| Index: net/cert/x509_certificate_unittest.cc
|
| diff --git a/net/cert/x509_certificate_unittest.cc b/net/cert/x509_certificate_unittest.cc
|
| index 04dbaddf69f19b15f0630a2ba68dda0b58fe1eae..83de91a64bca913cbfae5ed3deef2cbe3ab3f410 100644
|
| --- a/net/cert/x509_certificate_unittest.cc
|
| +++ b/net/cert/x509_certificate_unittest.cc
|
| @@ -190,11 +190,12 @@ TEST(X509CertificateTest, WebkitCertParsing) {
|
| EXPECT_EQ("webkit.org", dns_names[1]);
|
|
|
| // Test that the wildcard cert matches properly.
|
| - EXPECT_TRUE(webkit_cert->VerifyNameMatch("www.webkit.org"));
|
| - EXPECT_TRUE(webkit_cert->VerifyNameMatch("foo.webkit.org"));
|
| - EXPECT_TRUE(webkit_cert->VerifyNameMatch("webkit.org"));
|
| - EXPECT_FALSE(webkit_cert->VerifyNameMatch("www.webkit.com"));
|
| - EXPECT_FALSE(webkit_cert->VerifyNameMatch("www.foo.webkit.com"));
|
| + bool unused = false;
|
| + EXPECT_TRUE(webkit_cert->VerifyNameMatch("www.webkit.org", &unused));
|
| + EXPECT_TRUE(webkit_cert->VerifyNameMatch("foo.webkit.org", &unused));
|
| + EXPECT_TRUE(webkit_cert->VerifyNameMatch("webkit.org", &unused));
|
| + EXPECT_FALSE(webkit_cert->VerifyNameMatch("www.webkit.com", &unused));
|
| + EXPECT_FALSE(webkit_cert->VerifyNameMatch("www.foo.webkit.com", &unused));
|
| }
|
|
|
| TEST(X509CertificateTest, ThawteCertParsing) {
|
| @@ -1139,8 +1140,9 @@ TEST_P(X509CertificateNameVerifyTest, VerifyHostname) {
|
| }
|
| }
|
|
|
| + bool unused = false;
|
| EXPECT_EQ(test_data.expected, X509Certificate::VerifyHostname(
|
| - test_data.hostname, common_name, dns_names, ip_addressses));
|
| + test_data.hostname, common_name, dns_names, ip_addressses, &unused));
|
| }
|
|
|
| INSTANTIATE_TEST_CASE_P(, X509CertificateNameVerifyTest,
|
|
|