summaryrefslogtreecommitdiffstats
path: root/net
diff options
context:
space:
mode:
authormaruel@chromium.org <maruel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-05-23 17:14:36 +0000
committermaruel@chromium.org <maruel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-05-23 17:14:36 +0000
commit5f07788b232efddffe1b695153ca9bf648170040 (patch)
tree46d90be4b10b979fdafa0a05cd5d263b2269c7e0 /net
parent93c859d244dd6b84f3eb6dc2d1a42b575f5c9356 (diff)
downloadchromium_src-5f07788b232efddffe1b695153ca9bf648170040.zip
chromium_src-5f07788b232efddffe1b695153ca9bf648170040.tar.gz
chromium_src-5f07788b232efddffe1b695153ca9bf648170040.tar.bz2
Fix more gcc in net/url_request/url_request_unittest.cc
'cert_status' may be used uninitialized in this function I'm not sure why this wasn't caught earlier. R=agl@chromium.org BUG= TEST=manual compile Review URL: https://chromiumcodereview.appspot.com/10383305 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138506 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r--net/url_request/url_request_unittest.cc8
1 files changed, 4 insertions, 4 deletions
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index a6d61ca..b1c3b07 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) {
TestServer::HTTPSOptions::CERT_AUTO);
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) {
https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>());
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) {
SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting()));
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
// With a valid, fresh CRLSet the bad OCSP response shouldn't matter because
@@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) {
SSLConfigService::SetCRLSet(
scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting()));
- CertStatus cert_status;
+ CertStatus cert_status = 0;
DoConnection(https_options, &cert_status);
// If we're not trying EV verification then, even if the CRLSet has expired,