| Index: net/cert/nss_profile_filter_chromeos_unittest.cc
|
| diff --git a/net/cert/nss_profile_filter_chromeos_unittest.cc b/net/cert/nss_profile_filter_chromeos_unittest.cc
|
| index 8f3806186139fb97608dcd718cc9b9653e9b7558..337260251192fe4831842c26bb6ac913da201025 100644
|
| --- a/net/cert/nss_profile_filter_chromeos_unittest.cc
|
| +++ b/net/cert/nss_profile_filter_chromeos_unittest.cc
|
| @@ -101,9 +101,10 @@ class NSSProfileFilterChromeOSTest : public testing::Test {
|
|
|
| TEST_F(NSSProfileFilterChromeOSTest, TempCertAllowed) {
|
| EXPECT_EQ(NULL, certs_[0]->os_cert_handle()->slot);
|
| - EXPECT_TRUE(no_slots_profile_filter_.IsCertAllowed(certs_[0]));
|
| - EXPECT_TRUE(profile_filter_1_.IsCertAllowed(certs_[0]));
|
| - EXPECT_TRUE(profile_filter_2_.IsCertAllowed(certs_[0]));
|
| + EXPECT_TRUE(
|
| + no_slots_profile_filter_.IsCertAllowed(certs_[0]->os_cert_handle()));
|
| + EXPECT_TRUE(profile_filter_1_.IsCertAllowed(certs_[0]->os_cert_handle()));
|
| + EXPECT_TRUE(profile_filter_2_.IsCertAllowed(certs_[0]->os_cert_handle()));
|
| }
|
|
|
| TEST_F(NSSProfileFilterChromeOSTest, InternalSlotAllowed) {
|
| @@ -130,9 +131,10 @@ TEST_F(NSSProfileFilterChromeOSTest, RootCertsAllowed) {
|
|
|
| CertificateList root_certs(ListCertsInSlot(root_certs_slot.get()));
|
| ASSERT_FALSE(root_certs.empty());
|
| - EXPECT_TRUE(no_slots_profile_filter_.IsCertAllowed(root_certs[0]));
|
| - EXPECT_TRUE(profile_filter_1_.IsCertAllowed(root_certs[0]));
|
| - EXPECT_TRUE(profile_filter_2_.IsCertAllowed(root_certs[0]));
|
| + EXPECT_TRUE(
|
| + no_slots_profile_filter_.IsCertAllowed(root_certs[0]->os_cert_handle()));
|
| + EXPECT_TRUE(profile_filter_1_.IsCertAllowed(root_certs[0]->os_cert_handle()));
|
| + EXPECT_TRUE(profile_filter_2_.IsCertAllowed(root_certs[0]->os_cert_handle()));
|
| }
|
|
|
| TEST_F(NSSProfileFilterChromeOSTest, SoftwareSlots) {
|
| @@ -163,14 +165,16 @@ TEST_F(NSSProfileFilterChromeOSTest, SoftwareSlots) {
|
| "cert2",
|
| PR_FALSE /* includeTrust (unused) */));
|
|
|
| - EXPECT_FALSE(no_slots_profile_filter_.IsCertAllowed(cert_1));
|
| - EXPECT_FALSE(no_slots_profile_filter_.IsCertAllowed(cert_2));
|
| + EXPECT_FALSE(
|
| + no_slots_profile_filter_.IsCertAllowed(cert_1->os_cert_handle()));
|
| + EXPECT_FALSE(
|
| + no_slots_profile_filter_.IsCertAllowed(cert_2->os_cert_handle()));
|
|
|
| - EXPECT_TRUE(profile_filter_1_.IsCertAllowed(cert_1));
|
| - EXPECT_FALSE(profile_filter_1_.IsCertAllowed(cert_2));
|
| + EXPECT_TRUE(profile_filter_1_.IsCertAllowed(cert_1->os_cert_handle()));
|
| + EXPECT_FALSE(profile_filter_1_.IsCertAllowed(cert_2->os_cert_handle()));
|
|
|
| - EXPECT_FALSE(profile_filter_2_.IsCertAllowed(cert_1));
|
| - EXPECT_TRUE(profile_filter_2_.IsCertAllowed(cert_2));
|
| + EXPECT_FALSE(profile_filter_2_.IsCertAllowed(cert_1->os_cert_handle()));
|
| + EXPECT_TRUE(profile_filter_2_.IsCertAllowed(cert_2->os_cert_handle()));
|
| }
|
|
|
| } // namespace net
|
|
|