Index: net/socket/ssl_client_socket_unittest.cc |
=================================================================== |
--- net/socket/ssl_client_socket_unittest.cc (revision 41560) |
+++ net/socket/ssl_client_socket_unittest.cc (working copy) |
@@ -7,8 +7,8 @@ |
#include "net/base/address_list.h" |
#include "net/base/host_resolver.h" |
#include "net/base/io_buffer.h" |
-#include "net/base/load_log.h" |
-#include "net/base/load_log_unittest.h" |
+#include "net/base/net_log.h" |
+#include "net/base/net_log_unittest.h" |
#include "net/base/net_errors.h" |
#include "net/base/ssl_config_service.h" |
#include "net/base/test_completion_callback.h" |
@@ -80,15 +80,15 @@ |
EXPECT_FALSE(sock->IsConnected()); |
- scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded)); |
- rv = sock->Connect(&callback, log); |
+ net::CapturingBoundNetLog log(net::CapturingNetLog::kUnbounded); |
+ rv = sock->Connect(&callback, log.bound()); |
EXPECT_TRUE(net::LogContainsBeginEvent( |
- *log, 0, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), 0, net::NetLog::TYPE_SSL_CONNECT)); |
if (rv != net::OK) { |
ASSERT_EQ(net::ERR_IO_PENDING, rv); |
EXPECT_FALSE(sock->IsConnected()); |
EXPECT_FALSE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
rv = callback.WaitForResult(); |
EXPECT_EQ(net::OK, rv); |
@@ -96,7 +96,7 @@ |
EXPECT_TRUE(sock->IsConnected()); |
EXPECT_TRUE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
sock->Disconnect(); |
EXPECT_FALSE(sock->IsConnected()); |
@@ -124,15 +124,15 @@ |
EXPECT_FALSE(sock->IsConnected()); |
- scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded)); |
- rv = sock->Connect(&callback, log); |
+ net::CapturingBoundNetLog log(net::CapturingNetLog::kUnbounded); |
+ rv = sock->Connect(&callback, log.bound()); |
EXPECT_TRUE(net::LogContainsBeginEvent( |
- *log, 0, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), 0, net::NetLog::TYPE_SSL_CONNECT)); |
if (rv != net::OK) { |
ASSERT_EQ(net::ERR_IO_PENDING, rv); |
EXPECT_FALSE(sock->IsConnected()); |
EXPECT_FALSE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
rv = callback.WaitForResult(); |
EXPECT_EQ(net::ERR_CERT_DATE_INVALID, rv); |
@@ -143,7 +143,7 @@ |
// leave it connected. |
EXPECT_TRUE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
} |
TEST_F(SSLClientSocketTest, ConnectMismatched) { |
@@ -169,15 +169,15 @@ |
EXPECT_FALSE(sock->IsConnected()); |
- scoped_refptr<net::LoadLog> log(new net::LoadLog(net::LoadLog::kUnbounded)); |
- rv = sock->Connect(&callback, log); |
+ net::CapturingBoundNetLog log(net::CapturingNetLog::kUnbounded); |
+ rv = sock->Connect(&callback, log.bound()); |
EXPECT_TRUE(net::LogContainsBeginEvent( |
- *log, 0, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), 0, net::NetLog::TYPE_SSL_CONNECT)); |
if (rv != net::ERR_CERT_COMMON_NAME_INVALID) { |
ASSERT_EQ(net::ERR_IO_PENDING, rv); |
EXPECT_FALSE(sock->IsConnected()); |
EXPECT_FALSE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
rv = callback.WaitForResult(); |
EXPECT_EQ(net::ERR_CERT_COMMON_NAME_INVALID, rv); |
@@ -188,7 +188,7 @@ |
// leave it connected. |
EXPECT_TRUE(net::LogContainsEndEvent( |
- *log, -1, net::LoadLog::TYPE_SSL_CONNECT)); |
+ log.entries(), -1, net::NetLog::TYPE_SSL_CONNECT)); |
} |
// TODO(wtc): Add unit tests for IsConnectedAndIdle: |