| Index: net/socket/ssl_client_socket_unittest.cc | 
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc | 
| index 578456add59533a62a6da4152e8cfd3ea3d3ab55..b616f58af29ac4b2f913ede243b14d0a7a2eca8e 100644 | 
| --- a/net/socket/ssl_client_socket_unittest.cc | 
| +++ b/net/socket/ssl_client_socket_unittest.cc | 
| @@ -773,7 +773,7 @@ class SSLClientSocketTest : public PlatformTest { | 
| scoped_ptr<TransportSecurityState> transport_security_state_; | 
| SSLClientSocketContext context_; | 
| scoped_ptr<SSLClientSocket> sock_; | 
| -  CapturingNetLog log_; | 
| +  TestNetLog log_; | 
|  | 
| private: | 
| scoped_ptr<StreamSocket> transport_; | 
| @@ -799,7 +799,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest { | 
| return NULL; | 
|  | 
| TestCompletionCallback callback; | 
| -    CapturingNetLog log; | 
| +    TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -970,7 +970,7 @@ class SSLClientSocketChannelIDTest : public SSLClientSocketTest { | 
| // timeout. This means that an SSL connect end event may appear as a socket | 
| // write. | 
| static bool LogContainsSSLConnectEndEvent( | 
| -    const CapturingNetLog::CapturedEntryList& log, | 
| +    const TestNetLog::CapturedEntryList& log, | 
| int i) { | 
| return LogContainsEndEvent(log, i, NetLog::TYPE_SSL_CONNECT) || | 
| LogContainsEvent( | 
| @@ -999,7 +999,7 @@ TEST_F(SSLClientSocketTest, Connect) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -1014,7 +1014,7 @@ TEST_F(SSLClientSocketTest, Connect) { | 
|  | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
| @@ -1041,7 +1041,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -1056,7 +1056,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) { | 
|  | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
| @@ -1085,7 +1085,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -1100,7 +1100,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) { | 
|  | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
| @@ -1129,7 +1129,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -1144,7 +1144,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) { | 
|  | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
| @@ -1188,7 +1188,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -1209,7 +1209,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) { | 
| // TODO(davidben): Add a test which requires them and verify the error. | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
| @@ -2105,7 +2105,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| log.SetLogLevel(NetLog::LOG_ALL); | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| @@ -2136,7 +2136,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { | 
| rv = callback.WaitForResult(); | 
| EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| size_t last_index = ExpectLogContainsSomewhereAfter( | 
| entries, 5, NetLog::TYPE_SSL_SOCKET_BYTES_SENT, NetLog::PHASE_NONE); | 
| @@ -2230,7 +2230,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -2248,7 +2248,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) { | 
| EXPECT_FALSE(sock->IsConnected()); | 
|  | 
| rv = sock->Connect(callback.callback()); | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
|  | 
| @@ -2529,7 +2529,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) { | 
| ASSERT_TRUE(test_server.GetAddressList(&addr)); | 
|  | 
| TestCompletionCallback callback; | 
| -  CapturingNetLog log; | 
| +  TestNetLog log; | 
| scoped_ptr<StreamSocket> transport( | 
| new TCPClientSocket(addr, &log, NetLog::Source())); | 
| int rv = transport->Connect(callback.callback()); | 
| @@ -2542,7 +2542,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) { | 
| EXPECT_FALSE(sock->IsConnected()); | 
| rv = sock->Connect(callback.callback()); | 
|  | 
| -  CapturingNetLog::CapturedEntryList entries; | 
| +  TestNetLog::CapturedEntryList entries; | 
| log.GetEntries(&entries); | 
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); | 
| if (rv == ERR_IO_PENDING) | 
|  |