Index: net/cert/internal/verify_certificate_chain_pkits_unittest.cc |
diff --git a/net/cert/internal/verify_certificate_chain_pkits_unittest.cc b/net/cert/internal/verify_certificate_chain_pkits_unittest.cc |
index 97a81cc73b789b936110895a302f4ed503d39b6d..2039a60d28afe2b3b5c34e9f229dfafe7fa5825a 100644 |
--- a/net/cert/internal/verify_certificate_chain_pkits_unittest.cc |
+++ b/net/cert/internal/verify_certificate_chain_pkits_unittest.cc |
@@ -70,23 +70,18 @@ class VerifyCertificateChainPkitsTestDelegate { |
} |
} |
- scoped_refptr<TrustAnchor> trust_anchor = |
- TrustAnchor::CreateFromCertificateNoConstraints(input_chain.back()); |
- input_chain.pop_back(); |
- |
SimpleSignaturePolicy signature_policy(1024); |
// Run all tests at the time the PKITS was published. |
der::GeneralizedTime time = {2011, 4, 15, 0, 0, 0}; |
CertPathErrors path_errors; |
- bool result = VerifyCertificateChain(input_chain, trust_anchor.get(), |
- &signature_policy, time, |
- KeyPurpose::ANY_EKU, &path_errors); |
+ VerifyCertificateChain(input_chain, CertificateTrust::ForTrustAnchor(), |
+ &signature_policy, time, KeyPurpose::ANY_EKU, |
+ &path_errors); |
// TODO(crbug.com/634443): Test errors on failure? |
- EXPECT_EQ(result, !path_errors.ContainsHighSeverityErrors()); |
- return result; |
+ return !path_errors.ContainsHighSeverityErrors(); |
} |
}; |