Index: net/cert/multi_threaded_cert_verifier_unittest.cc |
diff --git a/net/cert/multi_threaded_cert_verifier_unittest.cc b/net/cert/multi_threaded_cert_verifier_unittest.cc |
index cb58291e69dbb998d790fc7d820231534c5f9bb8..a3db543f0d7b5db057af046a6361cb11fcc4b175 100644 |
--- a/net/cert/multi_threaded_cert_verifier_unittest.cc |
+++ b/net/cert/multi_threaded_cert_verifier_unittest.cc |
@@ -85,13 +85,13 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) { |
int error; |
CertVerifyResult verify_result; |
TestCompletionCallback callback; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
ASSERT_TRUE(IsCertificateError(error)); |
ASSERT_EQ(1u, verifier_.requests()); |
@@ -100,12 +100,12 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) { |
ASSERT_EQ(1u, verifier_.GetCacheSize()); |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
// Synchronous completion. |
ASSERT_NE(ERR_IO_PENDING, error); |
ASSERT_TRUE(IsCertificateError(error)); |
- ASSERT_TRUE(request_handle == NULL); |
+ ASSERT_FALSE(request); |
ASSERT_EQ(2u, verifier_.requests()); |
ASSERT_EQ(1u, verifier_.cache_hits()); |
ASSERT_EQ(0u, verifier_.inflight_joins()); |
@@ -145,13 +145,13 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) { |
int error; |
CertVerifyResult verify_result; |
TestCompletionCallback callback; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
error = verifier_.Verify(cert_chain1.get(), "www.example.com", std::string(), |
0, NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ &request, BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
ASSERT_TRUE(IsCertificateError(error)); |
ASSERT_EQ(1u, verifier_.requests()); |
@@ -161,9 +161,9 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) { |
error = verifier_.Verify(cert_chain2.get(), "www.example.com", std::string(), |
0, NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ &request, BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
ASSERT_TRUE(IsCertificateError(error)); |
ASSERT_EQ(2u, verifier_.requests()); |
@@ -182,21 +182,21 @@ TEST_F(MultiThreadedCertVerifierTest, InflightJoin) { |
int error; |
CertVerifyResult verify_result; |
TestCompletionCallback callback; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
CertVerifyResult verify_result2; |
TestCompletionCallback callback2; |
- scoped_ptr<CertVerifier::Request> request_handle2; |
+ scoped_ptr<CertVerifier::Request> request2; |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
NULL, &verify_result2, callback2.callback(), |
- &request_handle2, BoundNetLog()); |
+ &request2, BoundNetLog()); |
EXPECT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle2); |
+ EXPECT_TRUE(request2); |
error = callback.WaitForResult(); |
EXPECT_TRUE(IsCertificateError(error)); |
error = callback2.WaitForResult(); |
@@ -215,14 +215,14 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) { |
int error; |
CertVerifyResult verify_result; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
NULL, &verify_result, base::Bind(&FailTest), |
- &request_handle, BoundNetLog()); |
+ &request, BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- ASSERT_TRUE(request_handle); |
- request_handle.reset(); |
+ ASSERT_TRUE(request); |
+ request.reset(); |
// Issue a few more requests to the worker pool and wait for their |
// completion, so that the task of the canceled request (which runs on a |
@@ -231,9 +231,9 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) { |
for (int i = 0; i < 5; ++i) { |
error = verifier_.Verify(test_cert.get(), "www2.example.com", std::string(), |
0, NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ &request, BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
verifier_.ClearCache(); |
} |
@@ -249,7 +249,7 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) { |
int error; |
CertVerifyResult verify_result; |
TestCompletionCallback callback; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
{ |
// Because shutdown intentionally doesn't join worker threads, a |
@@ -258,11 +258,11 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) { |
ANNOTATE_SCOPED_MEMORY_LEAK; |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), |
0, NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ &request, BoundNetLog()); |
} |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
- request_handle.reset(); |
+ EXPECT_TRUE(request); |
+ request.reset(); |
// Destroy |verifier| by going out of scope. |
} |
@@ -393,15 +393,15 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) { |
int error; |
CertVerifyResult verify_result; |
TestCompletionCallback callback; |
- scoped_ptr<CertVerifier::Request> request_handle; |
+ scoped_ptr<CertVerifier::Request> request; |
EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) |
.WillOnce(ReturnRef(empty_cert_list)); |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
Mock::VerifyAndClearExpectations(&trust_provider); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
ASSERT_EQ(1u, verifier_.requests()); |
@@ -411,11 +411,11 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) { |
EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) |
.WillOnce(ReturnRef(empty_cert_list)); |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
Mock::VerifyAndClearExpectations(&trust_provider); |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
- EXPECT_FALSE(request_handle); |
+ EXPECT_FALSE(request); |
ASSERT_EQ(2u, verifier_.requests()); |
ASSERT_EQ(1u, verifier_.cache_hits()); |
@@ -424,11 +424,11 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) { |
EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors()) |
.WillOnce(ReturnRef(cert_list)); |
error = verifier_.Verify(test_cert.get(), "www.example.com", std::string(), 0, |
- NULL, &verify_result, callback.callback(), |
- &request_handle, BoundNetLog()); |
+ NULL, &verify_result, callback.callback(), &request, |
+ BoundNetLog()); |
Mock::VerifyAndClearExpectations(&trust_provider); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle); |
+ EXPECT_TRUE(request); |
error = callback.WaitForResult(); |
EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error); |
ASSERT_EQ(3u, verifier_.requests()); |
@@ -446,19 +446,19 @@ TEST_F(MultiThreadedCertVerifierTest, MultipleInflightJoin) { |
int error; |
CertVerifyResult verify_result1; |
TestCompletionCallback callback1; |
- scoped_ptr<CertVerifier::Request> request_handle1; |
+ scoped_ptr<CertVerifier::Request> request1; |
CertVerifyResult verify_result2; |
TestCompletionCallback callback2; |
- scoped_ptr<CertVerifier::Request> request_handle2; |
+ scoped_ptr<CertVerifier::Request> request2; |
CertVerifyResult verify_result3; |
TestCompletionCallback callback3; |
- scoped_ptr<CertVerifier::Request> request_handle3; |
+ scoped_ptr<CertVerifier::Request> request3; |
CertVerifyResult verify_result4; |
TestCompletionCallback callback4; |
- scoped_ptr<CertVerifier::Request> request_handle4; |
+ scoped_ptr<CertVerifier::Request> request4; |
CertVerifyResult verify_result5; |
TestCompletionCallback callback5; |
- scoped_ptr<CertVerifier::Request> request_handle5; |
+ scoped_ptr<CertVerifier::Request> request5; |
const char domain1[] = "www.example1.com"; |
const char domain2[] = "www.exampleB.com"; |
@@ -466,35 +466,35 @@ TEST_F(MultiThreadedCertVerifierTest, MultipleInflightJoin) { |
// Start 3 unique requests. |
error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr, |
- &verify_result1, callback1.callback(), |
- &request_handle1, BoundNetLog()); |
+ &verify_result1, callback1.callback(), &request1, |
+ BoundNetLog()); |
ASSERT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle1); |
+ EXPECT_TRUE(request1); |
error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr, |
- &verify_result2, callback2.callback(), |
- &request_handle2, BoundNetLog()); |
+ &verify_result2, callback2.callback(), &request2, |
+ BoundNetLog()); |
EXPECT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle2); |
+ EXPECT_TRUE(request2); |
error = verifier_.Verify(test_cert.get(), domain3, std::string(), 0, nullptr, |
- &verify_result3, callback3.callback(), |
- &request_handle3, BoundNetLog()); |
+ &verify_result3, callback3.callback(), &request3, |
+ BoundNetLog()); |
EXPECT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle3); |
+ EXPECT_TRUE(request3); |
// Start duplicate requests (which should join to existing jobs). |
error = verifier_.Verify(test_cert.get(), domain1, std::string(), 0, nullptr, |
- &verify_result4, callback4.callback(), |
- &request_handle4, BoundNetLog()); |
+ &verify_result4, callback4.callback(), &request4, |
+ BoundNetLog()); |
EXPECT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle4); |
+ EXPECT_TRUE(request4); |
error = verifier_.Verify(test_cert.get(), domain2, std::string(), 0, nullptr, |
- &verify_result5, callback5.callback(), |
- &request_handle5, BoundNetLog()); |
+ &verify_result5, callback5.callback(), &request5, |
+ BoundNetLog()); |
EXPECT_EQ(ERR_IO_PENDING, error); |
- EXPECT_TRUE(request_handle5); |
+ EXPECT_TRUE(request5); |
error = callback1.WaitForResult(); |
EXPECT_TRUE(IsCertificateError(error)); |