Index: content/common/ssl_status_serialization_unittest.cc |
diff --git a/content/common/ssl_status_serialization_unittest.cc b/content/common/ssl_status_serialization_unittest.cc |
index 9c49b42e9579b132657e073ada6f52792574c92a..9e9c361a709d1c76f531e14b07f8155a4092b177 100644 |
--- a/content/common/ssl_status_serialization_unittest.cc |
+++ b/content/common/ssl_status_serialization_unittest.cc |
@@ -148,19 +148,19 @@ TEST(SSLStatusSerializationTest, DeserializeBogusSCTVerifyStatus) { |
EXPECT_PRED2(SSLStatusAreEqual, SSLStatus(), deserialized); |
} |
-// Test that SCTVerifyStatus INVALID can be deserialized; even though |
+// Test that SCTVerifyStatus INVALID cannot be deserialized; even though |
// this value is deprecated, it may still appear in previously written |
-// disk cache entries. Regression test for https://crbug.com/640296 |
+// disk cache entries which should be invalidated. |
TEST(SSLStatusSerializationTest, DeserializeInvalidSCT) { |
SSLStatus status; |
SetTestStatus(&status); |
status.sct_statuses.push_back( |
- static_cast<net::ct::SCTVerifyStatus>(net::ct::SCT_STATUS_INVALID)); |
+ static_cast<net::ct::SCTVerifyStatus>(2)); |
std::string serialized = SerializeSecurityInfo(status); |
- SSLStatus deserialized; |
- ASSERT_TRUE(DeserializeSecurityInfo(serialized, &deserialized)); |
- EXPECT_PRED2(SSLStatusAreEqual, status, deserialized); |
+ SSLStatus invalid_deserialized; |
+ ASSERT_FALSE(DeserializeSecurityInfo(serialized, &invalid_deserialized)); |
+ EXPECT_PRED2(SSLStatusAreEqual, SSLStatus(), invalid_deserialized); |
} |
} // namespace |