| Index: net/socket/ssl_server_socket_unittest.cc
|
| diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc
|
| index 92481a8e782f335232c1941abf1a72fab19993ef..ad1493463c5a1923e3e6f53be4fb45d932bf49b1 100644
|
| --- a/net/socket/ssl_server_socket_unittest.cc
|
| +++ b/net/socket/ssl_server_socket_unittest.cc
|
| @@ -69,10 +69,15 @@
|
| #include "net/ssl/ssl_server_config.h"
|
| #include "net/ssl/test_ssl_private_key.h"
|
| #include "net/test/cert_test_util.h"
|
| +#include "net/test/gtest_util.h"
|
| #include "net/test/test_data_directory.h"
|
| +#include "testing/gmock/include/gmock/gmock.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| #include "testing/platform_test.h"
|
|
|
| +using net::test::IsError;
|
| +using net::test::IsOk;
|
| +
|
| namespace net {
|
|
|
| namespace {
|
| @@ -541,8 +546,8 @@ TEST_F(SSLServerSocketTest, Handshake) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(OK, client_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info;
|
| @@ -576,8 +581,8 @@ TEST_F(SSLServerSocketTest, HandshakeCached) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(OK, client_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info;
|
| @@ -598,8 +603,8 @@ TEST_F(SSLServerSocketTest, HandshakeCached) {
|
| client_ret2 = connect_callback2.GetResult(client_ret2);
|
| server_ret2 = handshake_callback2.GetResult(server_ret2);
|
|
|
| - ASSERT_EQ(OK, client_ret2);
|
| - ASSERT_EQ(OK, server_ret2);
|
| + ASSERT_THAT(client_ret2, IsOk());
|
| + ASSERT_THAT(server_ret2, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info2;
|
| @@ -624,8 +629,8 @@ TEST_F(SSLServerSocketTest, HandshakeCachedContextSwitch) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(OK, client_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info;
|
| @@ -648,8 +653,8 @@ TEST_F(SSLServerSocketTest, HandshakeCachedContextSwitch) {
|
| client_ret2 = connect_callback2.GetResult(client_ret2);
|
| server_ret2 = handshake_callback2.GetResult(server_ret2);
|
|
|
| - ASSERT_EQ(OK, client_ret2);
|
| - ASSERT_EQ(OK, server_ret2);
|
| + ASSERT_THAT(client_ret2, IsOk());
|
| + ASSERT_THAT(server_ret2, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info2;
|
| @@ -681,8 +686,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCert) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(OK, client_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info;
|
| @@ -715,8 +720,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertCached) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(OK, client_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info;
|
| @@ -741,8 +746,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertCached) {
|
| client_ret2 = connect_callback2.GetResult(client_ret2);
|
| server_ret2 = handshake_callback2.GetResult(server_ret2);
|
|
|
| - ASSERT_EQ(OK, client_ret2);
|
| - ASSERT_EQ(OK, server_ret2);
|
| + ASSERT_THAT(client_ret2, IsOk());
|
| + ASSERT_THAT(server_ret2, IsOk());
|
|
|
| // Make sure the cert status is expected.
|
| SSLInfo ssl_info2;
|
| @@ -785,7 +790,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSupplied) {
|
|
|
| client_socket_->Disconnect();
|
|
|
| - EXPECT_EQ(ERR_FAILED, handshake_callback.GetResult(server_ret));
|
| + EXPECT_THAT(handshake_callback.GetResult(server_ret), IsError(ERR_FAILED));
|
| }
|
|
|
| TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) {
|
| @@ -818,7 +823,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) {
|
|
|
| client_socket_->Disconnect();
|
|
|
| - EXPECT_EQ(ERR_FAILED, handshake_callback.GetResult(server_ret));
|
| + EXPECT_THAT(handshake_callback.GetResult(server_ret), IsError(ERR_FAILED));
|
| server_socket_->Disconnect();
|
|
|
| // Below, check that the cache didn't store the result of a failed handshake.
|
| @@ -840,7 +845,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) {
|
|
|
| client_socket_->Disconnect();
|
|
|
| - EXPECT_EQ(ERR_FAILED, handshake_callback2.GetResult(server_ret2));
|
| + EXPECT_THAT(handshake_callback2.GetResult(server_ret2), IsError(ERR_FAILED));
|
| }
|
|
|
| TEST_F(SSLServerSocketTest, HandshakeWithWrongClientCertSupplied) {
|
| @@ -919,9 +924,9 @@ TEST_F(SSLServerSocketTest, DataTransfer) {
|
| ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING);
|
|
|
| client_ret = connect_callback.GetResult(client_ret);
|
| - ASSERT_EQ(OK, client_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| server_ret = handshake_callback.GetResult(server_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| const int kReadBufSize = 1024;
|
| scoped_refptr<StringIOBuffer> write_buf =
|
| @@ -1003,9 +1008,9 @@ TEST_F(SSLServerSocketTest, ClientWriteAfterServerClose) {
|
| ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING);
|
|
|
| client_ret = connect_callback.GetResult(client_ret);
|
| - ASSERT_EQ(OK, client_ret);
|
| + ASSERT_THAT(client_ret, IsOk());
|
| server_ret = handshake_callback.GetResult(server_ret);
|
| - ASSERT_EQ(OK, server_ret);
|
| + ASSERT_THAT(server_ret, IsOk());
|
|
|
| scoped_refptr<StringIOBuffer> write_buf = new StringIOBuffer("testing123");
|
|
|
| @@ -1053,10 +1058,10 @@ TEST_F(SSLServerSocketTest, ExportKeyingMaterial) {
|
| ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING);
|
|
|
| if (client_ret == ERR_IO_PENDING) {
|
| - ASSERT_EQ(OK, connect_callback.WaitForResult());
|
| + ASSERT_THAT(connect_callback.WaitForResult(), IsOk());
|
| }
|
| if (server_ret == ERR_IO_PENDING) {
|
| - ASSERT_EQ(OK, handshake_callback.WaitForResult());
|
| + ASSERT_THAT(handshake_callback.WaitForResult(), IsOk());
|
| }
|
|
|
| const int kKeyingMaterialSize = 32;
|
| @@ -1065,12 +1070,12 @@ TEST_F(SSLServerSocketTest, ExportKeyingMaterial) {
|
| unsigned char server_out[kKeyingMaterialSize];
|
| int rv = server_socket_->ExportKeyingMaterial(
|
| kKeyingLabel, false, kKeyingContext, server_out, sizeof(server_out));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
|
|
| unsigned char client_out[kKeyingMaterialSize];
|
| rv = client_socket_->ExportKeyingMaterial(kKeyingLabel, false, kKeyingContext,
|
| client_out, sizeof(client_out));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| EXPECT_EQ(0, memcmp(server_out, client_out, sizeof(server_out)));
|
|
|
| const char kKeyingLabelBad[] = "EXPERIMENTAL-server-socket-test-bad";
|
| @@ -1114,8 +1119,8 @@ TEST_F(SSLServerSocketTest, RequireEcdheFlag) {
|
| client_ret = connect_callback.GetResult(client_ret);
|
| server_ret = handshake_callback.GetResult(server_ret);
|
|
|
| - ASSERT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, client_ret);
|
| - ASSERT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, server_ret);
|
| + ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
| + ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
| }
|
|
|
| } // namespace net
|
|
|