Index: net/cert/ct_log_verifier_unittest.cc |
diff --git a/net/cert/ct_log_verifier_unittest.cc b/net/cert/ct_log_verifier_unittest.cc |
index 4412258875615d9b1e6bf24661051fc40437da84..ad6f4f0d04b1b32ff3cffef5d1692b670539f50c 100644 |
--- a/net/cert/ct_log_verifier_unittest.cc |
+++ b/net/cert/ct_log_verifier_unittest.cc |
@@ -35,7 +35,9 @@ TEST_F(CTLogVerifierTest, VerifiesCertSCT) { |
ct::SignedCertificateTimestamp cert_sct; |
ct::GetX509CertSCT(&cert_sct); |
- EXPECT_TRUE(log_->Verify(cert_entry, cert_sct)); |
+ ASSERT_EQ( |
+ CTLogVerifier::SCT_VERIFIED_OK, |
+ log_->Verify(cert_entry, cert_sct)); |
} |
TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) { |
@@ -45,7 +47,9 @@ TEST_F(CTLogVerifierTest, VerifiesPrecertSCT) { |
ct::SignedCertificateTimestamp precert_sct; |
ct::GetPrecertSCT(&precert_sct); |
- EXPECT_TRUE(log_->Verify(precert_entry, precert_sct)); |
+ ASSERT_EQ( |
+ CTLogVerifier::SCT_VERIFIED_OK, |
+ log_->Verify(precert_entry, precert_sct)); |
} |
TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) { |
@@ -58,7 +62,9 @@ TEST_F(CTLogVerifierTest, FailsInvalidTimestamp) { |
// Mangle the timestamp, so that it should fail signature validation. |
cert_sct.timestamp = base::Time::Now(); |
- EXPECT_FALSE(log_->Verify(cert_entry, cert_sct)); |
+ ASSERT_EQ( |
+ CTLogVerifier::SCT_VERIFICATION_FAILED, |
+ log_->Verify(cert_entry, cert_sct)); |
} |
TEST_F(CTLogVerifierTest, FailsInvalidLogID) { |
@@ -72,7 +78,8 @@ TEST_F(CTLogVerifierTest, FailsInvalidLogID) { |
// attempting signature validation. |
cert_sct.log_id.assign(cert_sct.log_id.size(), '\0'); |
- EXPECT_FALSE(log_->Verify(cert_entry, cert_sct)); |
+ ASSERT_EQ( |
+ CTLogVerifier::SCT_NOT_FROM_THIS_LOG, log_->Verify(cert_entry, cert_sct)); |
} |
} // namespace net |