| Index: net/ssl/server_bound_cert_service_unittest.cc
|
| diff --git a/net/ssl/server_bound_cert_service_unittest.cc b/net/ssl/server_bound_cert_service_unittest.cc
|
| index 4d0c6f471452efae4e3f53bc584346070001aef7..7f8784ca26c93a6f88f84306eb198bcf7a546bab 100644
|
| --- a/net/ssl/server_bound_cert_service_unittest.cc
|
| +++ b/net/ssl/server_bound_cert_service_unittest.cc
|
| @@ -528,7 +528,7 @@ TEST_F(ServerBoundCertServiceTest, Expiration) {
|
| TestCompletionCallback callback;
|
| ServerBoundCertService::RequestHandle request_handle;
|
|
|
| - // Cert still valid - synchronous completion.
|
| + // Cert is valid - synchronous completion.
|
| SSLClientCertType type1;
|
| std::string private_key_info1, der_cert1;
|
| error = service_->GetDomainBoundCert(
|
| @@ -541,20 +541,18 @@ TEST_F(ServerBoundCertServiceTest, Expiration) {
|
| EXPECT_STREQ("a", private_key_info1.c_str());
|
| EXPECT_STREQ("b", der_cert1.c_str());
|
|
|
| - // Cert expired - New cert will be generated, asynchronous completion.
|
| + // Expired cert is valid as well - synchronous completion.
|
| SSLClientCertType type2;
|
| std::string private_key_info2, der_cert2;
|
| error = service_->GetDomainBoundCert(
|
| "https://expired", types, &type2, &private_key_info2, &der_cert2,
|
| callback.callback(), &request_handle);
|
| - EXPECT_EQ(ERR_IO_PENDING, error);
|
| - EXPECT_TRUE(request_handle.is_active());
|
| - error = callback.WaitForResult();
|
| EXPECT_EQ(OK, error);
|
| + EXPECT_FALSE(request_handle.is_active());
|
| EXPECT_EQ(2, service_->cert_count());
|
| EXPECT_EQ(CLIENT_CERT_ECDSA_SIGN, type2);
|
| - EXPECT_LT(1U, private_key_info2.size());
|
| - EXPECT_LT(1U, der_cert2.size());
|
| + EXPECT_STREQ("c", private_key_info2.c_str());
|
| + EXPECT_STREQ("d", der_cert2.c_str());
|
| }
|
|
|
| #endif // !defined(USE_OPENSSL)
|
|
|