From 5f07788b232efddffe1b695153ca9bf648170040 Mon Sep 17 00:00:00 2001
From: "maruel@chromium.org"
 <maruel@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>
Date: Wed, 23 May 2012 17:14:36 +0000
Subject: Fix more gcc in net/url_request/url_request_unittest.cc

'cert_status' may be used uninitialized in this function

I'm not sure why this wasn't caught earlier.

R=agl@chromium.org
BUG=
TEST=manual compile

Review URL: https://chromiumcodereview.appspot.com/10383305

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@138506 0039d316-1c4b-4281-b951-d872f2087c98
---
 net/url_request/url_request_unittest.cc | 8 ++++----
 1 file changed, 4 insertions(+), 4 deletions(-)

(limited to 'net')

diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
index a6d61ca..b1c3b07 100644
--- a/net/url_request/url_request_unittest.cc
+++ b/net/url_request/url_request_unittest.cc
@@ -1600,7 +1600,7 @@ TEST_F(HTTPSOCSPTest, Invalid) {
       TestServer::HTTPSOptions::CERT_AUTO);
   https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
 
-  CertStatus cert_status;
+  CertStatus cert_status = 0;
   DoConnection(https_options, &cert_status);
 
   EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1631,7 +1631,7 @@ TEST_F(HTTPSEVCRLSetTest, MissingCRLSetAndInvalidOCSP) {
   https_options.ocsp_status = TestServer::HTTPSOptions::OCSP_INVALID;
   SSLConfigService::SetCRLSet(scoped_refptr<CRLSet>());
 
-  CertStatus cert_status;
+  CertStatus cert_status = 0;
   DoConnection(https_options, &cert_status);
 
   EXPECT_EQ(ExpectedCertStatusForFailedOnlineRevocationCheck(),
@@ -1692,7 +1692,7 @@ TEST_F(HTTPSEVCRLSetTest, FreshCRLSet) {
   SSLConfigService::SetCRLSet(
       scoped_refptr<CRLSet>(CRLSet::EmptyCRLSetForTesting()));
 
-  CertStatus cert_status;
+  CertStatus cert_status = 0;
   DoConnection(https_options, &cert_status);
 
   // With a valid, fresh CRLSet the bad OCSP response shouldn't matter because
@@ -1721,7 +1721,7 @@ TEST_F(HTTPSCRLSetTest, ExpiredCRLSet) {
   SSLConfigService::SetCRLSet(
       scoped_refptr<CRLSet>(CRLSet::ExpiredCRLSetForTesting()));
 
-  CertStatus cert_status;
+  CertStatus cert_status = 0;
   DoConnection(https_options, &cert_status);
 
   // If we're not trying EV verification then, even if the CRLSet has expired,
-- 
cgit v1.1