| Index: chrome/browser/ssl/ssl_browser_tests.cc
|
| diff --git a/chrome/browser/ssl/ssl_browser_tests.cc b/chrome/browser/ssl/ssl_browser_tests.cc
|
| index 0a01826db958d604a1374a826974a7390f44338b..19e200882018223245cd69b0090ac12760e8d0fa 100644
|
| --- a/chrome/browser/ssl/ssl_browser_tests.cc
|
| +++ b/chrome/browser/ssl/ssl_browser_tests.cc
|
| @@ -60,7 +60,6 @@
|
| #include "components/variations/variations_associated_data.h"
|
| #include "components/web_modal/web_contents_modal_dialog_manager.h"
|
| #include "content/public/browser/browser_context.h"
|
| -#include "content/public/browser/cert_store.h"
|
| #include "content/public/browser/interstitial_page.h"
|
| #include "content/public/browser/navigation_controller.h"
|
| #include "content/public/browser/navigation_entry.h"
|
| @@ -258,26 +257,6 @@ class SSLInterstitialTimerObserver {
|
| DISALLOW_COPY_AND_ASSIGN(SSLInterstitialTimerObserver);
|
| };
|
|
|
| -// Checks that two SSLStatuses will result in the same security UI: that
|
| -// is, the cert ids can differ as long as they refer to the same cert,
|
| -// and otherwise SSLStatus::Equals() must be true.
|
| -void CheckSSLStatusesEquals(const content::SSLStatus& one,
|
| - const content::SSLStatus& two) {
|
| - content::CertStore* cert_store = content::CertStore::GetInstance();
|
| - scoped_refptr<net::X509Certificate> cert1;
|
| - scoped_refptr<net::X509Certificate> cert2;
|
| - cert_store->RetrieveCert(one.cert_id, &cert1);
|
| - cert_store->RetrieveCert(two.cert_id, &cert2);
|
| - EXPECT_TRUE(cert1 && cert2);
|
| - EXPECT_TRUE(cert1->Equals(cert2.get()));
|
| -
|
| - SSLStatus one_without_cert_id = one;
|
| - one_without_cert_id.cert_id = 0;
|
| - SSLStatus two_without_cert_id = two;
|
| - two_without_cert_id.cert_id = 0;
|
| - EXPECT_TRUE(one_without_cert_id.Equals(two_without_cert_id));
|
| -}
|
| -
|
| class HungJob : public net::URLRequestJob {
|
| public:
|
| HungJob(net::URLRequest* request, net::NetworkDelegate* network_delegate)
|
| @@ -2702,8 +2681,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| ASSERT_TRUE(entry);
|
|
|
| content::SSLStatus after_interstitial_ssl_status = entry->GetSSL();
|
| - ASSERT_NO_FATAL_FAILURE(CheckSSLStatusesEquals(after_interstitial_ssl_status,
|
| - interstitial_ssl_status));
|
| + ASSERT_NO_FATAL_FAILURE(
|
| + after_interstitial_ssl_status.Equals(interstitial_ssl_status));
|
| }
|
|
|
| // As above, but for a bad clock interstitial. Tests that a clock
|
| @@ -2753,8 +2732,8 @@ IN_PROC_BROWSER_TEST_F(SSLUITest,
|
| entry = tab->GetController().GetActiveEntry();
|
| ASSERT_TRUE(entry);
|
| content::SSLStatus after_interstitial_ssl_status = entry->GetSSL();
|
| - ASSERT_NO_FATAL_FAILURE(CheckSSLStatusesEquals(
|
| - after_interstitial_ssl_status, clock_interstitial_ssl_status));
|
| + ASSERT_NO_FATAL_FAILURE(
|
| + after_interstitial_ssl_status.Equals(clock_interstitial_ssl_status));
|
| }
|
|
|
| class CommonNameMismatchBrowserTest : public CertVerifierBrowserTest {
|
|
|