Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index fdb254d1bc5fc94e8f1c4166efb732dc5340a8e0..baa67dce82ffe6bfd297a8c24507cf5f4748b9cc 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -1202,11 +1202,6 @@ TEST_P(CertVerifyProcInternalTest, PublicKeyHashes) { |
// The Key Usage extension in this RSA SSL server certificate does not have |
// the keyEncipherment bit. |
TEST_P(CertVerifyProcInternalTest, InvalidKeyUsage) { |
- if (verify_proc_type() == CERT_VERIFY_PROC_BUILTIN) { |
- LOG(INFO) << "TODO(crbug.com/649017): Skipping test as not yet implemented " |
- "in builting verifier"; |
- return; |
- } |
base::FilePath certs_dir = GetTestCertsDirectory(); |
scoped_refptr<X509Certificate> server_cert = |
@@ -1220,10 +1215,10 @@ TEST_P(CertVerifyProcInternalTest, InvalidKeyUsage) { |
// TODO(eroman): Change the test data so results are consistent across |
// verifiers. |
- if (verify_proc_type() == CERT_VERIFY_PROC_OPENSSL) { |
+ if (verify_proc_type() == CERT_VERIFY_PROC_OPENSSL || |
+ verify_proc_type() == CERT_VERIFY_PROC_BUILTIN) { |
mattm
2017/04/12 01:58:05
From your other email, NSS was the only one that c
eroman
2017/04/14 21:07:47
This test is not well described. There are two cor
eroman
2017/04/14 21:42:48
Done.
|
// This certificate has two errors: "invalid key usage" and "untrusted CA". |
- // However, OpenSSL returns only one (the latter), and we can't detect |
- // the other errors. |
+ // However, the wrong key usage is not checked. |
EXPECT_THAT(error, IsError(ERR_CERT_AUTHORITY_INVALID)); |
} else { |
EXPECT_THAT(error, IsError(ERR_CERT_INVALID)); |