Index: webrtc/p2p/base/port_unittest.cc |
diff --git a/webrtc/p2p/base/port_unittest.cc b/webrtc/p2p/base/port_unittest.cc |
index 38012a683ae50de52e41eb2a320a3af1d2196516..fbb184d2d2b77b7f92e6a892a0d8728063980e06 100644 |
--- a/webrtc/p2p/base/port_unittest.cc |
+++ b/webrtc/p2p/base/port_unittest.cc |
@@ -229,7 +229,7 @@ class TestChannel : public sigslot::has_slots<> { |
: ice_mode_(ICEMODE_FULL), |
port_(p1), |
complete_count_(0), |
- conn_(NULL), |
+ conn_(nullptr), |
remote_request_(), |
nominated_(false) { |
port_->SignalPortComplete.connect(this, &TestChannel::OnPortComplete); |
@@ -263,7 +263,7 @@ class TestChannel : public sigslot::has_slots<> { |
} |
} |
void AcceptConnection(const Candidate& remote_candidate) { |
- ASSERT_TRUE(remote_request_.get() != NULL); |
+ ASSERT_TRUE(remote_request_.get() != nullptr); |
Candidate c = remote_candidate; |
c.set_address(remote_address_); |
conn_ = port_->CreateConnection(c, Port::ORIGIN_MESSAGE); |
@@ -307,9 +307,9 @@ class TestChannel : public sigslot::has_slots<> { |
msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY); |
const cricket::StunUInt32Attribute* fingerprint_attr = |
msg->GetUInt32(STUN_ATTR_FINGERPRINT); |
- EXPECT_TRUE(priority_attr != NULL); |
- EXPECT_TRUE(mi_attr != NULL); |
- EXPECT_TRUE(fingerprint_attr != NULL); |
+ EXPECT_TRUE(priority_attr != nullptr); |
+ EXPECT_TRUE(mi_attr != nullptr); |
+ EXPECT_TRUE(fingerprint_attr != nullptr); |
remote_address_ = addr; |
remote_request_.reset(CopyStunMessage(msg)); |
remote_frag_ = rf; |
@@ -318,7 +318,7 @@ class TestChannel : public sigslot::has_slots<> { |
void OnDestroyed(Connection* conn) { |
ASSERT_EQ(conn_, conn); |
LOG(INFO) << "OnDestroy connection " << conn << " deleted"; |
- conn_ = NULL; |
+ conn_ = nullptr; |
// When the connection is destroyed, also clear these fields so future |
// connections are possible. |
remote_request_.reset(); |
@@ -654,7 +654,7 @@ class PortTest : public testing::Test, public sigslot::has_slots<> { |
// Speed up destroying ch2's connection such that the test is ready to |
// accept a new connection from ch1 before ch1's connection destroys itself. |
ch2->conn()->Destroy(); |
- EXPECT_TRUE_WAIT(ch2->conn() == NULL, kDefaultTimeout); |
+ EXPECT_TRUE_WAIT(ch2->conn() == nullptr, kDefaultTimeout); |
} |
void TestTcpReconnect(bool ping_after_disconnected, |
@@ -729,8 +729,8 @@ class PortTest : public testing::Test, public sigslot::has_slots<> { |
// Tear down and ensure that goes smoothly. |
ch1.Stop(); |
ch2.Stop(); |
- EXPECT_TRUE_WAIT(ch1.conn() == NULL, kDefaultTimeout); |
- EXPECT_TRUE_WAIT(ch2.conn() == NULL, kDefaultTimeout); |
+ EXPECT_TRUE_WAIT(ch1.conn() == nullptr, kDefaultTimeout); |
+ EXPECT_TRUE_WAIT(ch2.conn() == nullptr, kDefaultTimeout); |
} |
IceMessage* CreateStunMessage(int type) { |
@@ -828,7 +828,7 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
// Send a ping from src to dst. This may or may not make it. |
ch1.CreateConnection(GetCandidate(port2)); |
- ASSERT_TRUE(ch1.conn() != NULL); |
+ ASSERT_TRUE(ch1.conn() != nullptr); |
EXPECT_TRUE_SIMULATED_WAIT(ch1.conn()->connected(), kDefaultTimeout, |
clock); // for TCP connect |
ch1.Ping(); |
@@ -847,7 +847,7 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
// Send a ping from dst to src. |
ch2.AcceptConnection(GetCandidate(port1)); |
- ASSERT_TRUE(ch2.conn() != NULL); |
+ ASSERT_TRUE(ch2.conn() != nullptr); |
ch2.Ping(); |
EXPECT_EQ_SIMULATED_WAIT(Connection::STATE_WRITABLE, |
ch2.conn()->write_state(), kDefaultTimeout, clock); |
@@ -859,7 +859,7 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
// Send a ping from dst to src. Again, this may or may not make it. |
ch2.CreateConnection(GetCandidate(port1)); |
- ASSERT_TRUE(ch2.conn() != NULL); |
+ ASSERT_TRUE(ch2.conn() != nullptr); |
ch2.Ping(); |
SIMULATED_WAIT(ch2.conn()->write_state() == Connection::STATE_WRITABLE, |
kShortTimeout, clock); |
@@ -893,7 +893,7 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
// Pick up the actual address and establish the connection. |
ch2.AcceptConnection(GetCandidate(port1)); |
- ASSERT_TRUE(ch2.conn() != NULL); |
+ ASSERT_TRUE(ch2.conn() != nullptr); |
ch2.Ping(); |
EXPECT_EQ_SIMULATED_WAIT(Connection::STATE_WRITABLE, |
ch2.conn()->write_state(), kDefaultTimeout, |
@@ -922,8 +922,8 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
} |
// Everything should be good, unless we know the situation is impossible. |
- ASSERT_TRUE(ch1.conn() != NULL); |
- ASSERT_TRUE(ch2.conn() != NULL); |
+ ASSERT_TRUE(ch1.conn() != nullptr); |
+ ASSERT_TRUE(ch2.conn() != nullptr); |
if (possible) { |
EXPECT_TRUE(ch1.conn()->receiving()); |
EXPECT_EQ(Connection::STATE_WRITABLE, ch1.conn()->write_state()); |
@@ -939,25 +939,24 @@ void PortTest::TestConnectivity(const char* name1, Port* port1, |
// Tear down and ensure that goes smoothly. |
ch1.Stop(); |
ch2.Stop(); |
- EXPECT_TRUE_SIMULATED_WAIT(ch1.conn() == NULL, kDefaultTimeout, clock); |
- EXPECT_TRUE_SIMULATED_WAIT(ch2.conn() == NULL, kDefaultTimeout, clock); |
+ EXPECT_TRUE_SIMULATED_WAIT(ch1.conn() == nullptr, kDefaultTimeout, clock); |
+ EXPECT_TRUE_SIMULATED_WAIT(ch2.conn() == nullptr, kDefaultTimeout, clock); |
} |
class FakePacketSocketFactory : public rtc::PacketSocketFactory { |
public: |
FakePacketSocketFactory() |
- : next_udp_socket_(NULL), |
- next_server_tcp_socket_(NULL), |
- next_client_tcp_socket_(NULL) { |
- } |
+ : next_udp_socket_(nullptr), |
+ next_server_tcp_socket_(nullptr), |
+ next_client_tcp_socket_(nullptr) {} |
~FakePacketSocketFactory() override { } |
AsyncPacketSocket* CreateUdpSocket(const SocketAddress& address, |
uint16_t min_port, |
uint16_t max_port) override { |
- EXPECT_TRUE(next_udp_socket_ != NULL); |
+ EXPECT_TRUE(next_udp_socket_ != nullptr); |
AsyncPacketSocket* result = next_udp_socket_; |
- next_udp_socket_ = NULL; |
+ next_udp_socket_ = nullptr; |
return result; |
} |
@@ -965,9 +964,9 @@ class FakePacketSocketFactory : public rtc::PacketSocketFactory { |
uint16_t min_port, |
uint16_t max_port, |
int opts) override { |
- EXPECT_TRUE(next_server_tcp_socket_ != NULL); |
+ EXPECT_TRUE(next_server_tcp_socket_ != nullptr); |
AsyncPacketSocket* result = next_server_tcp_socket_; |
- next_server_tcp_socket_ = NULL; |
+ next_server_tcp_socket_ = nullptr; |
return result; |
} |
@@ -978,9 +977,9 @@ class FakePacketSocketFactory : public rtc::PacketSocketFactory { |
const rtc::ProxyInfo& proxy_info, |
const std::string& user_agent, |
int opts) override { |
- EXPECT_TRUE(next_client_tcp_socket_ != NULL); |
+ EXPECT_TRUE(next_client_tcp_socket_ != nullptr); |
AsyncPacketSocket* result = next_client_tcp_socket_; |
- next_client_tcp_socket_ = NULL; |
+ next_client_tcp_socket_ = nullptr; |
return result; |
} |
@@ -994,7 +993,7 @@ class FakePacketSocketFactory : public rtc::PacketSocketFactory { |
next_client_tcp_socket_ = next_client_tcp_socket; |
} |
rtc::AsyncResolverInterface* CreateAsyncResolver() override { |
- return NULL; |
+ return nullptr; |
} |
private: |
@@ -1005,7 +1004,7 @@ class FakePacketSocketFactory : public rtc::PacketSocketFactory { |
class FakeAsyncPacketSocket : public AsyncPacketSocket { |
public: |
- // Returns current local address. Address may be set to NULL if the |
+ // Returns current local address. Address may be set to null if the |
// socket is not bound yet (GetState() returns STATE_BINDING). |
virtual SocketAddress GetLocalAddress() const { |
return SocketAddress(); |
@@ -1360,13 +1359,13 @@ TEST_F(PortTest, TestLoopbackCall) { |
Port::ORIGIN_MESSAGE); |
conn->Ping(0); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
conn->OnReadPacket(lport->last_stun_buf()->data<char>(), |
lport->last_stun_buf()->size(), |
rtc::PacketTime()); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); |
@@ -1379,7 +1378,7 @@ TEST_F(PortTest, TestLoopbackCall) { |
Port::ORIGIN_MESSAGE); |
conn1->Ping(0); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
std::unique_ptr<IceMessage> modified_req( |
@@ -1399,7 +1398,7 @@ TEST_F(PortTest, TestLoopbackCall) { |
std::unique_ptr<ByteBufferWriter> buf(new ByteBufferWriter()); |
WriteStunMessage(modified_req.get(), buf.get()); |
conn1->OnReadPacket(buf->Data(), buf->Length(), rtc::PacketTime()); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_ERROR_RESPONSE, msg->type()); |
} |
@@ -1429,7 +1428,7 @@ TEST_F(PortTest, TestIceRoleConflict) { |
Port::ORIGIN_MESSAGE); |
rconn->Ping(0); |
- ASSERT_TRUE_WAIT(rport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(rport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = rport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
// Send rport binding request to lport. |
@@ -1437,7 +1436,7 @@ TEST_F(PortTest, TestIceRoleConflict) { |
rport->last_stun_buf()->size(), |
rtc::PacketTime()); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
EXPECT_EQ(STUN_BINDING_RESPONSE, lport->last_stun_msg()->type()); |
EXPECT_TRUE(role_conflict()); |
} |
@@ -1513,11 +1512,11 @@ void PortTest::TestCrossFamilyPorts(int type) { |
} |
Connection* c = ports[0]->CreateConnection(GetCandidate(ports[2].get()), |
Port::ORIGIN_MESSAGE); |
- EXPECT_TRUE(NULL == c); |
+ EXPECT_TRUE(nullptr == c); |
EXPECT_EQ(0U, ports[0]->connections().size()); |
c = ports[0]->CreateConnection(GetCandidate(ports[1].get()), |
Port::ORIGIN_MESSAGE); |
- EXPECT_FALSE(NULL == c); |
+ EXPECT_FALSE(nullptr == c); |
EXPECT_EQ(1U, ports[0]->connections().size()); |
// IPv6 Port, connects to IPv4 candidate and to IPv6 candidate. |
@@ -1527,11 +1526,11 @@ void PortTest::TestCrossFamilyPorts(int type) { |
} |
c = ports[2]->CreateConnection(GetCandidate(ports[0].get()), |
Port::ORIGIN_MESSAGE); |
- EXPECT_TRUE(NULL == c); |
+ EXPECT_TRUE(nullptr == c); |
EXPECT_EQ(0U, ports[2]->connections().size()); |
c = ports[2]->CreateConnection(GetCandidate(ports[3].get()), |
Port::ORIGIN_MESSAGE); |
- EXPECT_FALSE(NULL == c); |
+ EXPECT_FALSE(nullptr == c); |
EXPECT_EQ(1U, ports[2]->connections().size()); |
} |
@@ -1547,10 +1546,10 @@ void PortTest::ExpectPortsCanConnect(bool can_connect, Port* p1, Port* p2) { |
Connection* c = p1->CreateConnection(GetCandidate(p2), |
Port::ORIGIN_MESSAGE); |
if (can_connect) { |
- EXPECT_FALSE(NULL == c); |
+ EXPECT_FALSE(nullptr == c); |
EXPECT_EQ(1U, p1->connections().size()); |
} else { |
- EXPECT_TRUE(NULL == c); |
+ EXPECT_TRUE(nullptr == c); |
EXPECT_EQ(0U, p1->connections().size()); |
} |
} |
@@ -1644,33 +1643,33 @@ TEST_F(PortTest, TestSendStunMessage) { |
lconn->Ping(0); |
// Check that it's a proper BINDING-REQUEST. |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
EXPECT_FALSE(msg->IsLegacy()); |
const StunByteStringAttribute* username_attr = |
msg->GetByteString(STUN_ATTR_USERNAME); |
- ASSERT_TRUE(username_attr != NULL); |
+ ASSERT_TRUE(username_attr != nullptr); |
const StunUInt32Attribute* priority_attr = msg->GetUInt32(STUN_ATTR_PRIORITY); |
- ASSERT_TRUE(priority_attr != NULL); |
+ ASSERT_TRUE(priority_attr != nullptr); |
EXPECT_EQ(kDefaultPrflxPriority, priority_attr->value()); |
EXPECT_EQ("rfrag:lfrag", username_attr->GetString()); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateMessageIntegrity( |
lport->last_stun_buf()->data<char>(), lport->last_stun_buf()->size(), |
"rpass")); |
const StunUInt64Attribute* ice_controlling_attr = |
msg->GetUInt64(STUN_ATTR_ICE_CONTROLLING); |
- ASSERT_TRUE(ice_controlling_attr != NULL); |
+ ASSERT_TRUE(ice_controlling_attr != nullptr); |
EXPECT_EQ(lport->IceTiebreaker(), ice_controlling_attr->value()); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLED) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) != NULL); |
- EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLED) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) != nullptr); |
+ EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateFingerprint( |
lport->last_stun_buf()->data<char>(), lport->last_stun_buf()->size())); |
// Request should not include ping count. |
- ASSERT_TRUE(msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT) == NULL); |
+ ASSERT_TRUE(msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT) == nullptr); |
// Save a copy of the BINDING-REQUEST for use below. |
std::unique_ptr<IceMessage> request(CopyStunMessage(msg)); |
@@ -1679,7 +1678,7 @@ TEST_F(PortTest, TestSendStunMessage) { |
rconn->OnReadPacket(lport->last_stun_buf()->data<char>(), |
lport->last_stun_buf()->size(), rtc::PacketTime()); |
msg = rport->last_stun_msg(); |
- ASSERT_TRUE(msg != NULL); |
+ ASSERT_TRUE(msg != nullptr); |
EXPECT_EQ(STUN_BINDING_RESPONSE, msg->type()); |
// Received a BINDING-RESPONSE. |
lconn->OnReadPacket(rport->last_stun_buf()->data<char>(), |
@@ -1694,25 +1693,25 @@ TEST_F(PortTest, TestSendStunMessage) { |
EXPECT_FALSE(msg->IsLegacy()); |
const StunAddressAttribute* addr_attr = msg->GetAddress( |
STUN_ATTR_XOR_MAPPED_ADDRESS); |
- ASSERT_TRUE(addr_attr != NULL); |
+ ASSERT_TRUE(addr_attr != nullptr); |
EXPECT_EQ(lport->Candidates()[0].address(), addr_attr->GetAddress()); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateMessageIntegrity( |
rport->last_stun_buf()->data<char>(), rport->last_stun_buf()->size(), |
"rpass")); |
- EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != NULL); |
+ EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateFingerprint( |
lport->last_stun_buf()->data<char>(), lport->last_stun_buf()->size())); |
// No USERNAME or PRIORITY in ICE responses. |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USERNAME) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_PRIORITY) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MAPPED_ADDRESS) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLING) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLED) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USERNAME) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_PRIORITY) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MAPPED_ADDRESS) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLING) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_ICE_CONTROLLED) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == nullptr); |
// Response should not include ping count. |
- ASSERT_TRUE(msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT) == NULL); |
+ ASSERT_TRUE(msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT) == nullptr); |
// Respond with a BINDING-ERROR-RESPONSE. This wouldn't happen in real life, |
// but we can do it here. |
@@ -1721,23 +1720,23 @@ TEST_F(PortTest, TestSendStunMessage) { |
STUN_ERROR_SERVER_ERROR, |
STUN_ERROR_REASON_SERVER_ERROR); |
msg = rport->last_stun_msg(); |
- ASSERT_TRUE(msg != NULL); |
+ ASSERT_TRUE(msg != nullptr); |
EXPECT_EQ(STUN_BINDING_ERROR_RESPONSE, msg->type()); |
EXPECT_FALSE(msg->IsLegacy()); |
const StunErrorCodeAttribute* error_attr = msg->GetErrorCode(); |
- ASSERT_TRUE(error_attr != NULL); |
+ ASSERT_TRUE(error_attr != nullptr); |
EXPECT_EQ(STUN_ERROR_SERVER_ERROR, error_attr->code()); |
EXPECT_EQ(std::string(STUN_ERROR_REASON_SERVER_ERROR), error_attr->reason()); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_MESSAGE_INTEGRITY) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateMessageIntegrity( |
rport->last_stun_buf()->data<char>(), rport->last_stun_buf()->size(), |
"rpass")); |
- EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != NULL); |
+ EXPECT_TRUE(msg->GetUInt32(STUN_ATTR_FINGERPRINT) != nullptr); |
EXPECT_TRUE(StunMessage::ValidateFingerprint( |
lport->last_stun_buf()->data<char>(), lport->last_stun_buf()->size())); |
// No USERNAME with ICE. |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USERNAME) == NULL); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_PRIORITY) == NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USERNAME) == nullptr); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_PRIORITY) == nullptr); |
// Testing STUN binding requests from rport --> lport, having ICE_CONTROLLED |
// and (incremented) RETRANSMIT_COUNT attributes. |
@@ -1746,19 +1745,19 @@ TEST_F(PortTest, TestSendStunMessage) { |
rconn->Ping(0); |
rconn->Ping(0); |
rconn->Ping(0); |
- ASSERT_TRUE_WAIT(rport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(rport->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = rport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
const StunUInt64Attribute* ice_controlled_attr = |
msg->GetUInt64(STUN_ATTR_ICE_CONTROLLED); |
- ASSERT_TRUE(ice_controlled_attr != NULL); |
+ ASSERT_TRUE(ice_controlled_attr != nullptr); |
EXPECT_EQ(rport->IceTiebreaker(), ice_controlled_attr->value()); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == nullptr); |
// Request should include ping count. |
const StunUInt32Attribute* retransmit_attr = |
msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT); |
- ASSERT_TRUE(retransmit_attr != NULL); |
+ ASSERT_TRUE(retransmit_attr != nullptr); |
EXPECT_EQ(2U, retransmit_attr->value()); |
// Respond with a BINDING-RESPONSE. |
@@ -1784,7 +1783,7 @@ TEST_F(PortTest, TestSendStunMessage) { |
// Response should include same ping count. |
retransmit_attr = msg->GetUInt32(STUN_ATTR_RETRANSMIT_COUNT); |
- ASSERT_TRUE(retransmit_attr != NULL); |
+ ASSERT_TRUE(retransmit_attr != nullptr); |
EXPECT_EQ(2U, retransmit_attr->value()); |
} |
@@ -1805,14 +1804,14 @@ TEST_F(PortTest, TestUseCandidateAttribute) { |
Connection* lconn = lport->CreateConnection( |
rport->Candidates()[0], Port::ORIGIN_MESSAGE); |
lconn->Ping(0); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = lport->last_stun_msg(); |
const StunUInt64Attribute* ice_controlling_attr = |
msg->GetUInt64(STUN_ATTR_ICE_CONTROLLING); |
- ASSERT_TRUE(ice_controlling_attr != NULL); |
+ ASSERT_TRUE(ice_controlling_attr != nullptr); |
const StunByteStringAttribute* use_candidate_attr = msg->GetByteString( |
STUN_ATTR_USE_CANDIDATE); |
- ASSERT_TRUE(use_candidate_attr != NULL); |
+ ASSERT_TRUE(use_candidate_attr != nullptr); |
} |
// Tests that when the network type changes, the network cost of the port will |
@@ -1864,14 +1863,14 @@ TEST_F(PortTest, TestNetworkCostChange) { |
// message is handled in rconn, The rconn's remote candidate will have cost |
// rtc::kNetworkCostHigh; |
EXPECT_EQ(rtc::kNetworkCostLow, rconn->remote_candidate().network_cost()); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = lport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
// Pass the binding request to rport. |
rconn->OnReadPacket(lport->last_stun_buf()->data<char>(), |
lport->last_stun_buf()->size(), rtc::PacketTime()); |
// Wait until rport sends the response and then check the remote network cost. |
- ASSERT_TRUE_WAIT(rport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(rport->last_stun_msg() != nullptr, kDefaultTimeout); |
EXPECT_EQ(rtc::kNetworkCostHigh, rconn->remote_candidate().network_cost()); |
} |
@@ -1893,11 +1892,11 @@ TEST_F(PortTest, TestNetworkInfoAttribute) { |
Connection* lconn = |
lport->CreateConnection(rport->Candidates()[0], Port::ORIGIN_MESSAGE); |
lconn->Ping(0); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = lport->last_stun_msg(); |
const StunUInt32Attribute* network_info_attr = |
msg->GetUInt32(STUN_ATTR_NETWORK_INFO); |
- ASSERT_TRUE(network_info_attr != NULL); |
+ ASSERT_TRUE(network_info_attr != nullptr); |
uint32_t network_info = network_info_attr->value(); |
EXPECT_EQ(lnetwork_id, network_info >> 16); |
// Default network has unknown type and cost kNetworkCostUnknown. |
@@ -1911,10 +1910,10 @@ TEST_F(PortTest, TestNetworkInfoAttribute) { |
Connection* rconn = |
rport->CreateConnection(lport->Candidates()[0], Port::ORIGIN_MESSAGE); |
rconn->Ping(0); |
- ASSERT_TRUE_WAIT(rport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(rport->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = rport->last_stun_msg(); |
network_info_attr = msg->GetUInt32(STUN_ATTR_NETWORK_INFO); |
- ASSERT_TRUE(network_info_attr != NULL); |
+ ASSERT_TRUE(network_info_attr != nullptr); |
network_info = network_info_attr->value(); |
EXPECT_EQ(rnetwork_id, network_info >> 16); |
EXPECT_EQ(rtc::kNetworkCostHigh, network_info & 0xFFFF); |
@@ -1939,7 +1938,7 @@ TEST_F(PortTest, TestHandleStunMessage) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() != NULL); |
+ EXPECT_TRUE(out_msg.get() != nullptr); |
EXPECT_EQ("lfrag", username); |
// BINDING-RESPONSE without username, with MESSAGE-INTEGRITY and FINGERPRINT. |
@@ -1951,7 +1950,7 @@ TEST_F(PortTest, TestHandleStunMessage) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() != NULL); |
+ EXPECT_TRUE(out_msg.get() != nullptr); |
EXPECT_EQ("", username); |
// BINDING-ERROR-RESPONSE without username, with error, M-I, and FINGERPRINT. |
@@ -1962,9 +1961,9 @@ TEST_F(PortTest, TestHandleStunMessage) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() != NULL); |
+ EXPECT_TRUE(out_msg.get() != nullptr); |
EXPECT_EQ("", username); |
- ASSERT_TRUE(out_msg->GetErrorCode() != NULL); |
+ ASSERT_TRUE(out_msg->GetErrorCode() != nullptr); |
EXPECT_EQ(STUN_ERROR_SERVER_ERROR, out_msg->GetErrorCode()->code()); |
EXPECT_EQ(std::string(STUN_ERROR_REASON_SERVER_ERROR), |
out_msg->GetErrorCode()->reason()); |
@@ -1986,7 +1985,7 @@ TEST_F(PortTest, TestHandleStunMessageBadUsername) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_BAD_REQUEST, port->last_stun_error_code()); |
@@ -1997,7 +1996,7 @@ TEST_F(PortTest, TestHandleStunMessageBadUsername) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_UNAUTHORIZED, port->last_stun_error_code()); |
@@ -2008,7 +2007,7 @@ TEST_F(PortTest, TestHandleStunMessageBadUsername) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_UNAUTHORIZED, port->last_stun_error_code()); |
@@ -2020,7 +2019,7 @@ TEST_F(PortTest, TestHandleStunMessageBadUsername) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_UNAUTHORIZED, port->last_stun_error_code()); |
@@ -2032,7 +2031,7 @@ TEST_F(PortTest, TestHandleStunMessageBadUsername) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_UNAUTHORIZED, port->last_stun_error_code()); |
} |
@@ -2055,7 +2054,7 @@ TEST_F(PortTest, TestHandleStunMessageBadMessageIntegrity) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_BAD_REQUEST, port->last_stun_error_code()); |
@@ -2068,7 +2067,7 @@ TEST_F(PortTest, TestHandleStunMessageBadMessageIntegrity) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(port->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() == NULL); |
+ EXPECT_TRUE(out_msg.get() == nullptr); |
EXPECT_EQ("", username); |
EXPECT_EQ(STUN_ERROR_UNAUTHORIZED, port->last_stun_error_code()); |
@@ -2161,7 +2160,7 @@ TEST_F(PortTest, TestHandleStunBindingIndication) { |
WriteStunMessage(in_msg.get(), buf.get()); |
EXPECT_TRUE(lport->GetStunMessage(buf->Data(), buf->Length(), addr, &out_msg, |
&username)); |
- EXPECT_TRUE(out_msg.get() != NULL); |
+ EXPECT_TRUE(out_msg.get() != nullptr); |
EXPECT_EQ(out_msg->type(), STUN_BINDING_INDICATION); |
EXPECT_EQ("", username); |
@@ -2183,14 +2182,14 @@ TEST_F(PortTest, TestHandleStunBindingIndication) { |
Port::ORIGIN_MESSAGE); |
rconn->Ping(0); |
- ASSERT_TRUE_WAIT(rport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(rport->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = rport->last_stun_msg(); |
EXPECT_EQ(STUN_BINDING_REQUEST, msg->type()); |
// Send rport binding request to lport. |
lconn->OnReadPacket(rport->last_stun_buf()->data<char>(), |
rport->last_stun_buf()->size(), |
rtc::PacketTime()); |
- ASSERT_TRUE_WAIT(lport->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(lport->last_stun_msg() != nullptr, kDefaultTimeout); |
EXPECT_EQ(STUN_BINDING_RESPONSE, lport->last_stun_msg()->type()); |
int64_t last_ping_received1 = lconn->last_ping_received(); |
@@ -2445,7 +2444,7 @@ TEST_F(PortTest, TestWritableState) { |
// Send a ping from src to dst. |
ch1.CreateConnection(GetCandidate(port2)); |
- ASSERT_TRUE(ch1.conn() != NULL); |
+ ASSERT_TRUE(ch1.conn() != nullptr); |
EXPECT_EQ(Connection::STATE_WRITE_INIT, ch1.conn()->write_state()); |
// for TCP connect |
EXPECT_TRUE_SIMULATED_WAIT(ch1.conn()->connected(), kDefaultTimeout, clock); |
@@ -2515,7 +2514,7 @@ TEST_F(PortTest, TestTimeoutForNeverWritable) { |
ch2.Start(); |
ch1.CreateConnection(GetCandidate(port2)); |
- ASSERT_TRUE(ch1.conn() != NULL); |
+ ASSERT_TRUE(ch1.conn() != nullptr); |
EXPECT_EQ(Connection::STATE_WRITE_INIT, ch1.conn()->write_state()); |
// Attempt to go directly to write timeout. |
@@ -2550,7 +2549,7 @@ TEST_F(PortTest, TestIceLiteConnectivity) { |
ASSERT_FALSE(ice_lite_port->Candidates().empty()); |
ch1.CreateConnection(GetCandidate(ice_lite_port.get())); |
- ASSERT_TRUE(ch1.conn() != NULL); |
+ ASSERT_TRUE(ch1.conn() != nullptr); |
EXPECT_EQ(Connection::STATE_WRITE_INIT, ch1.conn()->write_state()); |
// Send ping from full mode client. |
@@ -2559,9 +2558,9 @@ TEST_F(PortTest, TestIceLiteConnectivity) { |
// Verify stun ping is without USE_CANDIDATE_ATTR. Getting message directly |
// from port. |
- ASSERT_TRUE_WAIT(ice_full_port->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(ice_full_port->last_stun_msg() != nullptr, kDefaultTimeout); |
IceMessage* msg = ice_full_port->last_stun_msg(); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) == nullptr); |
// Respond with a BINDING-RESPONSE from litemode client. |
// NOTE: Ideally we should't create connection at this stage from lite |
@@ -2587,9 +2586,9 @@ TEST_F(PortTest, TestIceLiteConnectivity) { |
ice_full_port->Reset(); |
// Send ping. This must have USE_CANDIDATE_ATTR. |
ch1.Ping(); |
- ASSERT_TRUE_WAIT(ice_full_port->last_stun_msg() != NULL, kDefaultTimeout); |
+ ASSERT_TRUE_WAIT(ice_full_port->last_stun_msg() != nullptr, kDefaultTimeout); |
msg = ice_full_port->last_stun_msg(); |
- EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) != NULL); |
+ EXPECT_TRUE(msg->GetByteString(STUN_ATTR_USE_CANDIDATE) != nullptr); |
ch1.Stop(); |
} |