base::FilePath certs_dir = net::GetTestCertsDirectory();
mit_davidben_cert_ = net::ImportCertFromFile(certs_dir, "mit.davidben.der");
- ASSERT_NE(static_cast<net::X509Certificate*>(NULL), mit_davidben_cert_);
+ ASSERT_NE(static_cast<net::X509Certificate*>(NULL),
+ mit_davidben_cert_.get());
foaf_me_chromium_test_cert_ = net::ImportCertFromFile(
certs_dir, "foaf.me.chromium-test-cert.der");
ASSERT_NE(static_cast<net::X509Certificate*>(NULL),
- foaf_me_chromium_test_cert_);
+ foaf_me_chromium_test_cert_.get());
cert_request_info_ = new net::SSLCertRequestInfo;
cert_request_info_->host_and_port = net::HostPortPair("foo", 123);
}
virtual void SetUpOnIOThread() {
- url_request_ = MakeURLRequest(url_request_context_getter_).release();
+ url_request_ = MakeURLRequest(url_request_context_getter_.get()).release();
auth_requestor_ = new StrictMock<SSLClientAuthRequestorMock>(
url_request_,
// Also calls SetUpOnIOThread.
SSLClientCertificateSelectorTest::SetUpOnMainThread();
- AddTabAtIndex(1, GURL("about:blank"), content::PAGE_TRANSITION_LINK);
- AddTabAtIndex(2, GURL("about:blank"), content::PAGE_TRANSITION_LINK);
+ AddTabAtIndex(1, GURL("about:blank"), ui::PAGE_TRANSITION_LINK);
+ AddTabAtIndex(2, GURL("about:blank"), ui::PAGE_TRANSITION_LINK);
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(0));
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(1));
ASSERT_TRUE(NULL != browser()->tab_strip_model()->GetWebContentsAt(2));
}
virtual void SetUpOnIOThread() OVERRIDE {
- url_request_1_ = MakeURLRequest(url_request_context_getter_).release();
- url_request_2_ = MakeURLRequest(url_request_context_getter_).release();
+ url_request_1_ =
+ MakeURLRequest(url_request_context_getter_.get()).release();
+ url_request_2_ =
+ MakeURLRequest(url_request_context_getter_.get()).release();
auth_requestor_1_ = new StrictMock<SSLClientAuthRequestorMock>(
url_request_1_,
}
virtual void SetUpOnIOThread() OVERRIDE {
- url_request_1_ = MakeURLRequest(url_request_context_getter_1_).release();
+ url_request_1_ =
+ MakeURLRequest(url_request_context_getter_1_.get()).release();
auth_requestor_1_ = new StrictMock<SSLClientAuthRequestorMock>(
url_request_1_,
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, MAYBE_SelectNone) {
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
// Let the mock get checked on destruction.
}
// http://crbug.com/121007
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest, DISABLED_Escape) {
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_ESCAPE, false, false, false, false));
// Flaky, http://crbug.com/103534 .
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorTest,
DISABLED_SelectDefault) {
- EXPECT_CALL(*auth_requestor_, CertificateSelected(mit_davidben_cert_.get()));
+ EXPECT_CALL(*auth_requestor_.get(),
+ CertificateSelected(mit_davidben_cert_.get()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_RETURN, false, false, false, false));
// auth_requestor_1_ should get selected automatically by the
// SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
// the same host:port.
- EXPECT_CALL(*auth_requestor_1_, CertificateSelected(NULL));
- EXPECT_CALL(*auth_requestor_2_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_2_.get(), CertificateSelected(NULL));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser(), ui::VKEY_ESCAPE, false, false, false, false));
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
}
// http://crbug.com/121007
// auth_requestor_1_ should get selected automatically by the
// SSLClientAuthObserver when selector_2_ is accepted, since both 1 & 2 have
// the same host:port.
- EXPECT_CALL(*auth_requestor_1_,
+ EXPECT_CALL(*auth_requestor_1_.get(),
CertificateSelected(foaf_me_chromium_test_cert_.get()));
- EXPECT_CALL(*auth_requestor_2_,
+ EXPECT_CALL(*auth_requestor_2_.get(),
CertificateSelected(foaf_me_chromium_test_cert_.get()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
}
// http://crbug.com/103529
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest,
DISABLED_Escape) {
- EXPECT_CALL(*auth_requestor_1_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_1_.get(), CertificateSelected(NULL));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
browser_1_, ui::VKEY_ESCAPE, false, false, false, false));
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
}
// http://crbug.com/103534
IN_PROC_BROWSER_TEST_F(SSLClientCertificateSelectorMultiProfileTest,
DISABLED_SelectDefault) {
- EXPECT_CALL(*auth_requestor_1_,
+ EXPECT_CALL(*auth_requestor_1_.get(),
CertificateSelected(mit_davidben_cert_.get()));
EXPECT_TRUE(ui_test_utils::SendKeyPressSync(
// Now let the default selection for auth_requestor_ mock get checked on
// destruction.
- EXPECT_CALL(*auth_requestor_, CertificateSelected(NULL));
+ EXPECT_CALL(*auth_requestor_.get(), CertificateSelected(NULL));
}