| Index: net/socket/ssl_client_socket_unittest.cc
|
| ===================================================================
|
| --- net/socket/ssl_client_socket_unittest.cc (revision 48758)
|
| +++ net/socket/ssl_client_socket_unittest.cc (working copy)
|
| @@ -84,7 +84,7 @@
|
|
|
| rv = sock->Connect(&callback);
|
| EXPECT_TRUE(net::LogContainsBeginEvent(
|
| - log.entries(), 4, net::NetLog::TYPE_SSL_CONNECT));
|
| + log.entries(), 5, net::NetLog::TYPE_SSL_CONNECT));
|
| if (rv != net::OK) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
| @@ -128,7 +128,7 @@
|
|
|
| rv = sock->Connect(&callback);
|
| EXPECT_TRUE(net::LogContainsBeginEvent(
|
| - log.entries(), 4, net::NetLog::TYPE_SSL_CONNECT));
|
| + log.entries(), 5, net::NetLog::TYPE_SSL_CONNECT));
|
| if (rv != net::OK) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
| @@ -174,7 +174,7 @@
|
| rv = sock->Connect(&callback);
|
|
|
| EXPECT_TRUE(net::LogContainsBeginEvent(
|
| - log.entries(), 4, net::NetLog::TYPE_SSL_CONNECT));
|
| + log.entries(), 5, net::NetLog::TYPE_SSL_CONNECT));
|
| if (rv != net::ERR_CERT_COMMON_NAME_INVALID) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|