Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(543)

Side by Side Diff: net/http/http_proxy_client_socket_pool_unittest.cc

Issue 8857002: net: split the SSL session cache between incognito and normal. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: ... Created 9 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/http/http_proxy_client_socket_pool.h" 5 #include "net/http/http_proxy_client_socket_pool.h"
6 6
7 #include "base/callback.h" 7 #include "base/callback.h"
8 #include "base/compiler_specific.h" 8 #include "base/compiler_specific.h"
9 #include "base/string_util.h" 9 #include "base/string_util.h"
10 #include "base/utf_string_conversions.h" 10 #include "base/utf_string_conversions.h"
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
64 proxy_service_(ProxyService::CreateDirect()), 64 proxy_service_(ProxyService::CreateDirect()),
65 ssl_config_service_(new SSLConfigServiceDefaults), 65 ssl_config_service_(new SSLConfigServiceDefaults),
66 ssl_socket_pool_(kMaxSockets, kMaxSocketsPerGroup, 66 ssl_socket_pool_(kMaxSockets, kMaxSocketsPerGroup,
67 &ssl_histograms_, 67 &ssl_histograms_,
68 &host_resolver_, 68 &host_resolver_,
69 &cert_verifier_, 69 &cert_verifier_,
70 NULL /* origin_bound_cert_store */, 70 NULL /* origin_bound_cert_store */,
71 NULL /* dnsrr_resolver */, 71 NULL /* dnsrr_resolver */,
72 NULL /* dns_cert_checker */, 72 NULL /* dns_cert_checker */,
73 NULL /* ssl_host_info_factory */, 73 NULL /* ssl_host_info_factory */,
74 "" /* ssl_session_cache_shard */,
74 &socket_factory_, 75 &socket_factory_,
75 &transport_socket_pool_, 76 &transport_socket_pool_,
76 NULL, 77 NULL,
77 NULL, 78 NULL,
78 ssl_config_service_.get(), 79 ssl_config_service_.get(),
79 BoundNetLog().net_log()), 80 BoundNetLog().net_log()),
80 http_auth_handler_factory_( 81 http_auth_handler_factory_(
81 HttpAuthHandlerFactory::CreateDefault(&host_resolver_)), 82 HttpAuthHandlerFactory::CreateDefault(&host_resolver_)),
82 session_(CreateNetworkSession()), 83 session_(CreateNetworkSession()),
83 http_proxy_histograms_("HttpProxyUnitTest"), 84 http_proxy_histograms_("HttpProxyUnitTest"),
(...skipping 444 matching lines...) Expand 10 before | Expand all | Expand 10 after
528 // HTTPS or SPDY Proxy CONNECT responses are trustworthy 529 // HTTPS or SPDY Proxy CONNECT responses are trustworthy
529 EXPECT_EQ(ERR_HTTPS_PROXY_TUNNEL_RESPONSE, rv); 530 EXPECT_EQ(ERR_HTTPS_PROXY_TUNNEL_RESPONSE, rv);
530 EXPECT_TRUE(handle_.is_initialized()); 531 EXPECT_TRUE(handle_.is_initialized());
531 EXPECT_TRUE(handle_.socket()); 532 EXPECT_TRUE(handle_.socket());
532 } 533 }
533 } 534 }
534 535
535 // It would be nice to also test the timeouts in HttpProxyClientSocketPool. 536 // It would be nice to also test the timeouts in HttpProxyClientSocketPool.
536 537
537 } // namespace net 538 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698