| Index: net/socket/ssl_client_socket_unittest.cc
|
| ===================================================================
|
| --- net/socket/ssl_client_socket_unittest.cc (revision 37380)
|
| +++ net/socket/ssl_client_socket_unittest.cc (working copy)
|
| @@ -82,21 +82,21 @@
|
|
|
| scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded));
|
| rv = sock->Connect(&callback, log);
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, 0, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_BEGIN));
|
| + EXPECT_TRUE(net::LogContainsBeginEvent(
|
| + *log, 0, net::LoadLog::TYPE_SSL_CONNECT));
|
| if (rv != net::OK) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
| - EXPECT_FALSE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_FALSE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
|
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(net::OK, rv);
|
| }
|
|
|
| EXPECT_TRUE(sock->IsConnected());
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_TRUE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
|
|
| sock->Disconnect();
|
| EXPECT_FALSE(sock->IsConnected());
|
| @@ -126,13 +126,13 @@
|
|
|
| scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded));
|
| rv = sock->Connect(&callback, log);
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, 0, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_BEGIN));
|
| + EXPECT_TRUE(net::LogContainsBeginEvent(
|
| + *log, 0, net::LoadLog::TYPE_SSL_CONNECT));
|
| if (rv != net::OK) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
| - EXPECT_FALSE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_FALSE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
|
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(net::ERR_CERT_DATE_INVALID, rv);
|
| @@ -142,8 +142,8 @@
|
| // the socket when it encounters an error, whereas other implementations
|
| // leave it connected.
|
|
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_TRUE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
| }
|
|
|
| TEST_F(SSLClientSocketTest, ConnectMismatched) {
|
| @@ -171,13 +171,13 @@
|
|
|
| scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded));
|
| rv = sock->Connect(&callback, log);
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, 0, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_BEGIN));
|
| + EXPECT_TRUE(net::LogContainsBeginEvent(
|
| + *log, 0, net::LoadLog::TYPE_SSL_CONNECT));
|
| if (rv != net::ERR_CERT_COMMON_NAME_INVALID) {
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| EXPECT_FALSE(sock->IsConnected());
|
| - EXPECT_FALSE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_FALSE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
|
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(net::ERR_CERT_COMMON_NAME_INVALID, rv);
|
| @@ -187,8 +187,8 @@
|
| // the socket when it encounters an error, whereas other implementations
|
| // leave it connected.
|
|
|
| - EXPECT_TRUE(net::LogContains(
|
| - *log, -1, net::LoadLog::TYPE_SSL_CONNECT, net::LoadLog::PHASE_END));
|
| + EXPECT_TRUE(net::LogContainsEndEvent(
|
| + *log, -1, net::LoadLog::TYPE_SSL_CONNECT));
|
| }
|
|
|
| // TODO(wtc): Add unit tests for IsConnectedAndIdle:
|
|
|