIL,
|
| &failed));
|
|
|
| @@ -322,7 +322,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertHierarchyDupeRoot) {
|
|
|
| // First import just the root.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(
|
| certs, CertDatabase::TRUSTED_SSL | CertDatabase::TRUSTED_EMAIL,
|
| &failed));
|
|
|
| @@ -337,7 +337,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertHierarchyDupeRoot) {
|
| // Now import with the other certs in the list too. Even though the root is
|
| // already present, we should still import the rest.
|
| failed.clear();
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(
|
| certs, CertDatabase::TRUSTED_SSL | CertDatabase::TRUSTED_EMAIL,
|
| &failed));
|
|
|
| @@ -360,8 +360,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertHierarchyUntrusted) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(certs, CertDatabase::UNTRUSTED,
|
| - &failed));
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(certs, CertDatabase::UNTRUSTED, &failed));
|
|
|
| ASSERT_EQ(1U, failed.size());
|
| EXPECT_EQ("DOD CA-17", failed[0].certificate->subject().common_name);
|
| @@ -382,7 +381,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertHierarchyTree) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(
|
| certs, CertDatabase::TRUSTED_SSL | CertDatabase::TRUSTED_EMAIL,
|
| &failed));
|
|
|
| @@ -406,7 +405,7 @@ TEST_F(CertDatabaseNSSTest, ImportCACertNotHierarchy) {
|
|
|
| // Import it.
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportCACerts(
|
| + EXPECT_TRUE(cert_db_.ImportCACerts(
|
| certs, CertDatabase::TRUSTED_SSL | CertDatabase::TRUSTED_EMAIL |
|
| CertDatabase::TRUSTED_OBJ_SIGN, &failed));
|
|
|
| @@ -434,7 +433,7 @@ TEST_F(CertDatabaseNSSTest, ImportServerCert) {
|
| ASSERT_EQ(2U, certs.size());
|
|
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportServerCert(certs, &failed));
|
| + EXPECT_TRUE(cert_db_.ImportServerCert(certs, &failed));
|
|
|
| EXPECT_EQ(0U, failed.size());
|
|
|
| @@ -462,7 +461,7 @@ TEST_F(CertDatabaseNSSTest, ImportServerCert_SelfSigned) {
|
| ASSERT_TRUE(ReadCertIntoList("punycodetest.der", &certs));
|
|
|
| CertDatabase::ImportCertFailureList failed;
|
| - EXPECT_EQ(true, cert_db_.ImportServerCert(certs, &failed));
|
| + EXPECT_TRUE(cert_db_.ImportServerCert(certs, &failed));
|
|
|
| EXPECT_EQ(0U, failed.size());
|
|
|
|
|