Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index 5327d66949df862dd09ddb84266a9adfecfeefd6..5c1d9077808695461254a88ebbff3e54ac9d58e0 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -199,7 +199,7 @@ TEST_F(CertVerifyProcTest, PaypalNullCertParsing) { |
reinterpret_cast<const char*>(paypal_null_der), |
sizeof(paypal_null_der))); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), paypal_null_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), paypal_null_cert.get()); |
const SHA1HashValue& fingerprint = |
paypal_null_cert->fingerprint(); |
@@ -284,11 +284,11 @@ TEST_F(CertVerifyProcTest, DISABLED_GlobalSignR3EVTest) { |
scoped_refptr<X509Certificate> server_cert = |
ImportCertFromFile(certs_dir, "2029_globalsign_com_cert.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert.get()); |
scoped_refptr<X509Certificate> intermediate_cert = |
ImportCertFromFile(certs_dir, "globalsign_ev_sha256_ca_cert.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert.get()); |
X509Certificate::OSCertHandles intermediates; |
intermediates.push_back(intermediate_cert->os_cert_handle()); |
@@ -368,7 +368,7 @@ TEST_F(CertVerifyProcTest, RejectWeakKeys) { |
// Add the root that signed the intermediates for this test. |
scoped_refptr<X509Certificate> root_cert = |
ImportCertFromFile(certs_dir, "2048-rsa-root.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), root_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
ScopedTestRoot scoped_root(root_cert.get()); |
// Now test each chain. |
@@ -381,12 +381,12 @@ TEST_F(CertVerifyProcTest, RejectWeakKeys) { |
SCOPED_TRACE(basename); |
scoped_refptr<X509Certificate> ee_cert = |
ImportCertFromFile(certs_dir, basename); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_cert.get()); |
basename = *signer_type + "-intermediate.pem"; |
scoped_refptr<X509Certificate> intermediate = |
ImportCertFromFile(certs_dir, basename); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate.get()); |
X509Certificate::OSCertHandles intermediates; |
intermediates.push_back(intermediate->os_cert_handle()); |
@@ -480,11 +480,11 @@ TEST_F(CertVerifyProcTest, GoogleDigiNotarTest) { |
scoped_refptr<X509Certificate> server_cert = |
ImportCertFromFile(certs_dir, "google_diginotar.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert.get()); |
scoped_refptr<X509Certificate> intermediate_cert = |
ImportCertFromFile(certs_dir, "diginotar_public_ca_2025.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert.get()); |
X509Certificate::OSCertHandles intermediates; |
intermediates.push_back(intermediate_cert->os_cert_handle()); |
@@ -555,7 +555,7 @@ TEST_F(CertVerifyProcTest, NameConstraintsOk) { |
"root_ca_cert.pem", |
X509Certificate::FORMAT_AUTO); |
ASSERT_EQ(1U, ca_cert_list.size()); |
- ScopedTestRoot test_root(ca_cert_list[0]); |
+ ScopedTestRoot test_root(ca_cert_list[0].get()); |
CertificateList cert_list = CreateCertificateListFromFile( |
GetTestCertsDirectory(), "name_constraint_ok.crt", |
@@ -590,7 +590,7 @@ TEST_F(CertVerifyProcTest, NameConstraintsFailure) { |
"root_ca_cert.pem", |
X509Certificate::FORMAT_AUTO); |
ASSERT_EQ(1U, ca_cert_list.size()); |
- ScopedTestRoot test_root(ca_cert_list[0]); |
+ ScopedTestRoot test_root(ca_cert_list[0].get()); |
CertificateList cert_list = CreateCertificateListFromFile( |
GetTestCertsDirectory(), "name_constraint_bad.crt", |
@@ -716,7 +716,7 @@ TEST_F(CertVerifyProcTest, InvalidKeyUsage) { |
scoped_refptr<X509Certificate> server_cert = |
ImportCertFromFile(certs_dir, "invalid_key_usage_cert.der"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), server_cert.get()); |
int flags = 0; |
CertVerifyResult verify_result; |
@@ -770,11 +770,12 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainBasic) { |
scoped_refptr<X509Certificate> google_full_chain = |
X509Certificate::CreateFromHandle(certs[0]->os_cert_handle(), |
intermediates); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain.get()); |
ASSERT_EQ(2U, google_full_chain->GetIntermediateCertificates().size()); |
CertVerifyResult verify_result; |
- EXPECT_EQ(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ EXPECT_EQ(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
int error = Verify(google_full_chain.get(), |
"127.0.0.1", |
0, |
@@ -782,7 +783,8 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainBasic) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
EXPECT_NE(google_full_chain, verify_result.verified_cert); |
EXPECT_TRUE(X509Certificate::IsSameOSCert( |
@@ -858,11 +860,12 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainProperlyOrdered) { |
scoped_refptr<X509Certificate> google_full_chain = |
X509Certificate::CreateFromHandle(certs[0]->os_cert_handle(), |
intermediates); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain.get()); |
ASSERT_EQ(2U, google_full_chain->GetIntermediateCertificates().size()); |
CertVerifyResult verify_result; |
- EXPECT_EQ(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ EXPECT_EQ(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
int error = Verify(google_full_chain.get(), |
"127.0.0.1", |
0, |
@@ -870,7 +873,8 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainProperlyOrdered) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
EXPECT_NE(google_full_chain, verify_result.verified_cert); |
EXPECT_TRUE(X509Certificate::IsSameOSCert( |
@@ -904,8 +908,8 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainFiltersUnrelatedCerts) { |
ImportCertFromFile(certs_dir, "duplicate_cn_1.pem"); |
scoped_refptr<X509Certificate> unrelated_certificate2 = |
ImportCertFromFile(certs_dir, "aia-cert.pem"); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), unrelated_certificate); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), unrelated_certificate2); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), unrelated_certificate.get()); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), unrelated_certificate2.get()); |
// Interject unrelated certificates into the list of intermediates. |
X509Certificate::OSCertHandles intermediates; |
@@ -917,11 +921,12 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainFiltersUnrelatedCerts) { |
scoped_refptr<X509Certificate> google_full_chain = |
X509Certificate::CreateFromHandle(certs[0]->os_cert_handle(), |
intermediates); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), google_full_chain.get()); |
ASSERT_EQ(4U, google_full_chain->GetIntermediateCertificates().size()); |
CertVerifyResult verify_result; |
- EXPECT_EQ(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ EXPECT_EQ(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
int error = Verify(google_full_chain.get(), |
"127.0.0.1", |
0, |
@@ -929,7 +934,8 @@ TEST_F(CertVerifyProcTest, VerifyReturnChainFiltersUnrelatedCerts) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), verify_result.verified_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), |
+ verify_result.verified_cert.get()); |
EXPECT_NE(google_full_chain, verify_result.verified_cert); |
EXPECT_TRUE(X509Certificate::IsSameOSCert( |
@@ -1199,7 +1205,7 @@ TEST_F(CertVerifyProcTest, CRLSet) { |
"root_ca_cert.pem", |
X509Certificate::FORMAT_AUTO); |
ASSERT_EQ(1U, ca_cert_list.size()); |
- ScopedTestRoot test_root(ca_cert_list[0]); |
+ ScopedTestRoot test_root(ca_cert_list[0].get()); |
CertificateList cert_list = CreateCertificateListFromFile( |
GetTestCertsDirectory(), "ok_cert.pem", X509Certificate::FORMAT_AUTO); |
@@ -1250,7 +1256,7 @@ TEST_F(CertVerifyProcTest, CRLSetLeafSerial) { |
"quic_root.crt", |
X509Certificate::FORMAT_AUTO); |
ASSERT_EQ(1U, ca_cert_list.size()); |
- ScopedTestRoot test_root(ca_cert_list[0]); |
+ ScopedTestRoot test_root(ca_cert_list[0].get()); |
CertificateList intermediate_cert_list = |
CreateCertificateListFromFile(GetTestCertsDirectory(), |
@@ -1333,16 +1339,16 @@ TEST_P(CertVerifyProcWeakDigestTest, Verify) { |
if (data.root_cert_filename) { |
scoped_refptr<X509Certificate> root_cert = |
ImportCertFromFile(certs_dir, data.root_cert_filename); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), root_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), root_cert.get()); |
test_root.Reset(root_cert.get()); |
} |
scoped_refptr<X509Certificate> intermediate_cert = |
ImportCertFromFile(certs_dir, data.intermediate_cert_filename); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), intermediate_cert.get()); |
scoped_refptr<X509Certificate> ee_cert = |
ImportCertFromFile(certs_dir, data.ee_cert_filename); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_cert); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_cert.get()); |
X509Certificate::OSCertHandles intermediates; |
intermediates.push_back(intermediate_cert->os_cert_handle()); |
@@ -1350,7 +1356,7 @@ TEST_P(CertVerifyProcWeakDigestTest, Verify) { |
scoped_refptr<X509Certificate> ee_chain = |
X509Certificate::CreateFromHandle(ee_cert->os_cert_handle(), |
intermediates); |
- ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_chain); |
+ ASSERT_NE(static_cast<X509Certificate*>(NULL), ee_chain.get()); |
int flags = 0; |
CertVerifyResult verify_result; |