Commit 5f07788b authored by maruel@chromium.org's avatar maruel@chromium.org

Fix more gcc in net/url_request/url_request_unittest.cc

'cert_status' may be used uninitialized in this function

I'm not sure why this wasn't caught earlier.

R=agl@chromium.org
BUG=
TEST=manual compile

Review URL: https://chromiumcodereview.appspot.com/10383305

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138506 0039d316-1c4b-4281-b951-d872f2087c98
parent 93c859d2
...@@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) { ...@@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) {
TestServer::HTTPSOptions::CERT_AUTO); TestServer::HTTPSOptions::CERT_AUTO);
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID; https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
CertStatus cert_status; CertStatus cert_status = 0;
DoConnection(https_options, &cert_status); DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
...@@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) { ...@@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) {
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID; https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>()); SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>());
CertStatus cert_status; CertStatus cert_status = 0;
DoConnection(https_options, &cert_status); DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
...@@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) { ...@@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) {
SSLConfigService::SetCRLSet( SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting())); scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting()));
CertStatus cert_status; CertStatus cert_status = 0;
DoConnection(https_options, &cert_status); DoConnection(https_options, &cert_status);
// With a valid, fresh CRLSet the bad OCSP response shouldn't matter because // With a valid, fresh CRLSet the bad OCSP response shouldn't matter because
...@@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) { ...@@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) {
SSLConfigService::SetCRLSet( SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting())); scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting()));
CertStatus cert_status; CertStatus cert_status = 0;
DoConnection(https_options, &cert_status); DoConnection(https_options, &cert_status);
// If we're not trying EV verification then, even if the CRLSet has expired, // If we're not trying EV verification then, even if the CRLSet has expired,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment