Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(803)

Unified Diff: net/url_request/url_request_unittest.cc

Issue 10383305: Fix more gcc in net/url_request/url_request_unittest.cc (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: yet another Created 8 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/url_request/url_request_unittest.cc
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index a6d61ca87eaee21da1b9ab8a055ce53c51b4c9ff..b1c3b07ee59d07fa327e901fb49bb1f9e9bf6a4f 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) {
TestServer::HTTPSOptions::CERT_AUTO);
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) {
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>());
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) {
SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting()));
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
// With a valid, fresh CRLSet the bad OCSP response shouldn't matter because
@@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) {
SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting()));
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
// If we're not trying EV verification then, even if the CRLSet has expired,
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698