| Index: net/cert/internal/verify_certificate_chain_unittest.cc
|
| diff --git a/net/cert/internal/verify_certificate_chain_unittest.cc b/net/cert/internal/verify_certificate_chain_unittest.cc
|
| index a4443ca2d1c61d60b6c5d43b0d8a67d8aff5ff6d..d21f5ca08ddb2009e3a912fc5b7c93d5087d3ca4 100644
|
| --- a/net/cert/internal/verify_certificate_chain_unittest.cc
|
| +++ b/net/cert/internal/verify_certificate_chain_unittest.cc
|
| @@ -75,7 +75,10 @@ void ReadTestFromFile(const std::string& file_name,
|
| if (block_type == kCertificateHeader) {
|
| chain->push_back(block_data);
|
| } else if (block_type == kTrustedCertificateHeader) {
|
| - ASSERT_TRUE(trust_store->AddTrustedCertificate(block_data));
|
| + scoped_refptr<CertThing> cert(
|
| + CertThing::CreateFromCertificateCopy(block_data));
|
| + ASSERT_TRUE(cert);
|
| + trust_store->AddTrustedCertificate(std::move(cert));
|
| } else if (block_type == kTimeHeader) {
|
| ASSERT_FALSE(has_time) << "Duplicate " << kTimeHeader;
|
| has_time = true;
|
| @@ -221,6 +224,22 @@ TEST(VerifyCertificateChainTest, NonSelfSignedRoot) {
|
| RunTest("non-self-signed-root.pem");
|
| }
|
|
|
| +TEST(VerifyCertificateChainTest, KeyRolloverOldChain) {
|
| + RunTest("key-rollover-oldchain.pem");
|
| +}
|
| +
|
| +TEST(VerifyCertificateChainTest, KeyRolloverRolloverChain) {
|
| + RunTest("key-rollover-rolloverchain.pem");
|
| +}
|
| +
|
| +TEST(VerifyCertificateChainTest, KeyRolloverLongRolloverChain) {
|
| + RunTest("key-rollover-longrolloverchain.pem");
|
| +}
|
| +
|
| +TEST(VerifyCertificateChainTest, KeyRolloverNewChain) {
|
| + RunTest("key-rollover-newchain.pem");
|
| +}
|
| +
|
| // Tests that verifying a chain with no certificates fails.
|
| TEST(VerifyCertificateChainTest, EmptyChainIsInvalid) {
|
| TrustStore trust_store;
|
|
|