OLD | NEW |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/spdy/spdy_test_util_common.h" | 5 #include "net/spdy/spdy_test_util_common.h" |
6 | 6 |
7 #include <cstddef> | 7 #include <cstddef> |
8 | 8 |
9 #include "base/compiler_specific.h" | 9 #include "base/compiler_specific.h" |
10 #include "base/memory/scoped_ptr.h" | 10 #include "base/memory/scoped_ptr.h" |
(...skipping 522 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
533 http_session->GetTransportSocketPool( | 533 http_session->GetTransportSocketPool( |
534 HttpNetworkSession::NORMAL_SOCKET_POOL), | 534 HttpNetworkSession::NORMAL_SOCKET_POOL), |
535 net_log); | 535 net_log); |
536 } | 536 } |
537 | 537 |
538 if (rv == ERR_IO_PENDING) | 538 if (rv == ERR_IO_PENDING) |
539 rv = callback.WaitForResult(); | 539 rv = callback.WaitForResult(); |
540 | 540 |
541 EXPECT_EQ(OK, rv); | 541 EXPECT_EQ(OK, rv); |
542 | 542 |
543 base::WeakPtr<SpdySession> spdy_session = | 543 base::WeakPtr<SpdySession> spdy_session; |
| 544 EXPECT_EQ( |
| 545 expected_status, |
544 http_session->spdy_session_pool()->CreateAvailableSessionFromSocket( | 546 http_session->spdy_session_pool()->CreateAvailableSessionFromSocket( |
545 key, connection.Pass(), net_log, OK, is_secure); | 547 key, connection.Pass(), net_log, OK, &spdy_session, |
546 // Failure is reported asynchronously. | 548 is_secure)); |
547 EXPECT_TRUE(spdy_session != NULL); | 549 EXPECT_EQ(expected_status == OK, spdy_session != NULL); |
548 EXPECT_TRUE(HasSpdySession(http_session->spdy_session_pool(), key)); | 550 EXPECT_EQ(expected_status == OK, |
| 551 HasSpdySession(http_session->spdy_session_pool(), key)); |
549 return spdy_session; | 552 return spdy_session; |
550 } | 553 } |
551 | 554 |
552 } // namespace | 555 } // namespace |
553 | 556 |
554 base::WeakPtr<SpdySession> CreateInsecureSpdySession( | 557 base::WeakPtr<SpdySession> CreateInsecureSpdySession( |
555 const scoped_refptr<HttpNetworkSession>& http_session, | 558 const scoped_refptr<HttpNetworkSession>& http_session, |
556 const SpdySessionKey& key, | 559 const SpdySessionKey& key, |
557 const BoundNetLog& net_log) { | 560 const BoundNetLog& net_log) { |
558 return CreateSpdySessionHelper(http_session, key, net_log, | 561 return CreateSpdySessionHelper(http_session, key, net_log, |
559 OK, false /* is_secure */); | 562 OK, false /* is_secure */); |
560 } | 563 } |
561 | 564 |
562 base::WeakPtr<SpdySession> TryCreateInsecureSpdySessionExpectingFailure( | 565 void TryCreateInsecureSpdySessionExpectingFailure( |
563 const scoped_refptr<HttpNetworkSession>& http_session, | 566 const scoped_refptr<HttpNetworkSession>& http_session, |
564 const SpdySessionKey& key, | 567 const SpdySessionKey& key, |
565 Error expected_error, | 568 Error expected_error, |
566 const BoundNetLog& net_log) { | 569 const BoundNetLog& net_log) { |
567 DCHECK_LT(expected_error, ERR_IO_PENDING); | 570 DCHECK_LT(expected_error, ERR_IO_PENDING); |
568 return CreateSpdySessionHelper(http_session, key, net_log, | 571 CreateSpdySessionHelper(http_session, key, net_log, |
569 expected_error, false /* is_secure */); | 572 expected_error, false /* is_secure */); |
570 } | 573 } |
571 | 574 |
572 base::WeakPtr<SpdySession> CreateSecureSpdySession( | 575 base::WeakPtr<SpdySession> CreateSecureSpdySession( |
573 const scoped_refptr<HttpNetworkSession>& http_session, | 576 const scoped_refptr<HttpNetworkSession>& http_session, |
574 const SpdySessionKey& key, | 577 const SpdySessionKey& key, |
575 const BoundNetLog& net_log) { | 578 const BoundNetLog& net_log) { |
576 return CreateSpdySessionHelper(http_session, key, net_log, | 579 return CreateSpdySessionHelper(http_session, key, net_log, |
577 OK, true /* is_secure */); | 580 OK, true /* is_secure */); |
578 } | 581 } |
579 | 582 |
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
633 private: | 636 private: |
634 int read_result_; | 637 int read_result_; |
635 }; | 638 }; |
636 | 639 |
637 base::WeakPtr<SpdySession> CreateFakeSpdySessionHelper( | 640 base::WeakPtr<SpdySession> CreateFakeSpdySessionHelper( |
638 SpdySessionPool* pool, | 641 SpdySessionPool* pool, |
639 const SpdySessionKey& key, | 642 const SpdySessionKey& key, |
640 Error expected_status) { | 643 Error expected_status) { |
641 EXPECT_NE(expected_status, ERR_IO_PENDING); | 644 EXPECT_NE(expected_status, ERR_IO_PENDING); |
642 EXPECT_FALSE(HasSpdySession(pool, key)); | 645 EXPECT_FALSE(HasSpdySession(pool, key)); |
| 646 base::WeakPtr<SpdySession> spdy_session; |
643 scoped_ptr<ClientSocketHandle> handle(new ClientSocketHandle()); | 647 scoped_ptr<ClientSocketHandle> handle(new ClientSocketHandle()); |
644 handle->SetSocket(scoped_ptr<StreamSocket>(new FakeSpdySessionClientSocket( | 648 handle->SetSocket(scoped_ptr<StreamSocket>(new FakeSpdySessionClientSocket( |
645 expected_status == OK ? ERR_IO_PENDING : expected_status))); | 649 expected_status == OK ? ERR_IO_PENDING : expected_status))); |
646 base::WeakPtr<SpdySession> spdy_session = | 650 EXPECT_EQ( |
| 651 expected_status, |
647 pool->CreateAvailableSessionFromSocket( | 652 pool->CreateAvailableSessionFromSocket( |
648 key, handle.Pass(), BoundNetLog(), OK, true /* is_secure */); | 653 key, handle.Pass(), BoundNetLog(), OK, &spdy_session, |
649 // Failure is reported asynchronously. | 654 true /* is_secure */)); |
650 EXPECT_TRUE(spdy_session != NULL); | 655 EXPECT_EQ(expected_status == OK, spdy_session != NULL); |
651 EXPECT_TRUE(HasSpdySession(pool, key)); | 656 EXPECT_EQ(expected_status == OK, HasSpdySession(pool, key)); |
652 return spdy_session; | 657 return spdy_session; |
653 } | 658 } |
654 | 659 |
655 } // namespace | 660 } // namespace |
656 | 661 |
657 base::WeakPtr<SpdySession> CreateFakeSpdySession(SpdySessionPool* pool, | 662 base::WeakPtr<SpdySession> CreateFakeSpdySession(SpdySessionPool* pool, |
658 const SpdySessionKey& key) { | 663 const SpdySessionKey& key) { |
659 return CreateFakeSpdySessionHelper(pool, key, OK); | 664 return CreateFakeSpdySessionHelper(pool, key, OK); |
660 } | 665 } |
661 | 666 |
662 base::WeakPtr<SpdySession> TryCreateFakeSpdySessionExpectingFailure( | 667 void TryCreateFakeSpdySessionExpectingFailure(SpdySessionPool* pool, |
663 SpdySessionPool* pool, | 668 const SpdySessionKey& key, |
664 const SpdySessionKey& key, | 669 Error expected_error) { |
665 Error expected_error) { | |
666 DCHECK_LT(expected_error, ERR_IO_PENDING); | 670 DCHECK_LT(expected_error, ERR_IO_PENDING); |
667 return CreateFakeSpdySessionHelper(pool, key, expected_error); | 671 CreateFakeSpdySessionHelper(pool, key, expected_error); |
668 } | 672 } |
669 | 673 |
670 SpdySessionPoolPeer::SpdySessionPoolPeer(SpdySessionPool* pool) : pool_(pool) { | 674 SpdySessionPoolPeer::SpdySessionPoolPeer(SpdySessionPool* pool) : pool_(pool) { |
671 } | 675 } |
672 | 676 |
673 void SpdySessionPoolPeer::RemoveAliases(const SpdySessionKey& key) { | 677 void SpdySessionPoolPeer::RemoveAliases(const SpdySessionKey& key) { |
674 pool_->RemoveAliases(key); | 678 pool_->RemoveAliases(key); |
675 } | 679 } |
676 | 680 |
677 void SpdySessionPoolPeer::DisableDomainAuthenticationVerification() { | 681 void SpdySessionPoolPeer::DisableDomainAuthenticationVerification() { |
(...skipping 555 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
1233 (*headers)[GetSchemeKey()] = scheme.c_str(); | 1237 (*headers)[GetSchemeKey()] = scheme.c_str(); |
1234 (*headers)[GetVersionKey()] = "HTTP/1.1"; | 1238 (*headers)[GetVersionKey()] = "HTTP/1.1"; |
1235 if (content_length) { | 1239 if (content_length) { |
1236 std::string length_str = base::Int64ToString(*content_length); | 1240 std::string length_str = base::Int64ToString(*content_length); |
1237 (*headers)["content-length"] = length_str; | 1241 (*headers)["content-length"] = length_str; |
1238 } | 1242 } |
1239 return headers.Pass(); | 1243 return headers.Pass(); |
1240 } | 1244 } |
1241 | 1245 |
1242 } // namespace net | 1246 } // namespace net |
OLD | NEW |