Index: net/socket/ssl_client_socket_unittest.cc |
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc |
index 9267abd5eda963a1b7afdcde9646b5cd95a18f1f..81b34307bc30c0e7a57f8ff5ddf771cba11dcdd2 100644 |
--- a/net/socket/ssl_client_socket_unittest.cc |
+++ b/net/socket/ssl_client_socket_unittest.cc |
@@ -19,8 +19,10 @@ |
#include "net/cert/test_root_certs.h" |
#include "net/dns/host_resolver.h" |
#include "net/http/transport_security_state.h" |
+#include "net/log/captured_net_log_entry.h" |
#include "net/log/net_log.h" |
#include "net/log/net_log_unittest.h" |
+#include "net/log/test_net_log.h" |
#include "net/socket/client_socket_factory.h" |
#include "net/socket/client_socket_handle.h" |
#include "net/socket/socket_test_util.h" |
@@ -969,9 +971,8 @@ class SSLClientSocketChannelIDTest : public SSLClientSocketTest { |
// they'll give up waiting for application data and send the Finished after a |
// timeout. This means that an SSL connect end event may appear as a socket |
// write. |
-static bool LogContainsSSLConnectEndEvent( |
- const TestNetLog::CapturedEntryList& log, |
- int i) { |
+static bool LogContainsSSLConnectEndEvent(const CapturedNetLogEntry::List& log, |
+ int i) { |
return LogContainsEndEvent(log, i, NetLog::TYPE_SSL_CONNECT) || |
LogContainsEvent( |
log, i, NetLog::TYPE_SOCKET_BYTES_SENT, NetLog::PHASE_NONE); |
@@ -1014,7 +1015,7 @@ TEST_F(SSLClientSocketTest, Connect) { |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
@@ -1056,7 +1057,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) { |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
@@ -1100,7 +1101,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) { |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
@@ -1144,7 +1145,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) { |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
@@ -1209,7 +1210,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) { |
// TODO(davidben): Add a test which requires them and verify the error. |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
@@ -2136,7 +2137,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { |
rv = callback.WaitForResult(); |
EXPECT_EQ(static_cast<int>(arraysize(request_text) - 1), rv); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
size_t last_index = ExpectLogContainsSomewhereAfter( |
entries, 5, NetLog::TYPE_SSL_SOCKET_BYTES_SENT, NetLog::PHASE_NONE); |
@@ -2248,7 +2249,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) { |
EXPECT_FALSE(sock->IsConnected()); |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
@@ -2542,7 +2543,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) { |
EXPECT_FALSE(sock->IsConnected()); |
rv = sock->Connect(callback.callback()); |
- TestNetLog::CapturedEntryList entries; |
+ CapturedNetLogEntry::List entries; |
log.GetEntries(&entries); |
EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |