| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 2ac6959c9bd57772f8510b37a2581649e9b0ad2d..a05baff371b1642d99f8753f142b5666691d490a 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -54,12 +54,16 @@
|
| #include "net/ssl/ssl_info.h"
|
| #include "net/ssl/test_ssl_private_key.h"
|
| #include "net/test/cert_test_util.h"
|
| +#include "net/test/gtest_util.h"
|
| #include "net/test/spawned_test_server/spawned_test_server.h"
|
| #include "net/test/test_data_directory.h"
|
| #include "testing/gmock/include/gmock/gmock.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| #include "testing/platform_test.h"
|
|
|
| +using net::test::IsError;
|
| +using net::test::IsOk;
|
| +
|
| using testing::_;
|
| using testing::Return;
|
| using testing::Truly;
|
| @@ -860,7 +864,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| std::unique_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr, NULL, &log, NetLog::Source()));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server.host_port_pair(),
|
| @@ -868,7 +872,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(ERR_SSL_CLIENT_AUTH_CERT_NEEDED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
|
|
|
| scoped_refptr<SSLCertRequestInfo> request_info = new SSLCertRequestInfo();
|
| sock->GetSSLCertRequestInfo(request_info.get());
|
| @@ -908,7 +912,7 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest {
|
| std::unique_ptr<FakeBlockingStreamSocket> transport(
|
| new FakeBlockingStreamSocket(std::move(real_transport)));
|
| int rv = callback->GetResult(transport->Connect(callback->callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
| std::unique_ptr<SSLClientSocket> sock = CreateSSLClientSocket(
|
| @@ -919,7 +923,7 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest {
|
| // (ServerHello, etc.)
|
| raw_transport->BlockReadResult();
|
| rv = sock->Connect(callback->callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
| raw_transport->WaitForReadResult();
|
|
|
| // Release the ServerHello and wait for the client to write
|
| @@ -958,7 +962,7 @@ class SSLClientSocketFalseStartTest : public SSLClientSocketTest {
|
| // state machine sometimes lives on a separate thread, so this thread may
|
| // not yet have processed the signal that the handshake has completed.
|
| int rv = callback.WaitForResult();
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| @@ -1025,7 +1029,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
| std::unique_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr(), NULL, &log, NetLog::Source()));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| @@ -1040,7 +1044,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
| EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT));
|
| if (rv == ERR_IO_PENDING)
|
| rv = callback.WaitForResult();
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
| log.GetEntries(&entries);
|
| EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT));
|
| @@ -1058,7 +1062,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(ERR_CERT_DATE_INVALID, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CERT_DATE_INVALID));
|
|
|
| // Rather than testing whether or not the underlying socket is connected,
|
| // test that the handshake has finished. This is because it may be
|
| @@ -1078,7 +1082,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CERT_COMMON_NAME_INVALID));
|
|
|
| // Rather than testing whether or not the underlying socket is connected,
|
| // test that the handshake has finished. This is because it may be
|
| @@ -1101,7 +1105,7 @@ TEST_F(SSLClientSocketTest, ConnectBadValidity) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|
| - EXPECT_EQ(ERR_SSL_SERVER_CERT_BAD_FORMAT, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_SERVER_CERT_BAD_FORMAT));
|
| EXPECT_FALSE(IsCertificateError(rv));
|
|
|
| SSLInfo ssl_info;
|
| @@ -1119,7 +1123,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(ERR_SSL_CLIENT_AUTH_CERT_NEEDED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
|
|
|
| TestNetLogEntry::List entries;
|
| log_.GetEntries(&entries);
|
| @@ -1144,7 +1148,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // We responded to the server's certificate request with a Certificate
|
| // message with no client certificate in it. ssl_info.client_cert_sent
|
| @@ -1173,7 +1177,7 @@ TEST_F(SSLClientSocketTest, Read) {
|
| EXPECT_EQ(0, transport->GetTotalReceivedBytes());
|
|
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| @@ -1181,7 +1185,7 @@ TEST_F(SSLClientSocketTest, Read) {
|
| EXPECT_EQ(0, sock->GetTotalReceivedBytes());
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Number of network bytes received should increase because of SSL socket
|
| // establishment.
|
| @@ -1230,7 +1234,7 @@ TEST_F(SSLClientSocketTest, Connect_WithSynchronousError) {
|
| std::unique_ptr<SynchronousErrorStreamSocket> transport(
|
| new SynchronousErrorStreamSocket(std::move(real_transport)));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1244,7 +1248,7 @@ TEST_F(SSLClientSocketTest, Connect_WithSynchronousError) {
|
| raw_transport->SetNextWriteError(ERR_CONNECTION_RESET);
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(ERR_CONNECTION_RESET, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
|
| EXPECT_FALSE(sock->IsConnected());
|
| }
|
|
|
| @@ -1261,7 +1265,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
| std::unique_ptr<SynchronousErrorStreamSocket> transport(
|
| new SynchronousErrorStreamSocket(std::move(real_transport)));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1273,7 +1277,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| @@ -1295,7 +1299,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
| // rv != ERR_IO_PENDING is insufficient, as ERR_IO_PENDING is a legitimate
|
| // result when using a dedicated task runner for NSS.
|
| rv = callback.GetResult(sock->Read(buf.get(), 4096, callback.callback()));
|
| - EXPECT_EQ(ERR_CONNECTION_RESET, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
|
| }
|
|
|
| // Tests that the SSLClientSocket properly handles when the underlying transport
|
| @@ -1317,7 +1321,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) {
|
| new FakeBlockingStreamSocket(std::move(error_socket)));
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1328,7 +1332,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| @@ -1352,7 +1356,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) {
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
|
|
| rv = sock->Read(buf.get(), 4096, callback.callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
|
|
| // Now unblock the outgoing request, having it fail with the connection
|
| // being reset.
|
| @@ -1362,7 +1366,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousError) {
|
| // checking that rv != ERR_IO_PENDING is insufficient, as ERR_IO_PENDING
|
| // is a legitimate result when using a dedicated task runner for NSS.
|
| rv = callback.GetResult(rv);
|
| - EXPECT_EQ(ERR_CONNECTION_RESET, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
|
| }
|
|
|
| // If there is a Write failure at the transport with no follow-up Read, although
|
| @@ -1384,7 +1388,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousErrorNoRead) {
|
| new CountingStreamSocket(std::move(error_socket)));
|
| CountingStreamSocket* raw_counting_socket = counting_socket.get();
|
| int rv = callback.GetResult(counting_socket->Connect(callback.callback()));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1395,7 +1399,7 @@ TEST_F(SSLClientSocketTest, Write_WithSynchronousErrorNoRead) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| ASSERT_TRUE(sock->IsConnected());
|
|
|
| // Simulate an unclean/forcible shutdown on the underlying socket.
|
| @@ -1434,14 +1438,14 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Issue a "hanging" Read first.
|
| TestCompletionCallback callback;
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
| rv = sock_->Read(buf.get(), 4096, callback.callback());
|
| // We haven't written the request, so there should be no response yet.
|
| - ASSERT_EQ(ERR_IO_PENDING, rv);
|
| + ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
|
|
|
| // Write the request.
|
| // The request is padded with a User-Agent header to a size that causes the
|
| @@ -1485,7 +1489,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
|
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1496,7 +1500,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| ssl_config);
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| std::string request_text = "GET / HTTP/1.1\r\nUser-Agent: long browser name ";
|
| @@ -1521,7 +1525,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| rv = raw_sock->Read(read_buf.get(), 4096, read_callback.callback());
|
|
|
| // Ensure things didn't complete synchronously, otherwise |sock| is invalid.
|
| - ASSERT_EQ(ERR_IO_PENDING, rv);
|
| + ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
|
| ASSERT_FALSE(read_callback.have_result());
|
|
|
| // Attempt to write the remaining data. OpenSSL will return that its blocked
|
| @@ -1529,7 +1533,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| rv = raw_sock->Write(request_buffer.get(),
|
| request_buffer->BytesRemaining(),
|
| callback.callback());
|
| - ASSERT_EQ(ERR_IO_PENDING, rv);
|
| + ASSERT_THAT(rv, IsError(ERR_IO_PENDING));
|
| ASSERT_FALSE(callback.have_result());
|
|
|
| // Now unblock Write(), which will invoke OnSendComplete and (eventually)
|
| @@ -1538,7 +1542,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| raw_transport->UnblockWrite();
|
|
|
| rv = read_callback.WaitForResult();
|
| - EXPECT_EQ(ERR_CONNECTION_RESET, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
|
|
|
| // The Write callback should not have been called.
|
| EXPECT_FALSE(callback.have_result());
|
| @@ -1564,7 +1568,7 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) {
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
|
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to avoid handshake non-determinism.
|
| SSLConfig ssl_config;
|
| @@ -1575,7 +1579,7 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| // Send a request so there is something to read from the socket.
|
| @@ -1594,7 +1598,7 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) {
|
| raw_transport->BlockReadResult();
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
| rv = sock->Read(buf.get(), 4096, read_callback.callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
|
|
| // Perform another write, but have it fail. Write a request larger than the
|
| // internal socket buffers so that the request hits the underlying transport
|
| @@ -1626,7 +1630,7 @@ TEST_F(SSLClientSocketTest, Read_WithWriteError) {
|
| }
|
| } while (rv > 0);
|
|
|
| - EXPECT_EQ(ERR_CONNECTION_RESET, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_RESET));
|
|
|
| // Release the read.
|
| raw_transport->UnblockReadResult();
|
| @@ -1647,7 +1651,7 @@ TEST_F(SSLClientSocketTest, Connect_WithZeroReturn) {
|
| std::unique_ptr<SynchronousErrorStreamSocket> transport(
|
| new SynchronousErrorStreamSocket(std::move(real_transport)));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| @@ -1657,7 +1661,7 @@ TEST_F(SSLClientSocketTest, Connect_WithZeroReturn) {
|
| raw_transport->SetNextReadError(0);
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(ERR_CONNECTION_CLOSED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CONNECTION_CLOSED));
|
| EXPECT_FALSE(sock->IsConnected());
|
| }
|
|
|
| @@ -1673,7 +1677,7 @@ TEST_F(SSLClientSocketTest, Read_WithZeroReturn) {
|
| std::unique_ptr<SynchronousErrorStreamSocket> transport(
|
| new SynchronousErrorStreamSocket(std::move(real_transport)));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to ensure the handshake has completed.
|
| SSLConfig ssl_config;
|
| @@ -1685,7 +1689,7 @@ TEST_F(SSLClientSocketTest, Read_WithZeroReturn) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| raw_transport->SetNextReadError(0);
|
| @@ -1710,7 +1714,7 @@ TEST_F(SSLClientSocketTest, Read_WithAsyncZeroReturn) {
|
| new FakeBlockingStreamSocket(std::move(error_socket)));
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Disable TLS False Start to ensure the handshake has completed.
|
| SSLConfig ssl_config;
|
| @@ -1721,14 +1725,14 @@ TEST_F(SSLClientSocketTest, Read_WithAsyncZeroReturn) {
|
| ssl_config));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| raw_error_socket->SetNextReadError(0);
|
| raw_transport->BlockReadResult();
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
| rv = sock->Read(buf.get(), 4096, callback.callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
|
|
| raw_transport->UnblockReadResult();
|
| rv = callback.GetResult(rv);
|
| @@ -1744,7 +1748,7 @@ TEST_F(SSLClientSocketTest, Read_WithFatalAlert) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // Receive the fatal alert.
|
| TestCompletionCallback callback;
|
| @@ -1758,7 +1762,7 @@ TEST_F(SSLClientSocketTest, Read_SmallChunks) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| scoped_refptr<IOBuffer> request_buffer(
|
| @@ -1788,14 +1792,14 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) {
|
| new ReadBufferingStreamSocket(std::move(real_transport)));
|
| ReadBufferingStreamSocket* raw_transport = transport.get();
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| ASSERT_TRUE(sock->IsConnected());
|
|
|
| const char request_text[] = "GET /ssl-many-small-records HTTP/1.0\r\n\r\n";
|
| @@ -1829,7 +1833,7 @@ TEST_F(SSLClientSocketTest, Read_Interrupted) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| scoped_refptr<IOBuffer> request_buffer(
|
| @@ -1856,14 +1860,14 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| std::unique_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr(), NULL, &log, NetLog::Source()));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock->IsConnected());
|
|
|
| const char request_text[] = "GET / HTTP/1.0\r\n\r\n";
|
| @@ -1925,14 +1929,14 @@ TEST_F(SSLClientSocketTest, PrematureApplicationData) {
|
| std::unique_ptr<StreamSocket> transport(
|
| new MockTCPClientSocket(addr(), NULL, &data));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
|
| }
|
|
|
| TEST_F(SSLClientSocketTest, CipherSuiteDisables) {
|
| @@ -1956,7 +1960,7 @@ TEST_F(SSLClientSocketTest, CipherSuiteDisables) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
| }
|
|
|
| // When creating an SSLClientSocket, it is allowed to pass in a
|
| @@ -1970,7 +1974,7 @@ TEST_F(SSLClientSocketTest, ClientSocketHandleNotFromPool) {
|
| std::unique_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr(), NULL, NULL, NetLog::Source()));
|
| int rv = callback.GetResult(transport->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::unique_ptr<ClientSocketHandle> socket_handle(new ClientSocketHandle());
|
| socket_handle->SetSocket(std::move(transport));
|
| @@ -1981,7 +1985,7 @@ TEST_F(SSLClientSocketTest, ClientSocketHandleNotFromPool) {
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| }
|
|
|
| // Verifies that SSLClientSocket::ExportKeyingMaterial return a success
|
| @@ -1991,7 +1995,7 @@ TEST_F(SSLClientSocketTest, ExportKeyingMaterial) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| const int kKeyingMaterialSize = 32;
|
| @@ -2074,7 +2078,7 @@ TEST_F(SSLClientSocketTest, VerifyServerChainProperlyOrdered) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(ERR_CERT_INVALID, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CERT_INVALID));
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| // When given option CERT_CHAIN_WRONG_ROOT, SpawnedTestServer will present
|
| @@ -2167,7 +2171,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| TestNetLogEntry::List entries;
|
| @@ -2287,7 +2291,7 @@ TEST_F(SSLClientSocketTest, ConnectSignedCertTimestampsEnabledTLSExtension) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| EXPECT_TRUE(sock_->signed_cert_timestamps_received_);
|
| }
|
| @@ -2305,7 +2309,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusMaintainedNoCTVerifier) {
|
| // No verifier to skip CT and policy checks.
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| SSLInfo result;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&result));
|
| @@ -2341,7 +2345,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusMaintainedForCompliantCert) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| SSLInfo result;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&result));
|
| @@ -2377,7 +2381,7 @@ TEST_F(SSLClientSocketTest, EVCertStatusRemovedForNonCompliantCert) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| SSLInfo result;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&result));
|
| @@ -2430,7 +2434,7 @@ TEST_F(SSLClientSocketTest, ConnectSignedCertTimestampsEnabledOCSP) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| EXPECT_TRUE(sock_->stapled_ocsp_response_received_);
|
| }
|
| @@ -2446,7 +2450,7 @@ TEST_F(SSLClientSocketTest, ConnectSignedCertTimestampsDisabled) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| EXPECT_FALSE(sock_->signed_cert_timestamps_received_);
|
| }
|
| @@ -2496,12 +2500,13 @@ TEST_F(SSLClientSocketTest, ReusableAfterWrite) {
|
| std::unique_ptr<FakeBlockingStreamSocket> transport(
|
| new FakeBlockingStreamSocket(std::move(real_transport)));
|
| FakeBlockingStreamSocket* raw_transport = transport.get();
|
| - ASSERT_EQ(OK, callback.GetResult(transport->Connect(callback.callback())));
|
| + ASSERT_THAT(callback.GetResult(transport->Connect(callback.callback())),
|
| + IsOk());
|
|
|
| std::unique_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| std::move(transport), spawned_test_server()->host_port_pair(),
|
| SSLConfig()));
|
| - ASSERT_EQ(OK, callback.GetResult(sock->Connect(callback.callback())));
|
| + ASSERT_THAT(callback.GetResult(sock->Connect(callback.callback())), IsOk());
|
|
|
| // Block any application data from reaching the network.
|
| raw_transport->BlockWrite();
|
| @@ -2534,14 +2539,14 @@ TEST_F(SSLClientSocketTest, SessionResumption) {
|
| SSLConfig ssl_config;
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
|
|
| // The next connection should resume.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_RESUME, ssl_info.handshake_type);
|
| sock_.reset();
|
| @@ -2550,10 +2555,11 @@ TEST_F(SSLClientSocketTest, SessionResumption) {
|
| std::unique_ptr<StreamSocket> transport(
|
| new TCPClientSocket(addr(), NULL, &log_, NetLog::Source()));
|
| TestCompletionCallback callback;
|
| - ASSERT_EQ(OK, callback.GetResult(transport->Connect(callback.callback())));
|
| + ASSERT_THAT(callback.GetResult(transport->Connect(callback.callback())),
|
| + IsOk());
|
| std::unique_ptr<SSLClientSocket> sock = CreateSSLClientSocket(
|
| std::move(transport), HostPortPair("example.com", 443), ssl_config);
|
| - ASSERT_EQ(OK, callback.GetResult(sock->Connect(callback.callback())));
|
| + ASSERT_THAT(callback.GetResult(sock->Connect(callback.callback())), IsOk());
|
| ASSERT_TRUE(sock->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| sock.reset();
|
| @@ -2562,7 +2568,7 @@ TEST_F(SSLClientSocketTest, SessionResumption) {
|
|
|
| // After clearing the session cache, the next handshake doesn't resume.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| }
|
| @@ -2578,13 +2584,13 @@ TEST_F(SSLClientSocketTest, CertificateErrorNoResume) {
|
| SSLConfig ssl_config;
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - ASSERT_EQ(ERR_CERT_COMMON_NAME_INVALID, rv);
|
| + ASSERT_THAT(rv, IsError(ERR_CERT_COMMON_NAME_INVALID));
|
|
|
| cert_verifier_->set_default_result(OK);
|
|
|
| // The next connection should perform a full handshake.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - ASSERT_EQ(OK, rv);
|
| + ASSERT_THAT(rv, IsOk());
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| @@ -2605,7 +2611,7 @@ TEST_F(SSLClientSocketTest, FallbackShardSessionCache) {
|
| // session cache.
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(fallback_ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| SSLInfo ssl_info;
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| @@ -2614,7 +2620,7 @@ TEST_F(SSLClientSocketTest, FallbackShardSessionCache) {
|
|
|
| // A non-fallback connection needs a full handshake.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| EXPECT_EQ(SSL_CONNECTION_VERSION_TLS1_2,
|
| @@ -2627,7 +2633,7 @@ TEST_F(SSLClientSocketTest, FallbackShardSessionCache) {
|
|
|
| // The non-fallback connection added a > TLS 1.0 entry to the session cache.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_RESUME, ssl_info.handshake_type);
|
| // This does not check for equality because TLS 1.2 support is conditional on
|
| @@ -2639,7 +2645,7 @@ TEST_F(SSLClientSocketTest, FallbackShardSessionCache) {
|
| // offer the > TLS 1.0 session, so this must have been the session from the
|
| // first fallback connection.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(fallback_ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_RESUME, ssl_info.handshake_type);
|
| EXPECT_EQ(SSL_CONNECTION_VERSION_TLS1,
|
| @@ -2658,22 +2664,22 @@ TEST_F(SSLClientSocketTest, DHE) {
|
| SSLConfig ssl_config;
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
|
|
| ssl_config.dhe_enabled = true;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
|
|
| // Enabling deprecated ciphers gives DHE a dedicated error code.
|
| ssl_config.dhe_enabled = false;
|
| ssl_config.deprecated_cipher_suites_enabled = true;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(ERR_SSL_OBSOLETE_CIPHER, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_OBSOLETE_CIPHER));
|
|
|
| // Enabling both deprecated ciphers and DHE restores it.
|
| ssl_config.dhe_enabled = true;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| }
|
|
|
| // Tests that enabling deprecated ciphers shards the session cache.
|
| @@ -2688,20 +2694,20 @@ TEST_F(SSLClientSocketTest, DeprecatedShardSessionCache) {
|
| // Connect with deprecated ciphers enabled to warm the session cache cache.
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(deprecated_ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| SSLInfo ssl_info;
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
|
|
| // Test that re-connecting with deprecated ciphers enabled still resumes.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(deprecated_ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_RESUME, ssl_info.handshake_type);
|
|
|
| // However, a normal connection needs a full handshake.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
|
|
| @@ -2710,19 +2716,19 @@ TEST_F(SSLClientSocketTest, DeprecatedShardSessionCache) {
|
|
|
| // Now make a normal connection to prime the session cache.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
|
|
| // A normal connection should be able to resume.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_RESUME, ssl_info.handshake_type);
|
|
|
| // However, enabling deprecated ciphers connects fresh.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(deprecated_ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| EXPECT_EQ(SSLInfo::HANDSHAKE_FULL, ssl_info.handshake_type);
|
| }
|
| @@ -2737,7 +2743,7 @@ TEST_F(SSLClientSocketTest, RequireECDHE) {
|
| config.require_ecdhe = true;
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(config, &rv));
|
| - EXPECT_EQ(ERR_SSL_VERSION_OR_CIPHER_MISMATCH, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_VERSION_OR_CIPHER_MISMATCH));
|
| }
|
|
|
| TEST_F(SSLClientSocketTest, TokenBindingEnabled) {
|
| @@ -2750,7 +2756,7 @@ TEST_F(SSLClientSocketTest, TokenBindingEnabled) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| SSLInfo info;
|
| EXPECT_TRUE(sock_->GetSSLInfo(&info));
|
| EXPECT_TRUE(info.token_binding_negotiated);
|
| @@ -2768,7 +2774,7 @@ TEST_F(SSLClientSocketTest, TokenBindingFailsWithEmsDisabled) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_PROTOCOL_ERROR));
|
| }
|
|
|
| TEST_F(SSLClientSocketTest, TokenBindingEnabledWithoutServerSupport) {
|
| @@ -2780,7 +2786,7 @@ TEST_F(SSLClientSocketTest, TokenBindingEnabledWithoutServerSupport) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| SSLInfo info;
|
| EXPECT_TRUE(sock_->GetSSLInfo(&info));
|
| EXPECT_FALSE(info.token_binding_negotiated);
|
| @@ -2879,7 +2885,7 @@ TEST_F(SSLClientSocketFalseStartTest, SessionResumption) {
|
| // Make a second connection.
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // It should resume the session.
|
| SSLInfo ssl_info;
|
| @@ -2910,7 +2916,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBeforeFinished) {
|
| client_config, &callback, &raw_transport1, &sock1));
|
| // Although raw_transport1 has the server Finished blocked, the handshake
|
| // still completes.
|
| - EXPECT_EQ(OK, callback.WaitForResult());
|
| + EXPECT_THAT(callback.WaitForResult(), IsOk());
|
|
|
| // Continue to block the client (|sock1|) from processing the Finished
|
| // message, but allow it to arrive on the socket. This ensures that, from the
|
| @@ -2923,7 +2929,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBeforeFinished) {
|
| // doesn't come in one Read.
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
| int rv = sock1->Read(buf.get(), 4096, callback.callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
| raw_transport1->WaitForReadResult();
|
|
|
| // Drop the old socket. This is needed because the Python test server can't
|
| @@ -2932,7 +2938,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBeforeFinished) {
|
|
|
| // Start a second connection.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // No session resumption because the first connection never received a server
|
| // Finished message.
|
| @@ -2964,7 +2970,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBadFinished) {
|
| client_config, &callback, &raw_transport1, &sock1));
|
| // Although raw_transport1 has the server Finished blocked, the handshake
|
| // still completes.
|
| - EXPECT_EQ(OK, callback.WaitForResult());
|
| + EXPECT_THAT(callback.WaitForResult(), IsOk());
|
|
|
| // Continue to block the client (|sock1|) from processing the Finished
|
| // message, but allow it to arrive on the socket. This ensures that, from the
|
| @@ -2976,7 +2982,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBadFinished) {
|
| // the socket.
|
| scoped_refptr<IOBuffer> buf(new IOBuffer(4096));
|
| int rv = sock1->Read(buf.get(), 4096, callback.callback());
|
| - EXPECT_EQ(ERR_IO_PENDING, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_IO_PENDING));
|
| raw_transport1->WaitForReadResult();
|
|
|
| // The server's second leg, or part of it, is now received but not yet sent to
|
| @@ -2987,7 +2993,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBadFinished) {
|
|
|
| // Unblock the Finished message. |sock1->Read| should now fail.
|
| raw_transport1->UnblockReadResult();
|
| - EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, callback.GetResult(rv));
|
| + EXPECT_THAT(callback.GetResult(rv), IsError(ERR_SSL_PROTOCOL_ERROR));
|
|
|
| // Drop the old socket. This is needed because the Python test server can't
|
| // service two sockets in parallel.
|
| @@ -2995,7 +3001,7 @@ TEST_F(SSLClientSocketFalseStartTest, NoSessionResumptionBadFinished) {
|
|
|
| // Start a second connection.
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| // No session resumption because the first connection never received a server
|
| // Finished message.
|
| @@ -3017,7 +3023,7 @@ TEST_F(SSLClientSocketChannelIDTest, SendChannelID) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
| @@ -3063,7 +3069,7 @@ TEST_F(SSLClientSocketChannelIDTest, FailingChannelIDAsync) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|
| - EXPECT_EQ(ERR_UNEXPECTED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_UNEXPECTED));
|
| EXPECT_FALSE(sock_->IsConnected());
|
| }
|
|
|
| @@ -3105,7 +3111,7 @@ TEST_F(SSLClientSocketTest, NPN) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::string proto;
|
| EXPECT_EQ(SSLClientSocket::kNextProtoNegotiated, sock_->GetNextProto(&proto));
|
| @@ -3125,7 +3131,7 @@ TEST_F(SSLClientSocketTest, NPNNoOverlap) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::string proto;
|
| EXPECT_EQ(SSLClientSocket::kNextProtoNoOverlap, sock_->GetNextProto(&proto));
|
| @@ -3146,7 +3152,7 @@ TEST_F(SSLClientSocketTest, NPNServerPreference) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::string proto;
|
| EXPECT_EQ(SSLClientSocket::kNextProtoNegotiated, sock_->GetNextProto(&proto));
|
| @@ -3166,7 +3172,7 @@ TEST_F(SSLClientSocketTest, NPNClientDisabled) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::string proto;
|
| EXPECT_EQ(SSLClientSocket::kNextProtoUnsupported,
|
| @@ -3182,7 +3188,7 @@ TEST_F(SSLClientSocketTest, NPNServerDisabled) {
|
|
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(client_config, &rv));
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
|
|
| std::string proto;
|
| EXPECT_EQ(SSLClientSocket::kNextProtoUnsupported,
|
| @@ -3228,7 +3234,7 @@ TEST_F(SSLClientSocketTest, NoCert) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(SSLConfig(), &rv));
|
|
|
| - EXPECT_EQ(ERR_SSL_CLIENT_AUTH_CERT_NEEDED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_CLIENT_AUTH_CERT_NEEDED));
|
| EXPECT_FALSE(sock_->IsConnected());
|
| }
|
|
|
| @@ -3250,7 +3256,7 @@ TEST_F(SSLClientSocketTest, SendEmptyCert) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| SSLInfo ssl_info;
|
| @@ -3281,7 +3287,7 @@ TEST_F(SSLClientSocketTest, SendGoodCert) {
|
| int rv;
|
| ASSERT_TRUE(CreateAndConnectSSLClientSocket(ssl_config, &rv));
|
|
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| SSLInfo ssl_info;
|
| @@ -3329,7 +3335,7 @@ TEST_F(SSLClientSocketTest, PKPBypassedSet) {
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
|
|
| - EXPECT_EQ(OK, rv);
|
| + EXPECT_THAT(rv, IsOk());
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| EXPECT_TRUE(ssl_info.pkp_bypassed);
|
| @@ -3363,7 +3369,7 @@ TEST_F(SSLClientSocketTest, PKPEnforced) {
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
|
|
| - EXPECT_EQ(ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN));
|
| EXPECT_TRUE(ssl_info.cert_status & CERT_STATUS_PINNED_KEY_MISSING);
|
| EXPECT_TRUE(sock_->IsConnected());
|
|
|
| @@ -3407,7 +3413,7 @@ TEST_F(SSLClientSocketTest, CTIsRequired) {
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
|
|
| - EXPECT_EQ(ERR_CERTIFICATE_TRANSPARENCY_REQUIRED, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_CERTIFICATE_TRANSPARENCY_REQUIRED));
|
| EXPECT_TRUE(ssl_info.cert_status &
|
| CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED);
|
| EXPECT_TRUE(sock_->IsConnected());
|
| @@ -3458,7 +3464,7 @@ TEST_F(SSLClientSocketTest, PKPMoreImportantThanCT) {
|
| SSLInfo ssl_info;
|
| ASSERT_TRUE(sock_->GetSSLInfo(&ssl_info));
|
|
|
| - EXPECT_EQ(ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN, rv);
|
| + EXPECT_THAT(rv, IsError(ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN));
|
| EXPECT_TRUE(ssl_info.cert_status & CERT_STATUS_PINNED_KEY_MISSING);
|
| EXPECT_TRUE(ssl_info.cert_status &
|
| CERT_STATUS_CERTIFICATE_TRANSPARENCY_REQUIRED);
|
|
|