| Index: net/cert/multi_threaded_cert_verifier_unittest.cc
|
| diff --git a/net/cert/multi_threaded_cert_verifier_unittest.cc b/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| index 19afd2e8903b62017df53fc5bd35c4d1023b4e8c..81cff8fc3a8122012b8a5b625cd08e3f12b7b378 100644
|
| --- a/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| +++ b/net/cert/multi_threaded_cert_verifier_unittest.cc
|
| @@ -86,9 +86,14 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) {
|
| TestCompletionCallback callback;
|
| CertVerifier::RequestHandle request_handle;
|
|
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| error = callback.WaitForResult();
|
| @@ -98,9 +103,14 @@ TEST_F(MultiThreadedCertVerifierTest, CacheHit) {
|
| ASSERT_EQ(0u, verifier_.inflight_joins());
|
| ASSERT_EQ(1u, verifier_.GetCacheSize());
|
|
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| // Synchronous completion.
|
| ASSERT_NE(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(IsCertificateError(error));
|
| @@ -146,9 +156,14 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) {
|
| TestCompletionCallback callback;
|
| CertVerifier::RequestHandle request_handle;
|
|
|
| - error = verifier_.Verify(cert_chain1, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(cert_chain1.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| error = callback.WaitForResult();
|
| @@ -158,9 +173,14 @@ TEST_F(MultiThreadedCertVerifierTest, DifferentCACerts) {
|
| ASSERT_EQ(0u, verifier_.inflight_joins());
|
| ASSERT_EQ(1u, verifier_.GetCacheSize());
|
|
|
| - error = verifier_.Verify(cert_chain2, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(cert_chain2.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| error = callback.WaitForResult();
|
| @@ -186,14 +206,24 @@ TEST_F(MultiThreadedCertVerifierTest, InflightJoin) {
|
| TestCompletionCallback callback2;
|
| CertVerifier::RequestHandle request_handle2;
|
|
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| - error = verifier_.Verify(
|
| - test_cert, "www.example.com", 0, NULL, &verify_result2,
|
| - callback2.callback(), &request_handle2, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result2,
|
| + callback2.callback(),
|
| + &request_handle2,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle2 != NULL);
|
| error = callback.WaitForResult();
|
| @@ -216,9 +246,14 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) {
|
| CertVerifyResult verify_result;
|
| CertVerifier::RequestHandle request_handle;
|
|
|
| - error = verifier_.Verify(
|
| - test_cert, "www.example.com", 0, NULL, &verify_result,
|
| - base::Bind(&FailTest), &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + base::Bind(&FailTest),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| verifier_.CancelRequest(request_handle);
|
| @@ -228,9 +263,14 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequest) {
|
| // worker thread) is likely to complete by the end of this test.
|
| TestCompletionCallback callback;
|
| for (int i = 0; i < 5; ++i) {
|
| - error = verifier_.Verify(
|
| - test_cert, "www2.example.com", 0, NULL, &verify_result,
|
| - callback.callback(), &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www2.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| error = callback.WaitForResult();
|
| @@ -250,9 +290,14 @@ TEST_F(MultiThreadedCertVerifierTest, CancelRequestThenQuit) {
|
| TestCompletionCallback callback;
|
| CertVerifier::RequestHandle request_handle;
|
|
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
| verifier_.CancelRequest(request_handle);
|
| @@ -363,7 +408,7 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
|
|
| scoped_refptr<X509Certificate> test_cert(
|
| ImportCertFromFile(GetTestCertsDirectory(), "ok_cert.pem"));
|
| - ASSERT_TRUE(test_cert);
|
| + ASSERT_TRUE(test_cert.get());
|
|
|
| const CertificateList empty_cert_list;
|
| CertificateList cert_list;
|
| @@ -377,9 +422,14 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| CertVerifier::RequestHandle request_handle;
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list));
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle);
|
| @@ -391,9 +441,14 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| // The next Verify() uses the cached result.
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(empty_cert_list));
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| EXPECT_EQ(ERR_CERT_COMMON_NAME_INVALID, error);
|
| EXPECT_FALSE(request_handle);
|
| @@ -404,9 +459,14 @@ TEST_F(MultiThreadedCertVerifierTest, CertTrustAnchorProvider) {
|
| // trust anchors will not reuse the cache.
|
| EXPECT_CALL(trust_provider, GetAdditionalTrustAnchors())
|
| .WillOnce(ReturnRef(cert_list));
|
| - error = verifier_.Verify(test_cert, "www.example.com", 0, NULL,
|
| - &verify_result, callback.callback(),
|
| - &request_handle, BoundNetLog());
|
| + error = verifier_.Verify(test_cert.get(),
|
| + "www.example.com",
|
| + 0,
|
| + NULL,
|
| + &verify_result,
|
| + callback.callback(),
|
| + &request_handle,
|
| + BoundNetLog());
|
| Mock::VerifyAndClearExpectations(&trust_provider);
|
| ASSERT_EQ(ERR_IO_PENDING, error);
|
| ASSERT_TRUE(request_handle != NULL);
|
|
|