Index: net/socket/ssl_client_socket_unittest.cc |
diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc |
index cb320c77ba816ca3147fe7da382ede903667a1bc..c4e3192996b78f931e4a68084b1df7347f27a565 100644 |
--- a/net/socket/ssl_client_socket_unittest.cc |
+++ b/net/socket/ssl_client_socket_unittest.cc |
@@ -39,6 +39,7 @@ |
#include "net/dns/host_resolver.h" |
#include "net/http/transport_security_state.h" |
#include "net/log/net_log.h" |
+#include "net/log/net_log_event_type.h" |
#include "net/log/test_net_log.h" |
#include "net/log/test_net_log_entry.h" |
#include "net/log/test_net_log_util.h" |
@@ -1041,13 +1042,13 @@ TEST_F(SSLClientSocketTest, Connect) { |
TestNetLogEntry::List entries; |
log.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsBeginEvent(entries, 5, NetLogEventType::SSL_CONNECT)); |
if (rv == ERR_IO_PENDING) |
rv = callback.WaitForResult(); |
EXPECT_THAT(rv, IsOk()); |
EXPECT_TRUE(sock->IsConnected()); |
log.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLogEventType::SSL_CONNECT)); |
sock->Disconnect(); |
EXPECT_FALSE(sock->IsConnected()); |
@@ -1070,7 +1071,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) { |
// the user may take indefinitely long to respond. |
TestNetLogEntry::List entries; |
log_.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLogEventType::SSL_CONNECT)); |
} |
TEST_F(SSLClientSocketTest, ConnectMismatched) { |
@@ -1090,7 +1091,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) { |
// the user may take indefinitely long to respond. |
TestNetLogEntry::List entries; |
log_.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLogEventType::SSL_CONNECT)); |
} |
#if defined(OS_WIN) |
@@ -1127,7 +1128,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) { |
TestNetLogEntry::List entries; |
log_.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLogEventType::SSL_CONNECT)); |
EXPECT_FALSE(sock_->IsConnected()); |
} |
@@ -1882,7 +1883,8 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { |
TestNetLogEntry::List entries; |
log.GetEntries(&entries); |
size_t last_index = ExpectLogContainsSomewhereAfter( |
- entries, 5, NetLog::TYPE_SSL_SOCKET_BYTES_SENT, NetLog::PHASE_NONE); |
+ entries, 5, NetLogEventType::SSL_SOCKET_BYTES_SENT, |
+ NetLogEventPhase::NONE); |
scoped_refptr<IOBuffer> buf(new IOBuffer(4096)); |
for (;;) { |
@@ -1892,11 +1894,9 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) { |
break; |
log.GetEntries(&entries); |
- last_index = |
- ExpectLogContainsSomewhereAfter(entries, |
- last_index + 1, |
- NetLog::TYPE_SSL_SOCKET_BYTES_RECEIVED, |
- NetLog::PHASE_NONE); |
+ last_index = ExpectLogContainsSomewhereAfter( |
+ entries, last_index + 1, NetLogEventType::SSL_SOCKET_BYTES_RECEIVED, |
+ NetLogEventPhase::NONE); |
} |
} |
@@ -2170,7 +2170,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) { |
TestNetLogEntry::List entries; |
log_.GetEntries(&entries); |
- EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLog::TYPE_SSL_CONNECT)); |
+ EXPECT_TRUE(LogContainsEndEvent(entries, -1, NetLogEventType::SSL_CONNECT)); |
SSLInfo ssl_info; |
sock_->GetSSLInfo(&ssl_info); |