| Index: net/base/x509_certificate_unittest.cc
|
| ===================================================================
|
| --- net/base/x509_certificate_unittest.cc (revision 98481)
|
| +++ net/base/x509_certificate_unittest.cc (working copy)
|
| @@ -231,7 +231,7 @@
|
| int flags = X509Certificate::VERIFY_REV_CHECKING_ENABLED |
|
| X509Certificate::VERIFY_EV_CERT;
|
| EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
| }
|
|
|
| @@ -297,7 +297,7 @@
|
| X509Certificate::VERIFY_EV_CERT;
|
| CertVerifyResult verify_result;
|
| EXPECT_EQ(OK, webkit_cert->Verify("webkit.org", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
|
|
| // Test that the wildcard cert matches properly.
|
| @@ -360,12 +360,12 @@
|
| CertVerifyResult verify_result;
|
| // EV cert verification requires revocation checking.
|
| EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| // Consequently, if we don't have revocation checking enabled, we can't claim
|
| // any cert is EV.
|
| flags = X509Certificate::VERIFY_EV_CERT;
|
| EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
| }
|
|
|
| @@ -397,8 +397,8 @@
|
| // name mismatch, or our certificate blacklist should cause us to report an
|
| // invalid certificate.
|
| #if !defined(OS_MACOSX) && !defined(USE_OPENSSL)
|
| - EXPECT_NE(0, verify_result.cert_status &
|
| - (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
|
| + EXPECT_TRUE(verify_result.cert_status &
|
| + (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
|
| #endif
|
| }
|
|
|
| @@ -421,7 +421,7 @@
|
| int error = unosoft_hu_cert->Verify("www.unosoft.hu", flags,
|
| &verify_result);
|
| EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| }
|
|
|
| TEST(X509CertificateTest, SerialNumbers) {
|
| @@ -481,7 +481,7 @@
|
| CertVerifyResult verify_result;
|
| int error = cert_chain->Verify("www.us.army.mil", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
|
| root_certs->Clear();
|
| }
|
|
|
| @@ -516,7 +516,7 @@
|
| X509Certificate::VERIFY_EV_CERT;
|
| int error = cert_chain->Verify("2029.globalsign.com", flags, &verify_result);
|
| if (error == OK)
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| else
|
| EXPECT_EQ(ERR_CERT_DATE_INVALID, error);
|
| }
|
| @@ -545,7 +545,7 @@
|
| // against agl. Also see PublicKeyHashes in this file.
|
| int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
|
| EXPECT_TRUE(verify_result.is_issued_by_known_root);
|
| }
|
|
|
| @@ -619,7 +619,7 @@
|
|
|
| int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
|
| ASSERT_LE(2u, verify_result.public_key_hashes.size());
|
| EXPECT_EQ(HexEncode(nistSPKIHash, base::SHA1_LENGTH),
|
| HexEncode(verify_result.public_key_hashes[0].data, SHA1_LENGTH));
|
| @@ -649,13 +649,13 @@
|
| EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
|
| #else
|
| EXPECT_EQ(ERR_CERT_INVALID, error);
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_INVALID);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID);
|
| #endif
|
| // TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors
|
| // from NSS.
|
| #if !defined(USE_NSS)
|
| // The certificate is issued by an unknown CA.
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| #endif
|
| }
|
|
|
|
|