Index: net/socket/ssl_client_socket_unittest.cc |
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc |
index df3c44bd2e42a0b1634b632e384bd39e4cb087ab..ac573edc5ebce17f431ec7dbb592e392d23d3a45 100644 |
--- a/net/socket/ssl_client_socket_unittest.cc |
+++ b/net/socket/ssl_client_socket_unittest.cc |
@@ -4,6 +4,8 @@ |
#include "net/socket/ssl_client_socket.h" |
+#include <utility> |
+ |
#include "base/callback_helpers.h" |
#include "base/location.h" |
#include "base/macros.h" |
@@ -61,7 +63,7 @@ namespace { |
class WrappedStreamSocket : public StreamSocket { |
public: |
explicit WrappedStreamSocket(scoped_ptr<StreamSocket> transport) |
- : transport_(transport.Pass()) {} |
+ : transport_(std::move(transport)) {} |
~WrappedStreamSocket() override {} |
// StreamSocket implementation: |
@@ -179,7 +181,7 @@ class ReadBufferingStreamSocket : public WrappedStreamSocket { |
ReadBufferingStreamSocket::ReadBufferingStreamSocket( |
scoped_ptr<StreamSocket> transport) |
- : WrappedStreamSocket(transport.Pass()), |
+ : WrappedStreamSocket(std::move(transport)), |
read_buffer_(new GrowableIOBuffer()), |
buffer_size_(0) {} |
@@ -313,7 +315,7 @@ class SynchronousErrorStreamSocket : public WrappedStreamSocket { |
SynchronousErrorStreamSocket::SynchronousErrorStreamSocket( |
scoped_ptr<StreamSocket> transport) |
- : WrappedStreamSocket(transport.Pass()), |
+ : WrappedStreamSocket(std::move(transport)), |
have_read_error_(false), |
pending_read_error_(OK), |
have_write_error_(false), |
@@ -415,7 +417,7 @@ class FakeBlockingStreamSocket : public WrappedStreamSocket { |
FakeBlockingStreamSocket::FakeBlockingStreamSocket( |
scoped_ptr<StreamSocket> transport) |
- : WrappedStreamSocket(transport.Pass()), |
+ : WrappedStreamSocket(std::move(transport)), |
should_block_read_(false), |
pending_read_result_(ERR_IO_PENDING), |
should_block_write_(false), |
@@ -563,7 +565,7 @@ void FakeBlockingStreamSocket::OnReadCompleted(int result) { |
class CountingStreamSocket : public WrappedStreamSocket { |
public: |
explicit CountingStreamSocket(scoped_ptr<StreamSocket> transport) |
- : WrappedStreamSocket(transport.Pass()), |
+ : WrappedStreamSocket(std::move(transport)), |
read_count_(0), |
write_count_(0) {} |
~CountingStreamSocket() override {} |
@@ -736,9 +738,9 @@ class SSLClientSocketTest : public PlatformTest { |
const HostPortPair& host_and_port, |
const SSLConfig& ssl_config) { |
scoped_ptr<ClientSocketHandle> connection(new ClientSocketHandle); |
- connection->SetSocket(transport_socket.Pass()); |
+ connection->SetSocket(std::move(transport_socket)); |
return socket_factory_->CreateSSLClientSocket( |
- connection.Pass(), host_and_port, ssl_config, context_); |
+ std::move(connection), host_and_port, ssl_config, context_); |
} |
// Create an SSLClientSocket object and use it to connect to a test |
@@ -759,8 +761,9 @@ class SSLClientSocketTest : public PlatformTest { |
return false; |
} |
- sock_ = CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server_->host_port_pair(), ssl_config); |
+ sock_ = CreateSSLClientSocket(std::move(transport), |
+ spawned_test_server_->host_port_pair(), |
+ ssl_config); |
EXPECT_FALSE(sock_->IsConnected()); |
*result = callback_.GetResult(sock_->Connect(callback_.callback())); |
@@ -819,7 +822,8 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest { |
EXPECT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server.host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server.host_port_pair(), |
+ SSLConfig())); |
EXPECT_FALSE(sock->IsConnected()); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
@@ -861,13 +865,13 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(real_transport.Pass())); |
+ new FakeBlockingStreamSocket(std::move(real_transport))); |
int rv = callback->GetResult(transport->Connect(callback->callback())); |
EXPECT_EQ(OK, rv); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
scoped_ptr<SSLClientSocket> sock = CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
client_config); |
// Connect. Stop before the client processes the first server leg |
@@ -891,7 +895,7 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest { |
raw_transport->UnblockWrite(); |
*out_raw_transport = raw_transport; |
- *out_sock = sock.Pass(); |
+ *out_sock = std::move(sock); |
} |
void TestFalseStart(const SpawnedTestServer::SSLOptions& server_options, |
@@ -983,7 +987,8 @@ TEST_F(SSLClientSocketTest, Connect) { |
EXPECT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
EXPECT_FALSE(sock->IsConnected()); |
@@ -1130,7 +1135,8 @@ TEST_F(SSLClientSocketTest, Read) { |
EXPECT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
EXPECT_EQ(0, sock->GetTotalReceivedBytes()); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
@@ -1181,7 +1187,7 @@ TEST_F(SSLClientSocketTest, Connect_WithSynchronousError) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<SynchronousErrorStreamSocket> transport( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1191,7 +1197,8 @@ TEST_F(SSLClientSocketTest, Connect_WithSynchronousError) { |
SynchronousErrorStreamSocket* raw_transport = transport.get(); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
raw_transport->SetNextWriteError(ERR_CONNECTION_RESET); |
@@ -1211,7 +1218,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<SynchronousErrorStreamSocket> transport( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1221,7 +1228,8 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) { |
SynchronousErrorStreamSocket* raw_transport = transport.get(); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1262,10 +1270,10 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) { |
// Note: |error_socket|'s ownership is handed to |transport|, but a pointer |
// is retained in order to configure additional errors. |
scoped_ptr<SynchronousErrorStreamSocket> error_socket( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
SynchronousErrorStreamSocket* raw_error_socket = error_socket.get(); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(error_socket.Pass())); |
+ new FakeBlockingStreamSocket(std::move(error_socket))); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1275,7 +1283,8 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) { |
ssl_config.false_start_enabled = false; |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1328,10 +1337,10 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousErrorNoRead) { |
// Note: intermediate sockets' ownership are handed to |sock|, but a pointer |
// is retained in order to query them. |
scoped_ptr<SynchronousErrorStreamSocket> error_socket( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
SynchronousErrorStreamSocket* raw_error_socket = error_socket.get(); |
scoped_ptr<CountingStreamSocket> counting_socket( |
- new CountingStreamSocket(error_socket.Pass())); |
+ new CountingStreamSocket(std::move(error_socket))); |
CountingStreamSocket* raw_counting_socket = counting_socket.get(); |
int rv = callback.GetResult(counting_socket->Connect(callback.callback())); |
ASSERT_EQ(OK, rv); |
@@ -1341,7 +1350,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousErrorNoRead) { |
ssl_config.false_start_enabled = false; |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- counting_socket.Pass(), spawned_test_server()->host_port_pair(), |
+ std::move(counting_socket), spawned_test_server()->host_port_pair(), |
ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
@@ -1428,10 +1437,10 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) { |
// Note: |error_socket|'s ownership is handed to |transport|, but a pointer |
// is retained in order to configure additional errors. |
scoped_ptr<SynchronousErrorStreamSocket> error_socket( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
SynchronousErrorStreamSocket* raw_error_socket = error_socket.get(); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(error_socket.Pass())); |
+ new FakeBlockingStreamSocket(std::move(error_socket))); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
@@ -1442,7 +1451,8 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) { |
ssl_config.false_start_enabled = false; |
scoped_ptr<SSLClientSocket> sock = CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1536,10 +1546,10 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) { |
// Note: |error_socket|'s ownership is handed to |transport|, but a pointer |
// is retained in order to configure additional errors. |
scoped_ptr<SynchronousErrorStreamSocket> error_socket( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
SynchronousErrorStreamSocket* raw_error_socket = error_socket.get(); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(error_socket.Pass())); |
+ new FakeBlockingStreamSocket(std::move(error_socket))); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
@@ -1550,7 +1560,8 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) { |
ssl_config.false_start_enabled = false; |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1630,13 +1641,14 @@ TEST_F(SSLClientSocketTest, Connect_WithZeroReturn) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<SynchronousErrorStreamSocket> transport( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
SynchronousErrorStreamSocket* raw_transport = transport.get(); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
raw_transport->SetNextReadError(0); |
@@ -1655,7 +1667,7 @@ TEST_F(SSLClientSocketTest, Read_WithZeroReturn) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<SynchronousErrorStreamSocket> transport( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1665,7 +1677,8 @@ TEST_F(SSLClientSocketTest, Read_WithZeroReturn) { |
SynchronousErrorStreamSocket* raw_transport = transport.get(); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1687,10 +1700,10 @@ TEST_F(SSLClientSocketTest, Read_WithAsyncZeroReturn) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<SynchronousErrorStreamSocket> error_socket( |
- new SynchronousErrorStreamSocket(real_transport.Pass())); |
+ new SynchronousErrorStreamSocket(std::move(real_transport))); |
SynchronousErrorStreamSocket* raw_error_socket = error_socket.get(); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(error_socket.Pass())); |
+ new FakeBlockingStreamSocket(std::move(error_socket))); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1700,7 +1713,8 @@ TEST_F(SSLClientSocketTest, Read_WithAsyncZeroReturn) { |
ssl_config.false_start_enabled = false; |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), ssl_config)); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ ssl_config)); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1767,13 +1781,14 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<ReadBufferingStreamSocket> transport( |
- new ReadBufferingStreamSocket(real_transport.Pass())); |
+ new ReadBufferingStreamSocket(std::move(real_transport))); |
ReadBufferingStreamSocket* raw_transport = transport.get(); |
int rv = callback.GetResult(transport->Connect(callback.callback())); |
ASSERT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
ASSERT_EQ(OK, rv); |
@@ -1840,7 +1855,8 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { |
EXPECT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(OK, rv); |
@@ -1908,7 +1924,8 @@ TEST_F(SSLClientSocketTest, PrematureApplicationData) { |
EXPECT_EQ(OK, rv); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
rv = callback.GetResult(sock->Connect(callback.callback())); |
EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv); |
@@ -1952,10 +1969,10 @@ TEST_F(SSLClientSocketTest, ClientSocketHandleNotFromPool) { |
EXPECT_EQ(OK, rv); |
scoped_ptr<ClientSocketHandle> socket_handle(new ClientSocketHandle()); |
- socket_handle->SetSocket(transport.Pass()); |
+ socket_handle->SetSocket(std::move(transport)); |
scoped_ptr<SSLClientSocket> sock(socket_factory_->CreateSSLClientSocket( |
- socket_handle.Pass(), spawned_test_server()->host_port_pair(), |
+ std::move(socket_handle), spawned_test_server()->host_port_pair(), |
SSLConfig(), context_)); |
EXPECT_FALSE(sock->IsConnected()); |
@@ -2472,12 +2489,13 @@ TEST_F(SSLClientSocketTest, ReusableAfterWrite) { |
scoped_ptr<StreamSocket> real_transport( |
new TCPClientSocket(addr(), NULL, NetLog::Source())); |
scoped_ptr<FakeBlockingStreamSocket> transport( |
- new FakeBlockingStreamSocket(real_transport.Pass())); |
+ new FakeBlockingStreamSocket(std::move(real_transport))); |
FakeBlockingStreamSocket* raw_transport = transport.get(); |
ASSERT_EQ(OK, callback.GetResult(transport->Connect(callback.callback()))); |
scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket( |
- transport.Pass(), spawned_test_server()->host_port_pair(), SSLConfig())); |
+ std::move(transport), spawned_test_server()->host_port_pair(), |
+ SSLConfig())); |
ASSERT_EQ(OK, callback.GetResult(sock->Connect(callback.callback()))); |
// Block any application data from reaching the network. |
@@ -2529,7 +2547,7 @@ TEST_F(SSLClientSocketTest, SessionResumption) { |
TestCompletionCallback callback; |
ASSERT_EQ(OK, callback.GetResult(transport->Connect(callback.callback()))); |
scoped_ptr<SSLClientSocket> sock = CreateSSLClientSocket( |
- transport.Pass(), HostPortPair("example.com", 443), ssl_config); |
+ std::move(transport), HostPortPair("example.com", 443), ssl_config); |
ASSERT_EQ(OK, callback.GetResult(sock->Connect(callback.callback()))); |
ASSERT_TRUE(sock->GetSSLInfo(&ssl_info)); |
EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type); |