Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1412)

Unified Diff: net/url_request/url_request_unittest.cc

Issue 2101303005: CertVerifyProcMac: Add Keychain re-ordering hack, check CRLsets in path pruning loop. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: review changes and url_request_unittest fixes Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« net/data/ssl/certificates/tripadvisor-verisign-chain.pem ('K') | « net/net.gypi ('k') | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/url_request/url_request_unittest.cc
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index 996b481bcfee18b5750dadf67ebbc145ebb38c84..2046450bdd3729cee843342fe040dc74dc096aaa 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -9374,10 +9374,7 @@ TEST_F(HTTPSOCSPTest, Revoked) {
CertStatus cert_status;
DoConnection(ssl_options, &cert_status);
-#if !(defined(OS_MACOSX) && !defined(OS_IOS))
- // Doesn't pass on OS X yet for reasons that need to be investigated.
Ryan Sleevi 2016/08/12 19:50:17 I think this may start causing flaky failures, bec
mattm 2016/08/16 01:41:34 Isn't that a bigger problem then? Wouldn't this te
mattm 2016/08/16 02:14:30 If I'm reading the code correctly, it uses a rando
EXPECT_EQ(CERT_STATUS_REVOKED, cert_status & CERT_STATUS_ALL_ERRORS);
-#endif
EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV);
EXPECT_TRUE(cert_status & CERT_STATUS_REV_CHECKING_ENABLED);
}
@@ -9395,8 +9392,16 @@ TEST_F(HTTPSOCSPTest, Invalid) {
CertStatus cert_status;
DoConnection(ssl_options, &cert_status);
+#if defined(OS_MACOSX) && !defined(OS_IOS)
+ // TODO(mattm): Figure out why CERT_STATUS_UNABLE_TO_CHECK_REVOCATION is
+ // returned for this test but not any of the other ones that use
+ // ExpectedCertStatusForFailedOnlineRevocationCheck.
+ EXPECT_EQ(CERT_STATUS_UNABLE_TO_CHECK_REVOCATION,
+ cert_status & CERT_STATUS_ALL_ERRORS);
+#else
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
Ryan Sleevi 2016/08/12 19:50:17 Looking at the definition of this, shouldn't you j
mattm 2016/08/16 01:41:34 Done. I had to fix HTTPSEVCRLSetTest.MissingCRLSet
cert_status & CERT_STATUS_ALL_ERRORS);
+#endif
// Without a positive OCSP response, we shouldn't show the EV status.
EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV);
« net/data/ssl/certificates/tripadvisor-verisign-chain.pem ('K') | « net/net.gypi ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698