diff options
author | maruel@chromium.org <maruel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-05-23 17:14:36 +0000 |
---|---|---|
committer | maruel@chromium.org <maruel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-05-23 17:14:36 +0000 |
commit | 5f07788b232efddffe1b695153ca9bf648170040 (patch) | |
tree | 46d90be4b10b979fdafa0a05cd5d263b2269c7e0 /net | |
parent | 93c859d244dd6b84f3eb6dc2d1a42b575f5c9356 (diff) | |
download | chromium_src-5f07788b232efddffe1b695153ca9bf648170040.zip chromium_src-5f07788b232efddffe1b695153ca9bf648170040.tar.gz chromium_src-5f07788b232efddffe1b695153ca9bf648170040.tar.bz2 |
Fix more gcc in net/url_request/url_request_unittest.cc
'cert_status' may be used uninitialized in this function
I'm not sure why this wasn't caught earlier.
R=agl@chromium.org
BUG=
TEST=manual compile
Review URL: https://chromiumcodereview.appspot.com/10383305
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138506 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'net')
-rw-r--r-- | net/url_request/url_request_unittest.cc | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc index a6d61ca..b1c3b07 100644 --- a/net/url_request/url_request_unittest.cc +++ b/net/url_request/url_request_unittest.cc @@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) { TestServer::HTTPSOptions::CERT_AUTO); https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID; - CertStatus cert_status; + CertStatus cert_status = 0; DoConnection(https_options, &cert_status); EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), @@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) { https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID; SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>()); - CertStatus cert_status; + CertStatus cert_status = 0; DoConnection(https_options, &cert_status); EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(), @@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) { SSLConfigService::SetCRLSet( scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting())); - CertStatus cert_status; + CertStatus cert_status = 0; DoConnection(https_options, &cert_status); // With a valid, fresh CRLSet the bad OCSP response shouldn't matter because @@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) { SSLConfigService::SetCRLSet( scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting())); - CertStatus cert_status; + CertStatus cert_status = 0; DoConnection(https_options, &cert_status); // If we're not trying EV verification then, even if the CRLSet has expired, |