update_engine: Replace NULL with nullptr
Replaced the usage of NULL with nullptr. This also makes it possible to
use standard gtest macros to compare pointers in Update Manager's unit tests.
So, there is no need in custom UMTEST_... macros which are replaced with the
gtest macros (see change in update_engine/update_manager/umtest_utils.h):
UMTEST_ASSERT_NULL(p) => ASSERT_EQ(nullptr, p)
UMTEST_ASSERT_NOT_NULL(p) => ASSERT_NE(nullptr, p)
UMTEST_EXPECT_NULL(p) => EXPECT_EQ(nullptr, p)
UMTEST_EXPECT_NOT_NULL(p) => EXPECT_NE(nullptr, p)
BUG=None
TEST=FEATURES=test emerge-link update_engine
USE="clang asan" FEATURES=test emerge-link update_engine
Change-Id: I77a42a1e9ce992bb2f9f263db5cf75fe6110a4ec
Reviewed-on: https://chromium-review.googlesource.com/215136
Tested-by: Alex Vakulenko <avakulenko@chromium.org>
Reviewed-by: Alex Deymo <deymo@chromium.org>
Commit-Queue: Alex Vakulenko <avakulenko@chromium.org>
diff --git a/delta_performer_unittest.cc b/delta_performer_unittest.cc
index d68aa25..8b640e8 100644
--- a/delta_performer_unittest.cc
+++ b/delta_performer_unittest.cc
@@ -185,7 +185,7 @@
if (signature_test == kSignatureGeneratedShellBadKey) {
ASSERT_TRUE(utils::MakeTempFile("key.XXXXXX",
&private_key_path,
- NULL));
+ nullptr));
} else {
ASSERT_TRUE(signature_test == kSignatureGeneratedShell ||
signature_test == kSignatureGeneratedShellRotateCl1 ||
@@ -203,7 +203,7 @@
}
int signature_size = GetSignatureSize(private_key_path);
string hash_file;
- ASSERT_TRUE(utils::MakeTempFile("hash.XXXXXX", &hash_file, NULL));
+ ASSERT_TRUE(utils::MakeTempFile("hash.XXXXXX", &hash_file, nullptr));
ScopedPathUnlinker hash_unlinker(hash_file);
string signature_size_string;
if (signature_test == kSignatureGeneratedShellRotateCl1 ||
@@ -227,7 +227,7 @@
ASSERT_TRUE(WriteFileVector(hash_file, hash));
string sig_file;
- ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file, NULL));
+ ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file, nullptr));
ScopedPathUnlinker sig_unlinker(sig_file);
ASSERT_EQ(0,
System(base::StringPrintf(
@@ -237,7 +237,7 @@
hash_file.c_str(),
sig_file.c_str())));
string sig_file2;
- ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file2, NULL));
+ ASSERT_TRUE(utils::MakeTempFile("signature.XXXXXX", &sig_file2, nullptr));
ScopedPathUnlinker sig2_unlinker(sig_file2);
if (signature_test == kSignatureGeneratedShellRotateCl1 ||
signature_test == kSignatureGeneratedShellRotateCl2) {
@@ -279,9 +279,9 @@
off_t chunk_size,
SignatureTest signature_test,
DeltaState *state) {
- EXPECT_TRUE(utils::MakeTempFile("a_img.XXXXXX", &state->a_img, NULL));
- EXPECT_TRUE(utils::MakeTempFile("b_img.XXXXXX", &state->b_img, NULL));
- CreateExtImageAtPath(state->a_img, NULL);
+ EXPECT_TRUE(utils::MakeTempFile("a_img.XXXXXX", &state->a_img, nullptr));
+ EXPECT_TRUE(utils::MakeTempFile("b_img.XXXXXX", &state->b_img, nullptr));
+ CreateExtImageAtPath(state->a_img, nullptr);
state->image_size = static_cast<int>(utils::FileSize(state->a_img));
@@ -357,7 +357,7 @@
base::FilePath(state->b_img)));
old_image_info = new_image_info;
} else {
- CreateExtImageAtPath(state->b_img, NULL);
+ CreateExtImageAtPath(state->b_img, nullptr);
EXPECT_EQ(0, System(base::StringPrintf(
"dd if=/dev/zero of=%s seek=%d bs=1 count=1",
state->b_img.c_str(),
@@ -428,12 +428,12 @@
string old_kernel;
EXPECT_TRUE(utils::MakeTempFile("old_kernel.XXXXXX",
&state->old_kernel,
- NULL));
+ nullptr));
string new_kernel;
EXPECT_TRUE(utils::MakeTempFile("new_kernel.XXXXXX",
&state->new_kernel,
- NULL));
+ nullptr));
state->old_kernel_data.resize(kDefaultKernelSize);
state->new_kernel_data.resize(state->old_kernel_data.size());
@@ -457,7 +457,7 @@
EXPECT_TRUE(utils::MakeTempFile("delta.XXXXXX",
&state->delta_path,
- NULL));
+ nullptr));
LOG(INFO) << "delta path: " << state->delta_path;
{
string a_mnt, b_mnt;
@@ -477,7 +477,7 @@
private_key,
chunk_size,
kRootFSPartitionSize,
- full_rootfs ? NULL : &old_image_info,
+ full_rootfs ? nullptr : &old_image_info,
&new_image_info,
&state->metadata_size));
}
@@ -732,7 +732,7 @@
DeltaState* state,
ErrorCode expected_result) {
if (!performer) {
- EXPECT_TRUE(!"Skipping payload verification since performer is NULL.");
+ EXPECT_TRUE(!"Skipping payload verification since performer is null.");
return;
}