| Index: net/quic/crypto/proof_test.cc
|
| diff --git a/net/quic/crypto/proof_test.cc b/net/quic/crypto/proof_test.cc
|
| index cdca324ebb9674774c7bb8d9931563948cfd5f3b..8042b2b055a0b5cefb1ce33133f59bafc852938c 100644
|
| --- a/net/quic/crypto/proof_test.cc
|
| +++ b/net/quic/crypto/proof_test.cc
|
| @@ -394,16 +394,12 @@ TEST_P(ProofTest, VerifyECDSAKnownAnswerTest) {
|
| sizeof(signature_data_2));
|
|
|
| for (size_t i = 0; i < signatures.size(); i++) {
|
| - LOG(ERROR) << "====================" << i << "======================";
|
| const string& signature = signatures[i];
|
|
|
| - LOG(ERROR) << "=================== expect ok =====================";
|
| RunVerification(verifier.get(), hostname, port, server_config, quic_version,
|
| chlo_hash, certs, signature, true);
|
| - LOG(ERROR) << "=================== hose_name = foo.com =============";
|
| RunVerification(verifier.get(), "foo.com", port, server_config,
|
| quic_version, chlo_hash, certs, signature, false);
|
| - LOG(ERROR) << "================== server_config ====================";
|
| RunVerification(verifier.get(), hostname, port,
|
| server_config.substr(1, string::npos), quic_version,
|
| chlo_hash, certs, signature, false);
|
| @@ -412,13 +408,11 @@ TEST_P(ProofTest, VerifyECDSAKnownAnswerTest) {
|
| // signature can still be DER-decoded correctly.
|
| string corrupt_signature = signature;
|
| corrupt_signature[corrupt_signature.size() - 1] += 1;
|
| - LOG(ERROR) << "================= corrupt signature =======================";
|
| RunVerification(verifier.get(), hostname, port, server_config, quic_version,
|
| chlo_hash, certs, corrupt_signature, false);
|
|
|
| // Prepending a "1" makes the DER invalid.
|
| const string bad_der_signature1 = "1" + signature;
|
| - LOG(ERROR) << "=========================bad der signature ===============";
|
| RunVerification(verifier.get(), hostname, port, server_config, quic_version,
|
| chlo_hash, certs, bad_der_signature1, false);
|
|
|
| @@ -426,7 +420,6 @@ TEST_P(ProofTest, VerifyECDSAKnownAnswerTest) {
|
| for (size_t i = 1; i < certs.size(); i++) {
|
| wrong_certs.push_back(certs[i]);
|
| }
|
| - LOG(ERROR) << "==================== wrong certs =========================";
|
| RunVerification(verifier.get(), hostname, port, server_config, quic_version,
|
| chlo_hash, wrong_certs, signature, false);
|
| }
|
|
|