| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index d14f1fdbb1df0c1ed68b40b68f6773b72e8380f1..2fc65239a050079996d5ee2ff936e25e982d49f6 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -45,8 +45,6 @@ namespace net {
|
|
|
| namespace {
|
|
|
| -const SSLConfig kDefaultSSLConfig;
|
| -
|
| // WrappedStreamSocket is a base class that wraps an existing StreamSocket,
|
| // forwarding the Socket and StreamSocket interfaces to the underlying
|
| // transport.
|
| @@ -791,7 +789,7 @@ class SSLClientSocketCertRequestInfoTest : public SSLClientSocketTest {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| rv = sock->Connect(callback.callback());
|
| @@ -1012,7 +1010,7 @@ TEST_F(SSLClientSocketTest, Connect) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -1054,7 +1052,7 @@ TEST_F(SSLClientSocketTest, ConnectExpired) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -1098,7 +1096,7 @@ TEST_F(SSLClientSocketTest, ConnectMismatched) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -1142,7 +1140,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthCertRequested) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
|
|
| @@ -1200,7 +1198,7 @@ TEST_F(SSLClientSocketTest, ConnectClientAuthSendNullCert) {
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(OK, rv);
|
|
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.send_client_cert = true;
|
| ssl_config.client_cert = NULL;
|
|
|
| @@ -1258,7 +1256,7 @@ TEST_F(SSLClientSocketTest, Read) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1543,7 +1541,7 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1821,10 +1819,8 @@ TEST_F(SSLClientSocketTest, Connect_WithZeroReturn) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| SynchronousErrorStreamSocket* raw_transport = transport.get();
|
| - scoped_ptr<SSLClientSocket> sock(
|
| - CreateSSLClientSocket(transport.Pass(),
|
| - test_server.host_port_pair(),
|
| - kDefaultSSLConfig));
|
| + scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| raw_transport->SetNextReadError(0);
|
|
|
| @@ -1939,7 +1935,7 @@ TEST_F(SSLClientSocketTest, Read_SmallChunks) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -1993,7 +1989,7 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) {
|
| ASSERT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = callback.GetResult(sock->Connect(callback.callback()));
|
| ASSERT_EQ(OK, rv);
|
| @@ -2043,7 +2039,7 @@ TEST_F(SSLClientSocketTest, Read_Interrupted) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2094,7 +2090,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2180,7 +2176,7 @@ TEST_F(SSLClientSocketTest, PrematureApplicationData) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2285,11 +2281,9 @@ TEST_F(SSLClientSocketTest, ClientSocketHandleNotFromPool) {
|
| scoped_ptr<ClientSocketHandle> socket_handle(new ClientSocketHandle());
|
| socket_handle->SetSocket(transport.Pass());
|
|
|
| - scoped_ptr<SSLClientSocket> sock(
|
| - socket_factory_->CreateSSLClientSocket(socket_handle.Pass(),
|
| - test_server.host_port_pair(),
|
| - kDefaultSSLConfig,
|
| - context_));
|
| + scoped_ptr<SSLClientSocket> sock(socket_factory_->CreateSSLClientSocket(
|
| + socket_handle.Pass(), test_server.host_port_pair(), SSLConfig(),
|
| + context_));
|
|
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = sock->Connect(callback.callback());
|
| @@ -2319,7 +2313,7 @@ TEST_F(SSLClientSocketTest, ExportKeyingMaterial) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2404,7 +2398,7 @@ TEST_F(SSLClientSocketTest, VerifyServerChainProperlyOrdered) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = sock->Connect(callback.callback());
|
| rv = callback.GetResult(rv);
|
| @@ -2511,7 +2505,7 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
| EXPECT_FALSE(sock->IsConnected());
|
| rv = sock->Connect(callback.callback());
|
|
|
| @@ -2759,7 +2753,7 @@ TEST_F(SSLClientSocketTest, ReuseStates) {
|
| EXPECT_EQ(OK, rv);
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| - transport.Pass(), test_server.host_port_pair(), kDefaultSSLConfig));
|
| + transport.Pass(), test_server.host_port_pair(), SSLConfig()));
|
|
|
| rv = sock->Connect(callback.callback());
|
| if (rv == ERR_IO_PENDING)
|
| @@ -2855,7 +2849,7 @@ TEST_F(SSLClientSocketTest, HandshakeCallbackIsRun_WithSuccess) {
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(OK, rv);
|
|
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| @@ -2892,7 +2886,7 @@ TEST_F(SSLClientSocketTest, HandshakeCallbackIsRun_WithDisabledSessionCache) {
|
| rv = callback.WaitForResult();
|
| EXPECT_EQ(OK, rv);
|
|
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.false_start_enabled = false;
|
|
|
| scoped_ptr<SSLClientSocket> sock(CreateSSLClientSocket(
|
| @@ -3052,7 +3046,7 @@ TEST_F(SSLClientSocketChannelIDTest, SendChannelID) {
|
| ASSERT_TRUE(ConnectToTestServer(ssl_options));
|
|
|
| EnableChannelID();
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.channel_id_enabled = true;
|
|
|
| int rv;
|
| @@ -3074,7 +3068,7 @@ TEST_F(SSLClientSocketChannelIDTest, FailingChannelID) {
|
| ASSERT_TRUE(ConnectToTestServer(ssl_options));
|
|
|
| EnableFailingChannelID();
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.channel_id_enabled = true;
|
|
|
| int rv;
|
| @@ -3096,7 +3090,7 @@ TEST_F(SSLClientSocketChannelIDTest, FailingChannelIDAsync) {
|
| ASSERT_TRUE(ConnectToTestServer(ssl_options));
|
|
|
| EnableAsyncFailingChannelID();
|
| - SSLConfig ssl_config = kDefaultSSLConfig;
|
| + SSLConfig ssl_config;
|
| ssl_config.channel_id_enabled = true;
|
|
|
| int rv;
|
|
|