| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index 13462ff18bdbe5419af83f5d8e55a32adfe21e6d..a46956c981d7c09757064a86e83f6a4faa9d911e 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -5727,6 +5727,34 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) {
|
| static_cast<bool>(cert_status & CERT_STATUS_REV_CHECKING_ENABLED));
|
| }
|
|
|
| +TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndRevokedOCSP) {
|
| + if (!SystemSupportsOCSP()) {
|
| + LOG(WARNING) << "Skipping test because system doesn't support OCSP";
|
| + return;
|
| + }
|
| +
|
| + SpawnedTestServer::SSLOptions ssl_options(
|
| + SpawnedTestServer::SSLOptions::CERT_AUTO);
|
| + ssl_options.ocsp_status = SpawnedTestServer::SSLOptions::OCSP_REVOKED;
|
| + SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>());
|
| +
|
| + CertStatus cert_status;
|
| + DoConnection(ssl_options, &cert_status);
|
| +
|
| + // Currently only works for Windows. For NSS we request a hard-fail check for
|
| + // EV OCSP but then cannot tell whether the check failed because of a revoked
|
| + // response, or an OCSP failure.
|
| +#if defined(OS_WIN)
|
| + EXPECT_EQ(CERT_STATUS_REVOKED, cert_status & CERT_STATUS_ALL_ERRORS);
|
| +#else
|
| + EXPECT_EQ(0, cert_status & CERT_STATUS_ALL_ERRORS);
|
| +#endif
|
| +
|
| + EXPECT_FALSE(cert_status & CERT_STATUS_IS_EV);
|
| + EXPECT_EQ(SystemUsesChromiumEVMetadata(),
|
| + static_cast<bool>(cert_status & CERT_STATUS_REV_CHECKING_ENABLED));
|
| +}
|
| +
|
| TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndGoodOCSP) {
|
| if (!SystemSupportsOCSP()) {
|
| LOG(WARNING) << "Skipping test because system doesn't support OCSP";
|
|
|