| Index: net/socket/ssl_client_socket_unittest.cc
|
| diff --git a/net/socket/ssl_client_socket_unittest.cc b/net/socket/ssl_client_socket_unittest.cc
|
| index 6a25b0b3c8f985c6dff849218de99add684c856a..1f1ab7227b3c660b75b97fa445498aca3c257f3e 100644
|
| --- a/net/socket/ssl_client_socket_unittest.cc
|
| +++ b/net/socket/ssl_client_socket_unittest.cc
|
| @@ -162,7 +162,7 @@ ReadBufferingStreamSocket::ReadBufferingStreamSocket(
|
| }
|
|
|
| void ReadBufferingStreamSocket::SetBufferSize(int size) {
|
| - DCHECK(!user_read_buf_);
|
| + DCHECK(!user_read_buf_.get());
|
| buffer_size_ = size;
|
| read_buffer_->SetCapacity(size);
|
| }
|
| @@ -210,11 +210,11 @@ int ReadBufferingStreamSocket::DoLoop(int result) {
|
|
|
| int ReadBufferingStreamSocket::DoRead() {
|
| state_ = STATE_READ_COMPLETE;
|
| - int rv = transport_->Read(
|
| - read_buffer_,
|
| - read_buffer_->RemainingCapacity(),
|
| - base::Bind(&ReadBufferingStreamSocket::OnReadCompleted,
|
| - base::Unretained(this)));
|
| + int rv =
|
| + transport_->Read(read_buffer_.get(),
|
| + read_buffer_->RemainingCapacity(),
|
| + base::Bind(&ReadBufferingStreamSocket::OnReadCompleted,
|
| + base::Unretained(this)));
|
| return rv;
|
| }
|
|
|
| @@ -835,8 +835,8 @@ TEST_F(SSLClientSocketTest, Read) {
|
| new net::IOBuffer(arraysize(request_text) - 1));
|
| memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1);
|
|
|
| - rv = sock->Write(request_buffer, arraysize(request_text) - 1,
|
| - callback.callback());
|
| + rv = sock->Write(
|
| + request_buffer.get(), arraysize(request_text) - 1, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -845,7 +845,7 @@ TEST_F(SSLClientSocketTest, Read) {
|
|
|
| scoped_refptr<net::IOBuffer> buf(new net::IOBuffer(4096));
|
| for (;;) {
|
| - rv = sock->Read(buf, 4096, callback.callback());
|
| + rv = sock->Read(buf.get(), 4096, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -897,8 +897,8 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
| new net::IOBuffer(kRequestTextSize));
|
| memcpy(request_buffer->data(), request_text, kRequestTextSize);
|
|
|
| - rv = callback.GetResult(sock->Write(request_buffer, kRequestTextSize,
|
| - callback.callback()));
|
| + rv = callback.GetResult(
|
| + sock->Write(request_buffer.get(), kRequestTextSize, callback.callback()));
|
| EXPECT_EQ(kRequestTextSize, rv);
|
|
|
| // Simulate an unclean/forcible shutdown.
|
| @@ -909,7 +909,7 @@ TEST_F(SSLClientSocketTest, Read_WithSynchronousError) {
|
| // Note: This test will hang if this bug has regressed. Simply checking that
|
| // rv != ERR_IO_PENDING is insufficient, as ERR_IO_PENDING is a legitimate
|
| // result when using a dedicated task runner for NSS.
|
| - rv = callback.GetResult(sock->Read(buf, 4096, callback.callback()));
|
| + rv = callback.GetResult(sock->Read(buf.get(), 4096, callback.callback()));
|
|
|
| #if !defined(USE_OPENSSL)
|
| // NSS records the error exactly
|
| @@ -952,7 +952,7 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) {
|
|
|
| // Issue a "hanging" Read first.
|
| scoped_refptr<net::IOBuffer> buf(new net::IOBuffer(4096));
|
| - rv = sock->Read(buf, 4096, callback.callback());
|
| + rv = sock->Read(buf.get(), 4096, callback.callback());
|
| // We haven't written the request, so there should be no response yet.
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
|
|
| @@ -968,7 +968,8 @@ TEST_F(SSLClientSocketTest, Read_FullDuplex) {
|
| new net::StringIOBuffer(request_text));
|
|
|
| net::TestCompletionCallback callback2; // Used for Write only.
|
| - rv = sock->Write(request_buffer, request_text.size(), callback2.callback());
|
| + rv = sock->Write(
|
| + request_buffer.get(), request_text.size(), callback2.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1039,7 +1040,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| // the ERR_IO_PENDING caused by SetReadShouldBlock() and thus return.
|
| DeleteSocketCallback read_callback(sock);
|
| scoped_refptr<net::IOBuffer> read_buf(new net::IOBuffer(4096));
|
| - rv = sock->Read(read_buf, 4096, read_callback.callback());
|
| + rv = sock->Read(read_buf.get(), 4096, read_callback.callback());
|
|
|
| // Ensure things didn't complete synchronously, otherwise |sock| is invalid.
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| @@ -1062,7 +1063,7 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| // SSLClientSocketOpenSSL::Write() will not return until all of
|
| // |request_buffer| has been written to the underlying BIO (although not
|
| // necessarily the underlying transport).
|
| - rv = callback.GetResult(sock->Write(request_buffer,
|
| + rv = callback.GetResult(sock->Write(request_buffer.get(),
|
| request_buffer->BytesRemaining(),
|
| callback.callback()));
|
| ASSERT_LT(0, rv);
|
| @@ -1077,7 +1078,8 @@ TEST_F(SSLClientSocketTest, Read_DeleteWhilePendingFullDuplex) {
|
| // Attempt to write the remaining data. NSS will not be able to consume the
|
| // application data because the internal buffers are full, while OpenSSL will
|
| // return that its blocked because the underlying transport is blocked.
|
| - rv = sock->Write(request_buffer, request_buffer->BytesRemaining(),
|
| + rv = sock->Write(request_buffer.get(),
|
| + request_buffer->BytesRemaining(),
|
| callback.callback());
|
| ASSERT_EQ(net::ERR_IO_PENDING, rv);
|
| ASSERT_FALSE(callback.have_result());
|
| @@ -1132,8 +1134,8 @@ TEST_F(SSLClientSocketTest, Read_SmallChunks) {
|
| new net::IOBuffer(arraysize(request_text) - 1));
|
| memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1);
|
|
|
| - rv = sock->Write(request_buffer, arraysize(request_text) - 1,
|
| - callback.callback());
|
| + rv = sock->Write(
|
| + request_buffer.get(), arraysize(request_text) - 1, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1142,7 +1144,7 @@ TEST_F(SSLClientSocketTest, Read_SmallChunks) {
|
|
|
| scoped_refptr<net::IOBuffer> buf(new net::IOBuffer(1));
|
| for (;;) {
|
| - rv = sock->Read(buf, 1, callback.callback());
|
| + rv = sock->Read(buf.get(), 1, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1186,7 +1188,7 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) {
|
| memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1);
|
|
|
| rv = callback.GetResult(sock->Write(
|
| - request_buffer, arraysize(request_text) - 1, callback.callback()));
|
| + request_buffer.get(), arraysize(request_text) - 1, callback.callback()));
|
| ASSERT_GT(rv, 0);
|
| ASSERT_EQ(static_cast<int>(arraysize(request_text) - 1), rv);
|
|
|
| @@ -1202,7 +1204,7 @@ TEST_F(SSLClientSocketTest, Read_ManySmallRecords) {
|
| transport->SetBufferSize(15000);
|
|
|
| scoped_refptr<net::IOBuffer> buffer(new net::IOBuffer(8192));
|
| - rv = callback.GetResult(sock->Read(buffer, 8192, callback.callback()));
|
| + rv = callback.GetResult(sock->Read(buffer.get(), 8192, callback.callback()));
|
| ASSERT_EQ(rv, 8192);
|
| }
|
|
|
| @@ -1237,8 +1239,8 @@ TEST_F(SSLClientSocketTest, Read_Interrupted) {
|
| new net::IOBuffer(arraysize(request_text) - 1));
|
| memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1);
|
|
|
| - rv = sock->Write(request_buffer, arraysize(request_text) - 1,
|
| - callback.callback());
|
| + rv = sock->Write(
|
| + request_buffer.get(), arraysize(request_text) - 1, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1247,7 +1249,7 @@ TEST_F(SSLClientSocketTest, Read_Interrupted) {
|
|
|
| // Do a partial read and then exit. This test should not crash!
|
| scoped_refptr<net::IOBuffer> buf(new net::IOBuffer(512));
|
| - rv = sock->Read(buf, 512, callback.callback());
|
| + rv = sock->Read(buf.get(), 512, callback.callback());
|
| EXPECT_TRUE(rv > 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1290,8 +1292,8 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
| new net::IOBuffer(arraysize(request_text) - 1));
|
| memcpy(request_buffer->data(), request_text, arraysize(request_text) - 1);
|
|
|
| - rv = sock->Write(request_buffer, arraysize(request_text) - 1,
|
| - callback.callback());
|
| + rv = sock->Write(
|
| + request_buffer.get(), arraysize(request_text) - 1, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1306,7 +1308,7 @@ TEST_F(SSLClientSocketTest, Read_FullLogging) {
|
|
|
| scoped_refptr<net::IOBuffer> buf(new net::IOBuffer(4096));
|
| for (;;) {
|
| - rv = sock->Read(buf, 4096, callback.callback());
|
| + rv = sock->Read(buf.get(), 4096, callback.callback());
|
| EXPECT_TRUE(rv >= 0 || rv == net::ERR_IO_PENDING);
|
|
|
| if (rv == net::ERR_IO_PENDING)
|
| @@ -1577,14 +1579,14 @@ TEST_F(SSLClientSocketTest, VerifyReturnChainProperlyOrdered) {
|
|
|
| // Add a rule that maps the server cert (A) to the chain of A->B->C2
|
| // rather than A->B->C.
|
| - cert_verifier_->AddResultForCert(certs[0], verify_result, net::OK);
|
| + cert_verifier_->AddResultForCert(certs[0].get(), verify_result, net::OK);
|
|
|
| // Load and install the root for the validated chain.
|
| scoped_refptr<net::X509Certificate> root_cert =
|
| net::ImportCertFromFile(net::GetTestCertsDirectory(),
|
| "redundant-validated-chain-root.pem");
|
| ASSERT_NE(static_cast<net::X509Certificate*>(NULL), root_cert);
|
| - net::ScopedTestRoot scoped_root(root_cert);
|
| + net::ScopedTestRoot scoped_root(root_cert.get());
|
|
|
| // Set up a test server with CERT_CHAIN_WRONG_ROOT.
|
| net::SpawnedTestServer::SSLOptions ssl_options(
|
| @@ -1692,7 +1694,7 @@ TEST_F(SSLClientSocketCertRequestInfoTest, NoAuthorities) {
|
| ssl_options.request_client_certificate = true;
|
| scoped_refptr<net::SSLCertRequestInfo> request_info =
|
| GetCertRequest(ssl_options);
|
| - ASSERT_TRUE(request_info);
|
| + ASSERT_TRUE(request_info.get());
|
| EXPECT_EQ(0u, request_info->cert_authorities.size());
|
| }
|
|
|
| @@ -1733,7 +1735,7 @@ TEST_F(SSLClientSocketCertRequestInfoTest, TwoAuthorities) {
|
| net::GetTestClientCertsDirectory().Append(kDiginotarFile));
|
| scoped_refptr<net::SSLCertRequestInfo> request_info =
|
| GetCertRequest(ssl_options);
|
| - ASSERT_TRUE(request_info);
|
| + ASSERT_TRUE(request_info.get());
|
| ASSERT_EQ(2u, request_info->cert_authorities.size());
|
| EXPECT_EQ(std::string(reinterpret_cast<const char*>(kThawteDN), kThawteLen),
|
| request_info->cert_authorities[0]);
|
|
|