Index: net/cert/cert_verify_proc_unittest.cc |
diff --git a/net/cert/cert_verify_proc_unittest.cc b/net/cert/cert_verify_proc_unittest.cc |
index 858c0dea89aff10e1e316e1db31cbee81d217e00..80aa7c5279e0d5af0c2b4f4bf3e4021c43941dad 100644 |
--- a/net/cert/cert_verify_proc_unittest.cc |
+++ b/net/cert/cert_verify_proc_unittest.cc |
@@ -644,7 +644,8 @@ TEST_F(CertVerifyProcTest, TestKnownRoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
EXPECT_TRUE(verify_result.is_issued_by_known_root); |
} |
@@ -678,7 +679,8 @@ TEST_F(CertVerifyProcTest, PublicKeyHashes) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
ASSERT_LE(2U, verify_result.public_key_hashes.size()); |
HashValueVector sha1_hashes; |
@@ -1076,7 +1078,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
// Attempt to verify with the first known cross-certified intermediate |
// provided. |
@@ -1099,7 +1102,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
// Attempt to verify with the second known cross-certified intermediate |
// provided. |
@@ -1122,7 +1126,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
// Attempt to verify when both a cross-certified intermediate AND |
// the legacy GTE root are provided. |
@@ -1142,7 +1147,8 @@ TEST_F(CertVerifyProcTest, CybertrustGTERoot) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
TestRootCerts::GetInstance()->Clear(); |
EXPECT_TRUE(TestRootCerts::GetInstance()->IsEmpty()); |
@@ -1240,7 +1246,8 @@ TEST_F(CertVerifyProcTest, CRLSetLeafSerial) { |
empty_cert_list_, |
&verify_result); |
EXPECT_EQ(OK, error); |
- EXPECT_EQ(0U, verify_result.cert_status); |
+ EXPECT_EQ(CERT_STATUS_DEPRECATED_SIGNATURE_ALGORITHM, |
+ verify_result.cert_status); |
// Test revocation by serial number of a certificate not under the root. |
scoped_refptr<CRLSet> crl_set; |