| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index c048beac564fd1dfbd8b5a63da3d6b5355c1547c..dce9f0a8c3008518c709abdb5081e3bbf3f43438 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -690,7 +690,9 @@ class SSLClientSocketTest : public PlatformTest {
|
| const AddressList& addr() const { return addr_; }
|
|
|
| // The SpawnedTestServer object, after calling StartTestServer().
|
| - const SpawnedTestServer* test_server() const { return test_server_.get(); }
|
| + const SpawnedTestServer* spawned_test_server() const {
|
| + return spawned_test_server_.get();
|
| + }
|
|
|
| void SetCTVerifier(CTVerifier* ct_verifier) {
|
| context_.cert_transparency_verifier = ct_verifier;
|
| @@ -699,14 +701,14 @@ class SSLClientSocketTest : public PlatformTest {
|
| // Starts the test server with SSL configuration |ssl_options|. Returns true
|
| // on success.
|
| bool StartTestServer(const SpawnedTestServer::SSLOptions& ssl_options) {
|
| - test_server_.reset(new SpawnedTestServer(
|
| + spawned_test_server_.reset(new SpawnedTestServer(
|
| SpawnedTestServer::TYPE_HTTPS, ssl_options, base::FilePath()));
|
| - if (!test_server_->Start()) {
|
| + if (!spawned_test_server_->Start()) {
|
| LOG(ERROR) << "Could not start SpawnedTestServer";
|
| return false;
|
| }
|
|
|
| - if (!test_server_->GetAddressList(&addr_)) {
|
| + if (!spawned_test_server_->GetAddressList(&addr_)) {
|
| LOG(ERROR) << "Could not get SpawnedTestServer address list";
|
| return false;
|
| }
|
| @@ -741,8 +743,8 @@ class SSLClientSocketTest : public PlatformTest {
|
| return false;
|
| }
|
|
|
| - sock_ = CreateSSLClientSocket(transport.Pass(),
|
| - test_server_->host_port_pair(), ssl_config);
|
| + sock_ = CreateSSLClientSocket(
|
| + transport.Pass(), spawned_test_server_->host_port_pair(), ssl_config);
|
| EXPECT_FALSE(sock_->IsConnected());
|
|
|
| *result = callback_.GetResult(sock_->Connect(callback_.callback()));
|
| @@ -757,7 +759,7 @@ class SSLClientSocketTest : public PlatformTest {
|
| TestNetLog log_;
|
|
|
| private:
|
| - scoped_ptr<SpawnedTestServer> test_server_;
|
| + scoped_ptr<SpawnedTestServer> spawned_test_server_;
|
| TestCompletionCallback callback_;
|
| AddressList addr_;
|
| };
|
| @@ -769,13 +771,13 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| // the SSLCertRequestInfo reported by the socket.
|
| scoped_refptr<SSLCertRequestInfo> GetCertRequest(
|
| SpawnedTestServer::SSLOptions ssl_options) {
|
| - SpawnedTestServer test_server(
|
| - SpawnedTestServer::TYPE_HTTPS, ssl_options, base::FilePath());
|
| - if (!test_server.Start())
|
| + SpawnedTestServer spawned_test_server(SpawnedTestServer::TYPE_HTTPS,
|
| + ssl_options, base::FilePath());
|
| + if (!spawned_test_server.Start())
|
| return NULL;
|
|
|
| AddressList addr;
|
| - if (!test_server.GetAddressList(&addr))
|
| + if (!spawned_test_server.GetAddressList(&addr))
|
| return NULL;
|
|
|
| TestCompletionCallback callback;
|
| @@ -786,7 +788,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server.host_port_pair(), SSLConfig()));
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| @@ -796,8 +798,8 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| sock->GetSSLCertRequestInfo(request_info.get());
|
| sock->Disconnect();
|
| EXPECT_FALSE(sock->IsConnected());
|
| - EXPECT_TRUE(
|
| - test_server.host_port_pair().Equals(request_info->host_and_port));
|
| + EXPECT_TRUE(spawned_test_server.host_port_pair().Equals(
|
| + request_info->host_and_port));
|
|
|
| return request_info;
|
| }
|
| @@ -823,7 +825,7 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest {
|
| TestCompletionCallback* callback,
|
| FakeBlockingStreamSocket** out_raw_transport,
|
| scoped_ptr<SSLClientSocket>* out_sock) {
|
| - CHECK(test_server());
|
| + CHECK(spawned_test_server());
|
|
|
| scoped_ptr<StreamSocket> real_transport(
|
| new TCPClientSocket(addr(), NULL, NetLog::Source()));
|
| @@ -834,7 +836,8 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest {
|
|
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
| scoped_ptr<SSLClientSocket> sock = CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), client_config);
|
| + transport.Pass(), spawned_test_server()->host_port_pair(),
|
| + client_config);
|
|
|
| // Connect. Stop before the client processes the first server leg
|
| // (ServerHello, etc.)
|
| @@ -949,7 +952,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -1096,7 +1099,7 @@ TEST_F(SSLClientSocketTest, Read) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
| EXPECT_EQ(0, sock->GetTotalReceivedBytes());
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| @@ -1157,7 +1160,7 @@ TEST_F(SSLClientSocketTest, Connect_WithSynchronousError) {
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| raw_transport->SetNextWriteError(ERR_CONNECTION_RESET);
|
|
|
| @@ -1187,7 +1190,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1241,7 +1244,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) {
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1307,7 +1310,8 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousErrorNoRead) {
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - counting_socket.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + counting_socket.Pass(), spawned_test_server()->host_port_pair(),
|
| + ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| ASSERT_EQ(OK, rv);
|
| @@ -1407,7 +1411,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock = CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config);
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config);
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1515,7 +1519,7 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) {
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1601,7 +1605,7 @@ TEST_F(SSLClientSocketTest, Connect_WithZeroReturn) {
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
|
|
| raw_transport->SetNextReadError(0);
|
|
|
| @@ -1630,7 +1634,7 @@ TEST_F(SSLClientSocketTest, Read_WithZeroReturn) {
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1665,7 +1669,7 @@ TEST_F(SSLClientSocketTest, Read_WithAsyncZeroReturn) {
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), ssl_config));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1738,7 +1742,7 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) {
|
| ASSERT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| ASSERT_EQ(OK, rv);
|
| @@ -1805,7 +1809,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(OK, rv);
|
| @@ -1873,7 +1877,7 @@ TEST_F(SSLClientSocketTest, PrematureApplicationData) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
|
| @@ -1920,8 +1924,8 @@ TEST_F(SSLClientSocketTest, ClientSocketHandleNotFromPool) {
|
| socket_handle->SetSocket(transport.Pass());
|
|
|
| scoped_ptr<SSLClientSocket> sock(socket_factory_->CreateSSLClientSocket(
|
| - socket_handle.Pass(), test_server()->host_port_pair(), SSLConfig(),
|
| - context_));
|
| + socket_handle.Pass(), spawned_test_server()->host_port_pair(),
|
| + SSLConfig(), context_));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| @@ -2356,7 +2360,7 @@ TEST_F(SSLClientSocketTest, ReusableAfterWrite) {
|
| ASSERT_EQ(OK, callback.GetResult(transport->Connect(callback.callback())));
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server()->host_port_pair(), SSLConfig()));
|
| + transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig()));
|
| ASSERT_EQ(OK, callback.GetResult(sock->Connect(callback.callback())));
|
|
|
| // Block any application data from reaching the network.
|
|
|