Index: net/cert/multi_log_ct_verifier_unittest.cc |
diff --git a/net/cert/multi_log_ct_verifier_unittest.cc b/net/cert/multi_log_ct_verifier_unittest.cc |
index 3111b5e451e3f5716edef55b52686a589dfe9d0e..aea27f971956d83d300f31c95351b4af3765217e 100644 |
--- a/net/cert/multi_log_ct_verifier_unittest.cc |
+++ b/net/cert/multi_log_ct_verifier_unittest.cc |
@@ -111,30 +111,29 @@ class MultiLogCTVerifierTest : public ::testing::Test { |
return true; |
} |
- bool VerifySinglePrecertificateChain( |
- scoped_refptr<X509Certificate> chain, |
- const NetLogWithSource& net_log, |
- SignedCertificateTimestampAndStatusList* output_scts) { |
- return verifier_->Verify(chain.get(), std::string(), std::string(), |
- output_scts, net_log) == OK; |
- } |
- |
+ // Returns true is |chain| is a certificate with embedded SCTs that can be |
+ // successfully extracted. |
bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain) { |
SignedCertificateTimestampAndStatusList scts; |
- return verifier_->Verify(chain.get(), std::string(), std::string(), &scts, |
- NetLogWithSource()) == OK; |
+ verifier_->Verify(chain.get(), base::StringPiece(), base::StringPiece(), |
+ &scts, NetLogWithSource()); |
+ return !scts.empty(); |
} |
+ // Returns true if |chain| is a certificate with a single embedded SCT that |
+ // can be successfully extracted and matched to the test log indicated by |
+ // |kLogDescription|. |
bool CheckPrecertificateVerification(scoped_refptr<X509Certificate> chain) { |
SignedCertificateTimestampAndStatusList scts; |
TestNetLog test_net_log; |
NetLogWithSource net_log = NetLogWithSource::Make( |
&test_net_log, NetLogSourceType::SSL_CONNECT_JOB); |
- return (VerifySinglePrecertificateChain(chain, net_log, &scts) && |
- ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription) && |
- ct::CheckForSCTOrigin( |
- scts, ct::SignedCertificateTimestamp::SCT_EMBEDDED) && |
- CheckForEmbeddedSCTInNetLog(test_net_log)); |
+ verifier_->Verify(chain.get(), base::StringPiece(), base::StringPiece(), |
+ &scts, net_log); |
+ return ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription) && |
+ ct::CheckForSCTOrigin( |
+ scts, ct::SignedCertificateTimestamp::SCT_EMBEDDED) && |
+ CheckForEmbeddedSCTInNetLog(test_net_log); |
} |
// Histogram-related helper methods |
@@ -208,8 +207,8 @@ TEST_F(MultiLogCTVerifierTest, VerifiesSCTOverX509Cert) { |
std::string sct_list = ct::GetSCTListForTesting(); |
SignedCertificateTimestampAndStatusList scts; |
- EXPECT_EQ(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
ASSERT_TRUE(ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription)); |
ASSERT_TRUE(ct::CheckForSCTOrigin( |
scts, ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION)); |
@@ -219,8 +218,8 @@ TEST_F(MultiLogCTVerifierTest, IdentifiesSCTFromUnknownLog) { |
std::string sct_list = ct::GetSCTListWithInvalidSCT(); |
SignedCertificateTimestampAndStatusList scts; |
- EXPECT_NE(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
EXPECT_EQ(1U, scts.size()); |
EXPECT_EQ("", scts[0].sct->log_description); |
EXPECT_EQ(ct::SCT_STATUS_LOG_UNKNOWN, scts[0].status); |
@@ -242,8 +241,8 @@ TEST_F(MultiLogCTVerifierTest, CountsInvalidSCTsInStatusHistogram) { |
int num_invalid_scts = GetValueFromHistogram( |
"Net.CertificateTransparency.SCTStatus", ct::SCT_STATUS_LOG_UNKNOWN); |
- EXPECT_NE(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
ASSERT_EQ(num_valid_scts, NumValidSCTsInStatusHistogram()); |
ASSERT_EQ(num_invalid_scts + 1, |