Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(145)

Unified Diff: net/base/x509_certificate_unittest.cc

Issue 7819009: For the SSL cert status, convert anonymous enum that gives bit values into a typedefed uint32. Th... (Closed) Base URL: svn://chrome-svn/chrome/trunk/src/
Patch Set: Created 9 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/x509_certificate_unittest.cc
===================================================================
--- net/base/x509_certificate_unittest.cc (revision 98481)
+++ net/base/x509_certificate_unittest.cc (working copy)
@@ -231,7 +231,7 @@
int flags = X509Certificate::VERIFY_REV_CHECKING_ENABLED |
X509Certificate::VERIFY_EV_CERT;
EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result));
- EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
+ EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
#endif
}
@@ -297,7 +297,7 @@
X509Certificate::VERIFY_EV_CERT;
CertVerifyResult verify_result;
EXPECT_EQ(OK, webkit_cert->Verify("webkit.org", flags, &verify_result));
- EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
+ EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
#endif
// Test that the wildcard cert matches properly.
@@ -360,12 +360,12 @@
CertVerifyResult verify_result;
// EV cert verification requires revocation checking.
EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
- EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
+ EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
// Consequently, if we don't have revocation checking enabled, we can't claim
// any cert is EV.
flags = X509Certificate::VERIFY_EV_CERT;
EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
- EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
+ EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
#endif
}
@@ -397,8 +397,8 @@
// name mismatch, or our certificate blacklist should cause us to report an
// invalid certificate.
#if !defined(OS_MACOSX) && !defined(USE_OPENSSL)
- EXPECT_NE(0, verify_result.cert_status &
- (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
+ EXPECT_TRUE(verify_result.cert_status &
+ (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
#endif
}
@@ -421,7 +421,7 @@
int error = unosoft_hu_cert->Verify("www.unosoft.hu", flags,
&verify_result);
EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
- EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
+ EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
}
TEST(X509CertificateTest, SerialNumbers) {
@@ -481,7 +481,7 @@
CertVerifyResult verify_result;
int error = cert_chain->Verify("www.us.army.mil", flags, &verify_result);
EXPECT_EQ(OK, error);
- EXPECT_EQ(0, verify_result.cert_status);
+ EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
root_certs->Clear();
}
@@ -516,7 +516,7 @@
X509Certificate::VERIFY_EV_CERT;
int error = cert_chain->Verify("2029.globalsign.com", flags, &verify_result);
if (error == OK)
- EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
+ EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
else
EXPECT_EQ(ERR_CERT_DATE_INVALID, error);
}
@@ -545,7 +545,7 @@
// against agl. Also see PublicKeyHashes in this file.
int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
EXPECT_EQ(OK, error);
- EXPECT_EQ(0, verify_result.cert_status);
+ EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
EXPECT_TRUE(verify_result.is_issued_by_known_root);
}
@@ -619,7 +619,7 @@
int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
EXPECT_EQ(OK, error);
- EXPECT_EQ(0, verify_result.cert_status);
+ EXPECT_EQ(CERT_STATUS_NO_ERROR, verify_result.cert_status);
ASSERT_LE(2u, verify_result.public_key_hashes.size());
EXPECT_EQ(HexEncode(nistSPKIHash, base::SHA1_LENGTH),
HexEncode(verify_result.public_key_hashes[0].data, SHA1_LENGTH));
@@ -649,13 +649,13 @@
EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
#else
EXPECT_EQ(ERR_CERT_INVALID, error);
- EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_INVALID);
+ EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID);
#endif
// TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors
// from NSS.
#if !defined(USE_NSS)
// The certificate is issued by an unknown CA.
- EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
+ EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
#endif
}

Powered by Google App Engine
This is Rietveld 408576698