Index: net/socket/ssl_server_socket_unittest.cc |
diff --git a/net/socket/ssl_server_socket_unittest.cc b/net/socket/ssl_server_socket_unittest.cc |
index 92481a8e782f335232c1941abf1a72fab19993ef..ad1493463c5a1923e3e6f53be4fb45d932bf49b1 100644 |
--- a/net/socket/ssl_server_socket_unittest.cc |
+++ b/net/socket/ssl_server_socket_unittest.cc |
@@ -69,10 +69,15 @@ |
#include "net/ssl/ssl_server_config.h" |
#include "net/ssl/test_ssl_private_key.h" |
#include "net/test/cert_test_util.h" |
+#include "net/test/gtest_util.h" |
#include "net/test/test_data_directory.h" |
+#include "testing/gmock/include/gmock/gmock.h" |
#include "testing/gtest/include/gtest/gtest.h" |
#include "testing/platform_test.h" |
+using net::test::IsError; |
+using net::test::IsOk; |
+ |
namespace net { |
namespace { |
@@ -541,8 +546,8 @@ TEST_F(SSLServerSocketTest, Handshake) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, client_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
+ ASSERT_THAT(server_ret, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info; |
@@ -576,8 +581,8 @@ TEST_F(SSLServerSocketTest, HandshakeCached) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, client_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
+ ASSERT_THAT(server_ret, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info; |
@@ -598,8 +603,8 @@ TEST_F(SSLServerSocketTest, HandshakeCached) { |
client_ret2 = connect_callback2.GetResult(client_ret2); |
server_ret2 = handshake_callback2.GetResult(server_ret2); |
- ASSERT_EQ(OK, client_ret2); |
- ASSERT_EQ(OK, server_ret2); |
+ ASSERT_THAT(client_ret2, IsOk()); |
+ ASSERT_THAT(server_ret2, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info2; |
@@ -624,8 +629,8 @@ TEST_F(SSLServerSocketTest, HandshakeCachedContextSwitch) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, client_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
+ ASSERT_THAT(server_ret, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info; |
@@ -648,8 +653,8 @@ TEST_F(SSLServerSocketTest, HandshakeCachedContextSwitch) { |
client_ret2 = connect_callback2.GetResult(client_ret2); |
server_ret2 = handshake_callback2.GetResult(server_ret2); |
- ASSERT_EQ(OK, client_ret2); |
- ASSERT_EQ(OK, server_ret2); |
+ ASSERT_THAT(client_ret2, IsOk()); |
+ ASSERT_THAT(server_ret2, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info2; |
@@ -681,8 +686,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCert) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, client_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
+ ASSERT_THAT(server_ret, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info; |
@@ -715,8 +720,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertCached) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, client_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
+ ASSERT_THAT(server_ret, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info; |
@@ -741,8 +746,8 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertCached) { |
client_ret2 = connect_callback2.GetResult(client_ret2); |
server_ret2 = handshake_callback2.GetResult(server_ret2); |
- ASSERT_EQ(OK, client_ret2); |
- ASSERT_EQ(OK, server_ret2); |
+ ASSERT_THAT(client_ret2, IsOk()); |
+ ASSERT_THAT(server_ret2, IsOk()); |
// Make sure the cert status is expected. |
SSLInfo ssl_info2; |
@@ -785,7 +790,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSupplied) { |
client_socket_->Disconnect(); |
- EXPECT_EQ(ERR_FAILED, handshake_callback.GetResult(server_ret)); |
+ EXPECT_THAT(handshake_callback.GetResult(server_ret), IsError(ERR_FAILED)); |
} |
TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) { |
@@ -818,7 +823,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) { |
client_socket_->Disconnect(); |
- EXPECT_EQ(ERR_FAILED, handshake_callback.GetResult(server_ret)); |
+ EXPECT_THAT(handshake_callback.GetResult(server_ret), IsError(ERR_FAILED)); |
server_socket_->Disconnect(); |
// Below, check that the cache didn't store the result of a failed handshake. |
@@ -840,7 +845,7 @@ TEST_F(SSLServerSocketTest, HandshakeWithClientCertRequiredNotSuppliedCached) { |
client_socket_->Disconnect(); |
- EXPECT_EQ(ERR_FAILED, handshake_callback2.GetResult(server_ret2)); |
+ EXPECT_THAT(handshake_callback2.GetResult(server_ret2), IsError(ERR_FAILED)); |
} |
TEST_F(SSLServerSocketTest, HandshakeWithWrongClientCertSupplied) { |
@@ -919,9 +924,9 @@ TEST_F(SSLServerSocketTest, DataTransfer) { |
ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING); |
client_ret = connect_callback.GetResult(client_ret); |
- ASSERT_EQ(OK, client_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(server_ret, IsOk()); |
const int kReadBufSize = 1024; |
scoped_refptr<StringIOBuffer> write_buf = |
@@ -1003,9 +1008,9 @@ TEST_F(SSLServerSocketTest, ClientWriteAfterServerClose) { |
ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING); |
client_ret = connect_callback.GetResult(client_ret); |
- ASSERT_EQ(OK, client_ret); |
+ ASSERT_THAT(client_ret, IsOk()); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(OK, server_ret); |
+ ASSERT_THAT(server_ret, IsOk()); |
scoped_refptr<StringIOBuffer> write_buf = new StringIOBuffer("testing123"); |
@@ -1053,10 +1058,10 @@ TEST_F(SSLServerSocketTest, ExportKeyingMaterial) { |
ASSERT_TRUE(server_ret == OK || server_ret == ERR_IO_PENDING); |
if (client_ret == ERR_IO_PENDING) { |
- ASSERT_EQ(OK, connect_callback.WaitForResult()); |
+ ASSERT_THAT(connect_callback.WaitForResult(), IsOk()); |
} |
if (server_ret == ERR_IO_PENDING) { |
- ASSERT_EQ(OK, handshake_callback.WaitForResult()); |
+ ASSERT_THAT(handshake_callback.WaitForResult(), IsOk()); |
} |
const int kKeyingMaterialSize = 32; |
@@ -1065,12 +1070,12 @@ TEST_F(SSLServerSocketTest, ExportKeyingMaterial) { |
unsigned char server_out[kKeyingMaterialSize]; |
int rv = server_socket_->ExportKeyingMaterial( |
kKeyingLabel, false, kKeyingContext, server_out, sizeof(server_out)); |
- ASSERT_EQ(OK, rv); |
+ ASSERT_THAT(rv, IsOk()); |
unsigned char client_out[kKeyingMaterialSize]; |
rv = client_socket_->ExportKeyingMaterial(kKeyingLabel, false, kKeyingContext, |
client_out, sizeof(client_out)); |
- ASSERT_EQ(OK, rv); |
+ ASSERT_THAT(rv, IsOk()); |
EXPECT_EQ(0, memcmp(server_out, client_out, sizeof(server_out))); |
const char kKeyingLabelBad[] = "EXPERIMENTAL-server-socket-test-bad"; |
@@ -1114,8 +1119,8 @@ TEST_F(SSLServerSocketTest, RequireEcdheFlag) { |
client_ret = connect_callback.GetResult(client_ret); |
server_ret = handshake_callback.GetResult(server_ret); |
- ASSERT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, client_ret); |
- ASSERT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, server_ret); |
+ ASSERT_THAT(client_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
+ ASSERT_THAT(server_ret, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH)); |
} |
} // namespace net |