Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index 07ef561581240a34723d1739447fa31716614e68..3f87f16b7c8d36d6bb987148099c7a6b9856ec6f 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -103,6 +103,9 @@ bool SupportsDetectingKnownRoots() { |
// the verified certificate chain and detect known roots. |
if (base::android::BuildInfo::GetInstance()->sdk_int() < 17) |
return false; |
+#elif defined(OS_IOS) && defined(USE_OPENSSL) |
+ // iOS does not expose the APIs necessary to get the known system roots. |
+ return false; |
#endif |
return true; |
} |
@@ -223,6 +226,12 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
&verify_result); |
#if defined(USE_NSS_VERIFIER) || defined(OS_ANDROID) |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
+#elif defined(OS_IOS) |
+ // iOS returns a ERR_CERT_INVALID error on the real device, while returning |
+ // a ERR_CERT_AUTHORITY_INVALID on the simulator. |
+ EXPECT_NE(OK, error); |
+ EXPECT_TRUE(verify_result.cert_status & |
+ (CERT_STATUS_AUTHORITY_INVALID | CERT_STATUS_INVALID)); |
#else |
// TOOD(bulach): investigate why macosx and win aren't returning |
// ERR_CERT_INVALID or ERR_CERT_COMMON_NAME_INVALID. |
@@ -1103,8 +1112,8 @@ TEST_F(CertVerifyProcTest, IsIssuedByKnownRootIgnoresTestRoots) { |
EXPECT_FALSE(verify_result.is_issued_by_known_root); |
} |
-#if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) || \ |
- defined(OS_MACOSX) |
+#if defined(USE_NSS_VERIFIER) || defined(OS_WIN) || \ |
+ (defined(OS_MACOSX) && !defined(OS_IOS)) |
// Test that CRLSets are effective in making a certificate appear to be |
// revoked. |
TEST_F(CertVerifyProcTest, CRLSet) { |