Chromium Code Reviews| Index: net/url_request/url_request_unittest.cc |
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
| index 996b481bcfee18b5750dadf67ebbc145ebb38c84..2046450bdd3729cee843342fe040dc74dc096aaa 100644 |
| --- a/net/url_request/url_request_unittest.cc |
| +++ b/net/url_request/url_request_unittest.cc |
| @@ -9374,10 +9374,7 @@ TEST_F(HTTPSOCSPTest, Revoked) { |
| CertStatus cert_status; |
| DoConnection(ssl_options, &cert_status); |
| -#if !(defined(OS_MACOSX) && !defined(OS_IOS)) |
| - // Doesn't pass on OS X yet for reasons that need to be investigated. |
|
Ryan Sleevi
2016/08/12 19:50:17
I think this may start causing flaky failures, bec
mattm
2016/08/16 01:41:34
Isn't that a bigger problem then? Wouldn't this te
mattm
2016/08/16 02:14:30
If I'm reading the code correctly, it uses a rando
|
| EXPECT_EQ(CERT_STATUS_REVOKED, cert_status & CERT_STATUS_ALL_ERRORS); |
| -#endif |
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); |
| EXPECT_TRUE(cert_status & CERT_STATUS_REV_CHECKING_ENABLED); |
| } |
| @@ -9395,8 +9392,16 @@ TEST_F(HTTPSOCSPTest, Invalid) { |
| CertStatus cert_status; |
| DoConnection(ssl_options, &cert_status); |
| +#if defined(OS_MACOSX) && !defined(OS_IOS) |
| + // TODO(mattm): Figure out why CERT_STATUS_UNABLE_TO_CHECK_REVOCATION is |
| + // returned for this test but not any of the other ones that use |
| + // ExpectedCertStatusForFailedOnlineRevocationCheck. |
| + EXPECT_EQ(CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, |
| + cert_status & CERT_STATUS_ALL_ERRORS); |
| +#else |
| EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), |
|
Ryan Sleevi
2016/08/12 19:50:17
Looking at the definition of this, shouldn't you j
mattm
2016/08/16 01:41:34
Done. I had to fix HTTPSEVCRLSetTest.MissingCRLSet
|
| cert_status & CERT_STATUS_ALL_ERRORS); |
| +#endif |
| // Without a positive OCSP response, we shouldn't show the EV status. |
| EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); |