@@ -449,22 +449,22 @@ func testTrustConfigIntra(t *testing.T, schema ndn.TrustSchema) {
449449 name : "/test/alice/data4" ,
450450 signer : mAliceSigner ,
451451 }))
452- require .Equal (t , 6 , tcTestFetchCount ) // invalid cert not in store (+ CertList)
452+ require .Equal (t , 6 , tcTestFetchCount ) // invalid cert not in store: 3 more fetches (includes CertList)
453453 require .False (t , validateSync (ValidateSyncOptions {
454454 name : "/test/alice/data3" ,
455455 signer : malloryRootSigner ,
456456 }))
457- require .Equal (t , 7 , tcTestFetchCount ) // fetch 1x mallory cert (+ CertList)
457+ require .Equal (t , 7 , tcTestFetchCount ) // fetch 1x mallory cert
458458 require .False (t , validateSync (ValidateSyncOptions {
459459 name : "/test/alice/data/extra" ,
460460 signer : mallorySigner ,
461461 }))
462- require .Equal (t , 8 , tcTestFetchCount ) // don't bother fetching mallory root because of schema miss (+ CertList)
462+ require .Equal (t , 8 , tcTestFetchCount ) // only CertList fetched; mallory root skipped by schema
463463 require .False (t , validateSync (ValidateSyncOptions {
464464 name : "/test/mallory/data4" ,
465465 signer : mallorySigner ,
466466 }))
467- require .Equal (t , 11 , tcTestFetchCount ) // schema hit, fetch 2x mallory certs (+ CertList)
467+ require .Equal (t , 11 , tcTestFetchCount ) // schema hit, 3 fetches: 2x mallory certs + 1x CertList
468468
469469 // Sign with mallory's malicious keys (root 2)
470470 // In this case the root certificate name is the same, so that cert should not be fetched
0 commit comments