| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 63884f4637697a76f28306da0af5376aa420573a..e93b1bdbfc36cd1ddc7148c69d7b062802767089 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -1501,9 +1501,8 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| ASSERT_EQ(ERR_IO_PENDING, rv);
|
| ASSERT_FALSE(read_callback.have_result());
|
|
|
| - // Attempt to write the remaining data. NSS will not be able to consume the
|
| - // application data because the internal buffers are full, while OpenSSL will
|
| - // return that its blocked because the underlying transport is blocked.
|
| + // Attempt to write the remaining data. OpenSSL will return that its blocked
|
| + // because the underlying transport is blocked.
|
| rv = raw_sock->Write(request_buffer.get(),
|
| request_buffer->BytesRemaining(),
|
| callback.callback());
|
| @@ -2458,10 +2457,8 @@ TEST_F(SSLClientSocketTest, ReuseStates) {
|
|
|
| // TODO(davidben): Read one byte to ensure the test server has responded and
|
| // then assert IsConnectedAndIdle is false. This currently doesn't work
|
| - // because neither SSLClientSocketNSS nor SSLClientSocketOpenSSL check their
|
| - // SSL implementation's internal buffers. Either call PR_Available and
|
| - // SSL_pending, although the former isn't actually implemented or perhaps
|
| - // attempt to read one byte extra.
|
| + // because SSLClientSocketImpl doesn't check the implementation's internal
|
| + // buffer. Call SSL_pending.
|
| }
|
|
|
| // Tests that IsConnectedAndIdle treats a socket as idle even if a Write hasn't
|
| @@ -2492,8 +2489,8 @@ TEST_F(SSLClientSocketTest, ReusableAfterWrite) {
|
| scoped_refptr<IOBuffer> request_buffer(new IOBuffer(kRequestLen));
|
| memcpy(request_buffer->data(), kRequestText, kRequestLen);
|
|
|
| - // Although transport writes are blocked, both SSLClientSocketOpenSSL and
|
| - // SSLClientSocketNSS complete the outer Write operation.
|
| + // Although transport writes are blocked, SSLClientSocketImpl completes the
|
| + // outer Write operation.
|
| EXPECT_EQ(static_cast<int>(kRequestLen),
|
| callback.GetResult(sock->Write(request_buffer.get(), kRequestLen,
|
| callback.callback())));
|
|
|