Index: net/url_request/url_request_unittest.cc |
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc |
index 996b481bcfee18b5750dadf67ebbc145ebb38c84..2046450bdd3729cee843342fe040dc74dc096aaa 100644 |
--- a/net/url_request/url_request_unittest.cc |
+++ b/net/url_request/url_request_unittest.cc |
@@ -9374,10 +9374,7 @@ TEST_F(HTTPSOCSPTest, Revoked) { |
CertStatus cert_status; |
DoConnection(ssl_options, &cert_status); |
-#if !(defined(OS_MACOSX) && !defined(OS_IOS)) |
- // Doesn't pass on OS X yet for reasons that need to be investigated. |
Ryan Sleevi
2016/08/12 19:50:17
I think this may start causing flaky failures, bec
mattm
2016/08/16 01:41:34
Isn't that a bigger problem then? Wouldn't this te
mattm
2016/08/16 02:14:30
If I'm reading the code correctly, it uses a rando
|
EXPECT_EQ(CERT_STATUS_REVOKED, cert_status & CERT_STATUS_ALL_ERRORS); |
-#endif |
EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); |
EXPECT_TRUE(cert_status & CERT_STATUS_REV_CHECKING_ENABLED); |
} |
@@ -9395,8 +9392,16 @@ TEST_F(HTTPSOCSPTest, Invalid) { |
CertStatus cert_status; |
DoConnection(ssl_options, &cert_status); |
+#if defined(OS_MACOSX) && !defined(OS_IOS) |
+ // TODO(mattm): Figure out why CERT_STATUS_UNABLE_TO_CHECK_REVOCATION is |
+ // returned for this test but not any of the other ones that use |
+ // ExpectedCertStatusForFailedOnlineRevocationCheck. |
+ EXPECT_EQ(CERT_STATUS_UNABLE_TO_CHECK_REVOCATION, |
+ cert_status & CERT_STATUS_ALL_ERRORS); |
+#else |
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), |
Ryan Sleevi
2016/08/12 19:50:17
Looking at the definition of this, shouldn't you j
mattm
2016/08/16 01:41:34
Done. I had to fix HTTPSEVCRLSetTest.MissingCRLSet
|
cert_status & CERT_STATUS_ALL_ERRORS); |
+#endif |
// Without a positive OCSP response, we shouldn't show the EV status. |
EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV); |