Chromium Code Reviews| Index: net/cert/cert_verify_proc_unittest.cc |
| diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
| index 9d7e7503ba4d62ed1c79cf1b741a88d0d9674c5b..3b6732dcaf496c35f9453cc930e68452f60fa5e1 100644 |
| --- a/net/cert/cert_verify_proc_unittest.cc |
| +++ b/net/cert/cert_verify_proc_unittest.cc |
| @@ -1013,6 +1013,9 @@ TEST_F(CertVerifyProcTest, IsIssuedByKnownRootIgnoresTestRoots) { |
| EXPECT_EQ(0U, verify_result.cert_status); |
| // But should not be marked as a known root. |
| EXPECT_FALSE(verify_result.is_issued_by_known_root); |
| + |
| + root_certs->Clear(); |
|
wtc
2014/03/25 16:00:19
Please add a comment to note why it is necessary t
haavardm
2014/03/25 17:18:03
This call is done like this many places (basically
wtc
2014/03/25 22:24:13
I see. If you think adding a comment for all of th
|
| + EXPECT_TRUE(root_certs->IsEmpty()); |
| } |
| #if defined(OS_MACOSX) && !defined(OS_IOS) |
| @@ -1133,6 +1136,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
| EXPECT_EQ(OK, error); |
| EXPECT_EQ(0U, verify_result.cert_status); |
| + TestRootCerts::GetInstance()->Clear(); |
| + EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty()); |
| } |
| #endif |