Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index 858c0dea89aff10e1e316e1db31cbee81d217e00..68900524f3e6c468ad081b532e332375fd7d9418 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -644,7 +644,7 @@ TEST_F(CertVerifyProcTest, TestKnownRoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
EXPECT_TRUE(verify_result.is_issued_by_known_root); |
} |
@@ -678,7 +678,7 @@ TEST_F(CertVerifyProcTest, PublicKeyHashes) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
ASSERT_LE(2U, verify_result.public_key_hashes.size()); |
HashValueVector sha1_hashes; |
@@ -1076,7 +1076,7 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
// Attempt to verify with the first known cross-certified intermediate |
// provided. |
@@ -1099,7 +1099,7 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
// Attempt to verify with the second known cross-certified intermediate |
// provided. |
@@ -1122,7 +1122,7 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
// Attempt to verify when both a cross-certified intermediate AND |
// the legacy GTE root are provided. |
@@ -1142,7 +1142,7 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
TestRootCerts::GetInstance()->Clear(); |
EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty()); |
@@ -1240,7 +1240,7 @@ TEST_F(CertVerifyProcTest, CRLSetLeafSerial) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_SHA1_SIGNATURE_PRESENT, verify_result.cert_status); |
// Test revocation by serial number of a certificate not under the root. |
scoped_refptr<CRLSet> crl_set; |