| Index: net/cert/cert_policy_enforcer_unittest.cc
|
| diff --git a/net/cert/cert_policy_enforcer_unittest.cc b/net/cert/cert_policy_enforcer_unittest.cc
|
| index 45a2e6af87cc1999ceaa439c368f3650d0dbd3f7..de840c6e2daba8dc851ad7c9a486d44484a0c819 100644
|
| --- a/net/cert/cert_policy_enforcer_unittest.cc
|
| +++ b/net/cert/cert_policy_enforcer_unittest.cc
|
| @@ -44,7 +44,7 @@ class DummyEVCertsWhitelist : public ct::EVCertsWhitelist {
|
| class CertPolicyEnforcerTest : public ::testing::Test {
|
| public:
|
| virtual void SetUp() override {
|
| - policy_enforcer_.reset(new CertPolicyEnforcer(5, true));
|
| + policy_enforcer_.reset(new CertPolicyEnforcer(true));
|
|
|
| std::string der_test_cert(ct::GetDerEncodedX509Cert());
|
| chain_ = X509Certificate::CreateFromBytes(der_test_cert.data(),
|
| @@ -109,7 +109,7 @@ TEST_F(CertPolicyEnforcerTest, DoesNotConformToCTEVPolicyNotEnoughSCTs) {
|
| }
|
|
|
| TEST_F(CertPolicyEnforcerTest, DoesNotEnforceCTPolicyIfNotRequired) {
|
| - scoped_ptr<CertPolicyEnforcer> enforcer(new CertPolicyEnforcer(3, false));
|
| + scoped_ptr<CertPolicyEnforcer> enforcer(new CertPolicyEnforcer(false));
|
|
|
| ct::CTVerifyResult result;
|
| FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 1,
|
| @@ -164,19 +164,6 @@ TEST_F(CertPolicyEnforcerTest,
|
| }
|
| }
|
|
|
| -TEST_F(CertPolicyEnforcerTest,
|
| - ConformsToPolicyButDoesNotRequireMoreThanNumLogs) {
|
| - scoped_ptr<CertPolicyEnforcer> enforcer(new CertPolicyEnforcer(2, true));
|
| -
|
| - ct::CTVerifyResult result;
|
| - FillResultWithSCTsOfOrigin(ct::SignedCertificateTimestamp::SCT_EMBEDDED, 2,
|
| - &result);
|
| - // Expect true despite the chain not having enough SCTs according to the
|
| - // policy
|
| - // since we only have 2 logs.
|
| - EXPECT_TRUE(enforcer->DoesConformToCTEVPolicy(chain_.get(), nullptr, result));
|
| -}
|
| -
|
| TEST_F(CertPolicyEnforcerTest, ConformsToPolicyByEVWhitelistPresence) {
|
| scoped_refptr<ct::EVCertsWhitelist> whitelist(
|
| new DummyEVCertsWhitelist(true, true));
|
|
|