summaryrefslogtreecommitdiffstats
path: root/net/socket/ssl_server_socket_unittest.cc
diff options
context:
space:
mode:
authorwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-03-14 23:29:34 +0000
committerwtc@chromium.org <wtc@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-03-14 23:29:34 +0000
commitbd707a60326fbf47ecafba43480028178dfa109f (patch)
tree02595b54f5196fd659f2d655a72171502f608a14 /net/socket/ssl_server_socket_unittest.cc
parentb95f38cacaaaa2aa5bfe545e54ae8dea566fb684 (diff)
downloadchromium_src-bd707a60326fbf47ecafba43480028178dfa109f.zip
chromium_src-bd707a60326fbf47ecafba43480028178dfa109f.tar.gz
chromium_src-bd707a60326fbf47ecafba43480028178dfa109f.tar.bz2
Code cleanup related to allowed_bad_certs.
cert_status is a bitwise-OR of CERT_STATUS_xxx, not ERR_CERT_xxx. Initialize a CertAndStatus structure after checking it is needed. Fix a typo in comments. R=hclam BUG=none TEST=none Review URL: http://codereview.chromium.org/6677022 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@78123 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net/socket/ssl_server_socket_unittest.cc')
-rw-r--r--net/socket/ssl_server_socket_unittest.cc3
1 files changed, 2 insertions, 1 deletions
diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc
index 122d183..792d2d8 100644
--- a/net/socket/ssl_server_socket_unittest.cc
+++ b/net/socket/ssl_server_socket_unittest.cc
@@ -23,6 +23,7 @@
#include "base/nss_util.h"
#include "base/path_service.h"
#include "net/base/address_list.h"
+#include "net/base/cert_status_flags.h"
#include "net/base/cert_verifier.h"
#include "net/base/host_port_pair.h"
#include "net/base/io_buffer.h"
@@ -244,7 +245,7 @@ class SSLServerSocketTest : public PlatformTest {
// Certificate provided by the host doesn't need authority.
net::SSLConfig::CertAndStatus cert_and_status;
- cert_and_status.cert_status = net::ERR_CERT_AUTHORITY_INVALID;
+ cert_and_status.cert_status = net::CERT_STATUS_AUTHORITY_INVALID;
cert_and_status.cert = cert;
ssl_config.allowed_bad_certs.push_back(cert_and_status);