| Index: net/cert/cert_verify_proc_unittest.cc
|
| diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc
|
| index 8b548f30ea73f8a676d44aa5053d709fe7ea254e..d3c962c47d9adfd861f238a7b77b6762b7b0ad39 100644
|
| --- a/net/cert/cert_verify_proc_unittest.cc
|
| +++ b/net/cert/cert_verify_proc_unittest.cc
|
| @@ -644,7 +644,8 @@ TEST_F(CertVerifyProcTest, TestKnownRoot) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
| EXPECT_TRUE(verify_result.is_issued_by_known_root);
|
| }
|
|
|
| @@ -678,7 +679,8 @@ TEST_F(CertVerifyProcTest, PublicKeyHashes) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
| ASSERT_LE(2U, verify_result.public_key_hashes.size());
|
|
|
| HashValueVector sha1_hashes;
|
| @@ -1076,7 +1078,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
|
|
| // Attempt to verify with the first known cross-certified intermediate
|
| // provided.
|
| @@ -1099,7 +1102,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
|
|
| // Attempt to verify with the second known cross-certified intermediate
|
| // provided.
|
| @@ -1122,7 +1126,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
|
|
| // Attempt to verify when both a cross-certified intermediate AND
|
| // the legacy GTE root are provided.
|
| @@ -1142,7 +1147,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
|
|
| TestRootCerts::GetInstance()->Clear();
|
| EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty());
|
| @@ -1240,7 +1246,8 @@ TEST_F(CertVerifyProcTest, CRLSetLeafSerial) {
|
| empty_cert_list_,
|
| &verify_result);
|
| EXPECT_EQ(OK, error);
|
| - EXPECT_EQ(0U, verify_result.cert_status);
|
| + EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM,
|
| + verify_result.cert_status);
|
|
|
| // Test revocation by serial number of a certificate not under the root.
|
| scoped_refptr<CRLSet> crl_set;
|
|
|