Index: net/cert/multi_log_ct_verifier_unittest.cc |
diff --git a/net/cert/multi_log_ct_verifier_unittest.cc b/net/cert/multi_log_ct_verifier_unittest.cc |
index 3111b5e451e3f5716edef55b52686a589dfe9d0e..cf20c1ba27265d611133d52082116ff40dc3957f 100644 |
--- a/net/cert/multi_log_ct_verifier_unittest.cc |
+++ b/net/cert/multi_log_ct_verifier_unittest.cc |
@@ -111,18 +111,11 @@ class MultiLogCTVerifierTest : public ::testing::Test { |
return true; |
} |
- bool VerifySinglePrecertificateChain( |
- scoped_refptr<X509Certificate> chain, |
- const NetLogWithSource& net_log, |
- SignedCertificateTimestampAndStatusList* output_scts) { |
- return verifier_->Verify(chain.get(), std::string(), std::string(), |
- output_scts, net_log) == OK; |
- } |
- |
bool VerifySinglePrecertificateChain(scoped_refptr<X509Certificate> chain) { |
eroman
2016/12/27 22:00:41
Can you document what the return value of this fun
|
SignedCertificateTimestampAndStatusList scts; |
- return verifier_->Verify(chain.get(), std::string(), std::string(), &scts, |
- NetLogWithSource()) == OK; |
+ verifier_->Verify(chain.get(), base::StringPiece(), base::StringPiece(), |
+ &scts, NetLogWithSource()); |
+ return !scts.empty(); |
eroman
2016/12/27 22:00:41
Not sure what the goal of the function is, but I w
|
} |
bool CheckPrecertificateVerification(scoped_refptr<X509Certificate> chain) { |
@@ -130,11 +123,12 @@ class MultiLogCTVerifierTest : public ::testing::Test { |
TestNetLog test_net_log; |
NetLogWithSource net_log = NetLogWithSource::Make( |
&test_net_log, NetLogSourceType::SSL_CONNECT_JOB); |
- return (VerifySinglePrecertificateChain(chain, net_log, &scts) && |
- ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription) && |
- ct::CheckForSCTOrigin( |
- scts, ct::SignedCertificateTimestamp::SCT_EMBEDDED) && |
- CheckForEmbeddedSCTInNetLog(test_net_log)); |
+ verifier_->Verify(chain.get(), base::StringPiece(), base::StringPiece(), |
+ &scts, net_log); |
+ return ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription) && |
+ ct::CheckForSCTOrigin( |
+ scts, ct::SignedCertificateTimestamp::SCT_EMBEDDED) && |
+ CheckForEmbeddedSCTInNetLog(test_net_log); |
} |
// Histogram-related helper methods |
@@ -208,8 +202,8 @@ TEST_F(MultiLogCTVerifierTest, VerifiesSCTOverX509Cert) { |
std::string sct_list = ct::GetSCTListForTesting(); |
SignedCertificateTimestampAndStatusList scts; |
- EXPECT_EQ(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
ASSERT_TRUE(ct::CheckForSingleVerifiedSCTInResult(scts, kLogDescription)); |
ASSERT_TRUE(ct::CheckForSCTOrigin( |
scts, ct::SignedCertificateTimestamp::SCT_FROM_TLS_EXTENSION)); |
@@ -219,8 +213,8 @@ TEST_F(MultiLogCTVerifierTest, IdentifiesSCTFromUnknownLog) { |
std::string sct_list = ct::GetSCTListWithInvalidSCT(); |
SignedCertificateTimestampAndStatusList scts; |
- EXPECT_NE(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
EXPECT_EQ(1U, scts.size()); |
EXPECT_EQ("", scts[0].sct->log_description); |
EXPECT_EQ(ct::SCT_STATUS_LOG_UNKNOWN, scts[0].status); |
@@ -242,8 +236,8 @@ TEST_F(MultiLogCTVerifierTest, CountsInvalidSCTsInStatusHistogram) { |
int num_invalid_scts = GetValueFromHistogram( |
"Net.CertificateTransparency.SCTStatus", ct::SCT_STATUS_LOG_UNKNOWN); |
- EXPECT_NE(OK, verifier_->Verify(chain_.get(), std::string(), sct_list, &scts, |
- NetLogWithSource())); |
+ verifier_->Verify(chain_.get(), base::StringPiece(), sct_list, &scts, |
+ NetLogWithSource()); |
ASSERT_EQ(num_valid_scts, NumValidSCTsInStatusHistogram()); |
ASSERT_EQ(num_invalid_scts + 1, |