| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 578456add59533a62a6da4152e8cfd3ea3d3ab55..b616f58af29ac4b2f913ede243b14d0a7a2eca8e 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -773,7 +773,7 @@ class SSLClientSocketTest : public PlatformTest {
|
| scoped_ptr<TransportSecurityState> transport_security_state_;
|
| SSLClientSocketContext context_;
|
| scoped_ptr<SSLClientSocket> sock_;
|
| - CapturingNetLog log_;
|
| + TestNetLog log_;
|
|
|
| private:
|
| scoped_ptr<StreamSocket> transport_;
|
| @@ -799,7 +799,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| return NULL;
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -970,7 +970,7 @@ class SSLClientSocketChannelIDTest : public SSLClientSocketTest {
|
| // timeout. This means that an SSL connect end event may appear as a socket
|
| // write.
|
| static bool LogContainsSSLConnectEndEvent(
|
| - const CapturingNetLog::CapturedEntryList& log,
|
| + const TestNetLog::CapturedEntryList& log,
|
| int i) {
|
| return LogContainsEndEvent(log, i, NetLog::TYPE_SSL_CONNECT) ||
|
| LogContainsEvent(
|
| @@ -999,7 +999,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -1014,7 +1014,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
|
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1041,7 +1041,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -1056,7 +1056,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) {
|
|
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1085,7 +1085,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -1100,7 +1100,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) {
|
|
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1129,7 +1129,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -1144,7 +1144,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) {
|
|
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1188,7 +1188,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -1209,7 +1209,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) {
|
| // TODO(davidben): Add a test which requires them and verify the error.
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2105,7 +2105,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| log.SetLogLevel(NetLog::LOG_ALL);
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| @@ -2136,7 +2136,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv);
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| size_t last_index = ExpectLogContainsSomewhereAfter(
|
| entries, 5, NetLog::TYPE_SSL_SOCKET_BYTES_SENT, NetLog::PHASE_NONE);
|
| @@ -2230,7 +2230,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -2248,7 +2248,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) {
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| rv = sock->Connect(callback.callback());
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
|
|
| @@ -2529,7 +2529,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) {
|
| ASSERT_TRUE(test_server.GetAddressList(&addr));
|
|
|
| TestCompletionCallback callback;
|
| - CapturingNetLog log;
|
| + TestNetLog log;
|
| scoped_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, &log, NetLog::Source()));
|
| int rv = transport->Connect(callback.callback());
|
| @@ -2542,7 +2542,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) {
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = sock->Connect(callback.callback());
|
|
|
| - CapturingNetLog::CapturedEntryList entries;
|
| + TestNetLog::CapturedEntryList entries;
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
|
|