Index: chrome/browser/ssl/chrome_expect_ct_reporter_unittest.cc |
diff --git a/chrome/browser/ssl/chrome_expect_ct_reporter_unittest.cc b/chrome/browser/ssl/chrome_expect_ct_reporter_unittest.cc |
index fcd4872dca24a49b1d8c3a40761ceeb7aefbd146..a5bdeb3867fb9fa68b4176d3841fd5e801fc64e3 100644 |
--- a/chrome/browser/ssl/chrome_expect_ct_reporter_unittest.cc |
+++ b/chrome/browser/ssl/chrome_expect_ct_reporter_unittest.cc |
@@ -133,7 +133,8 @@ void FindSCTInReportList( |
found = true; |
break; |
- case net::ct::SCT_STATUS_INVALID: { |
+ case net::ct::SCT_STATUS_INVALID_SIGNATURE: |
+ case net::ct::SCT_STATUS_INVALID_TIMESTAMP: { |
// Invalid SCTs have a log id and an origin and nothing else. |
EXPECT_FALSE(report_sct->HasKey("sct")); |
std::string id_base64; |
@@ -197,9 +198,15 @@ void CheckReportSCTs( |
ASSERT_NO_FATAL_FAILURE(FindSCTInReportList( |
expected_sct.sct, net::ct::SCT_STATUS_LOG_UNKNOWN, unknown_scts)); |
break; |
- case net::ct::SCT_STATUS_INVALID: |
+ case net::ct::SCT_STATUS_INVALID_SIGNATURE: |
ASSERT_NO_FATAL_FAILURE(FindSCTInReportList( |
- expected_sct.sct, net::ct::SCT_STATUS_INVALID, invalid_scts)); |
+ expected_sct.sct, net::ct::SCT_STATUS_INVALID_SIGNATURE, |
+ invalid_scts)); |
+ break; |
+ case net::ct::SCT_STATUS_INVALID_TIMESTAMP: |
+ ASSERT_NO_FATAL_FAILURE(FindSCTInReportList( |
+ expected_sct.sct, net::ct::SCT_STATUS_INVALID_TIMESTAMP, |
+ invalid_scts)); |
break; |
case net::ct::SCT_STATUS_OK: |
ASSERT_NO_FATAL_FAILURE(FindSCTInReportList( |
@@ -441,10 +448,18 @@ TEST(ChromeExpectCTReporterTest, SendReport) { |
MakeTestSCTAndStatus( |
net::ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION, |
"invalid_log_id1", "extensions1", "signature1", now, |
- net::ct::SCT_STATUS_INVALID, &ssl_info.signed_certificate_timestamps); |
+ net::ct::SCT_STATUS_INVALID_TIMESTAMP, |
+ &ssl_info.signed_certificate_timestamps); |
+ |
+ MakeTestSCTAndStatus( |
+ net::ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION, |
+ "invalid_log_id1", "extensions1", "signature1", now, |
+ net::ct::SCT_STATUS_INVALID_SIGNATURE, |
+ &ssl_info.signed_certificate_timestamps); |
+ |
MakeTestSCTAndStatus(net::ct::SignedCertificateTimestamp::SCT_EMBEDDED, |
"invalid_log_id2", "extensions2", "signature2", now, |
- net::ct::SCT_STATUS_INVALID, |
+ net::ct::SCT_STATUS_INVALID_SIGNATURE, |
&ssl_info.signed_certificate_timestamps); |
MakeTestSCTAndStatus( |