| Index: net/base/x509_certificate_unittest.cc
|
| ===================================================================
|
| --- net/base/x509_certificate_unittest.cc (revision 102325)
|
| +++ net/base/x509_certificate_unittest.cc (working copy)
|
| @@ -236,7 +236,7 @@
|
| int flags = X509Certificate::VERIFY_REV_CHECKING_ENABLED |
|
| X509Certificate::VERIFY_EV_CERT;
|
| EXPECT_EQ(OK, google_cert->Verify("www.google.com", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
| }
|
|
|
| @@ -302,7 +302,7 @@
|
| X509Certificate::VERIFY_EV_CERT;
|
| CertVerifyResult verify_result;
|
| EXPECT_EQ(OK, webkit_cert->Verify("webkit.org", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
|
|
| // Test that the wildcard cert matches properly.
|
| @@ -365,12 +365,12 @@
|
| CertVerifyResult verify_result;
|
| // EV cert verification requires revocation checking.
|
| EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| // Consequently, if we don't have revocation checking enabled, we can't claim
|
| // any cert is EV.
|
| flags = X509Certificate::VERIFY_EV_CERT;
|
| EXPECT_EQ(OK, thawte_cert->Verify("www.thawte.com", flags, &verify_result));
|
| - EXPECT_EQ(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_FALSE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| #endif
|
| }
|
|
|
| @@ -402,8 +402,8 @@
|
| // name mismatch, or our certificate blacklist should cause us to report an
|
| // invalid certificate.
|
| #if !defined(OS_MACOSX) && !defined(USE_OPENSSL)
|
| - EXPECT_NE(0, verify_result.cert_status &
|
| - (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
|
| + EXPECT_TRUE(verify_result.cert_status &
|
| + (CERT_STATUS_COMMON_NAME_INVALID | CERT_STATUS_INVALID));
|
| #endif
|
| }
|
|
|
| @@ -464,7 +464,7 @@
|
| CertVerifyResult verify_result;
|
| int error = cert_chain->Verify("www.us.army.mil", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(0U, verify_result.cert_status);
|
| root_certs->Clear();
|
| }
|
|
|
| @@ -499,7 +499,7 @@
|
| X509Certificate::VERIFY_EV_CERT;
|
| int error = cert_chain->Verify("2029.globalsign.com", flags, &verify_result);
|
| if (error == OK)
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_IS_EV);
|
| else
|
| EXPECT_EQ(ERR_CERT_DATE_INVALID, error);
|
| }
|
| @@ -592,7 +592,7 @@
|
| // against agl. Also see PublicKeyHashes in this file.
|
| int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(0U, verify_result.cert_status);
|
| EXPECT_TRUE(verify_result.is_issued_by_known_root);
|
| }
|
|
|
| @@ -666,7 +666,7 @@
|
|
|
| int error = cert_chain->Verify("www.nist.gov", flags, &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0, verify_result.cert_status);
|
| + EXPECT_EQ(0U, verify_result.cert_status);
|
| ASSERT_LE(2u, verify_result.public_key_hashes.size());
|
| EXPECT_EQ(HexEncode(nistSPKIHash, base::SHA1_LENGTH),
|
| HexEncode(verify_result.public_key_hashes[0].data, SHA1_LENGTH));
|
| @@ -696,13 +696,13 @@
|
| EXPECT_EQ(ERR_CERT_AUTHORITY_INVALID, error);
|
| #else
|
| EXPECT_EQ(ERR_CERT_INVALID, error);
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_INVALID);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_INVALID);
|
| #endif
|
| // TODO(wtc): fix http://crbug.com/75520 to get all the certificate errors
|
| // from NSS.
|
| #if !defined(USE_NSS)
|
| // The certificate is issued by an unknown CA.
|
| - EXPECT_NE(0, verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| + EXPECT_TRUE(verify_result.cert_status & CERT_STATUS_AUTHORITY_INVALID);
|
| #endif
|
| }
|
|
|
|
|