| Index: net/quic/quic_connection_test.cc
|
| diff --git a/net/quic/quic_connection_test.cc b/net/quic/quic_connection_test.cc
|
| index 14945afbb18429bf18ca23f1e49e67e482051607..0f983058350e5dba10d6575306e99231497e45eb 100644
|
| --- a/net/quic/quic_connection_test.cc
|
| +++ b/net/quic/quic_connection_test.cc
|
| @@ -1577,9 +1577,9 @@ TEST_P(QuicConnectionTest, RecordSentTimeBeforePacketSent) {
|
|
|
| // Now pause during the write, and check the results.
|
| actual_recorded_send_time = QuicTime::Zero();
|
| - const QuicTime::Delta kWritePauseTimeDelta =
|
| + const QuicTime::Delta write_pause_time_delta =
|
| QuicTime::Delta::FromMilliseconds(5000);
|
| - SetWritePauseTimeDelta(kWritePauseTimeDelta);
|
| + SetWritePauseTimeDelta(write_pause_time_delta);
|
| expected_recorded_send_time = clock_.Now();
|
|
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _))
|
| @@ -1602,7 +1602,7 @@ TEST_P(QuicConnectionTest, FECSending) {
|
| connection_.version(), kIncludeVersion,
|
| PACKET_8BYTE_CONNECTION_ID, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| IN_FEC_GROUP, &payload_length);
|
| - creator_->set_max_packet_length(length);
|
| + creator_->SetMaxPacketLength(length);
|
|
|
| // Send 4 protected data packets, which should also trigger 1 FEC packet.
|
| EXPECT_CALL(*send_algorithm_,
|
| @@ -1622,7 +1622,7 @@ TEST_P(QuicConnectionTest, FECQueueing) {
|
| connection_.version(), kIncludeVersion,
|
| PACKET_8BYTE_CONNECTION_ID, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| IN_FEC_GROUP, &payload_length);
|
| - creator_->set_max_packet_length(length);
|
| + creator_->SetMaxPacketLength(length);
|
| EXPECT_TRUE(creator_->IsFecEnabled());
|
|
|
| EXPECT_EQ(0u, connection_.NumQueuedPackets());
|
| @@ -2873,7 +2873,7 @@ TEST_P(QuicConnectionTest, DelayForwardSecureEncryptionUntilManyPacketSent) {
|
|
|
| TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
|
| // SetFromConfig is always called after construction from InitializeSession.
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
| connection_.SetFromConfig(config);
|
| EXPECT_CALL(visitor_, OnSuccessfulVersionNegotiation(_));
|
| @@ -2903,7 +2903,7 @@ TEST_P(QuicConnectionTest, BufferNonDecryptablePackets) {
|
|
|
| TEST_P(QuicConnectionTest, Buffer100NonDecryptablePackets) {
|
| // SetFromConfig is always called after construction from InitializeSession.
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
| config.set_max_undecryptable_packets(100);
|
| connection_.SetFromConfig(config);
|
| @@ -3051,7 +3051,7 @@ TEST_P(QuicConnectionTest, InitialTimeout) {
|
| EXPECT_FALSE(connection_.GetTimeoutAlarm()->IsSet());
|
|
|
| // SetFromConfig sets the initial timeouts before negotiation.
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
| connection_.SetFromConfig(config);
|
| // Subtract a second from the idle timeout on the client side.
|
| @@ -3163,7 +3163,7 @@ TEST_P(QuicConnectionTest, PingAfterSend) {
|
|
|
| TEST_P(QuicConnectionTest, TimeoutAfterSend) {
|
| EXPECT_TRUE(connection_.connected());
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
| connection_.SetFromConfig(config);
|
| EXPECT_FALSE(QuicConnectionPeer::IsSilentCloseEnabled(&connection_));
|
| @@ -3205,7 +3205,7 @@ TEST_P(QuicConnectionTest, TimeoutAfterSendSilentClose) {
|
| // Same test as above, but complete a handshake which enables silent close,
|
| // causing no connection close packet to be sent.
|
| EXPECT_TRUE(connection_.connected());
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
|
|
| // Create a handshake message that also enables silent close.
|
| @@ -3284,7 +3284,7 @@ TEST_P(QuicConnectionTest, TestQueueLimitsOnSendStreamData) {
|
| connection_.version(), kIncludeVersion,
|
| PACKET_8BYTE_CONNECTION_ID, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| NOT_IN_FEC_GROUP, &payload_length);
|
| - creator_->set_max_packet_length(length);
|
| + creator_->SetMaxPacketLength(length);
|
|
|
| // Queue the first packet.
|
| EXPECT_CALL(*send_algorithm_,
|
| @@ -3308,7 +3308,7 @@ TEST_P(QuicConnectionTest, LoopThroughSendingPackets) {
|
| connection_.version(), kIncludeVersion,
|
| PACKET_8BYTE_CONNECTION_ID, PACKET_1BYTE_SEQUENCE_NUMBER,
|
| NOT_IN_FEC_GROUP, &payload_length);
|
| - creator_->set_max_packet_length(length);
|
| + creator_->SetMaxPacketLength(length);
|
|
|
| // Queue the first packet.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(7);
|
| @@ -3322,7 +3322,7 @@ TEST_P(QuicConnectionTest, LoopThroughSendingPackets) {
|
| TEST_P(QuicConnectionTest, LoopThroughSendingPacketsWithTruncation) {
|
| // Set up a larger payload than will fit in one packet.
|
| const string payload(connection_.max_packet_length(), 'a');
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _)).Times(AnyNumber());
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _)).Times(AnyNumber());
|
|
|
| // Now send some packets with no truncation.
|
| EXPECT_CALL(*send_algorithm_, OnPacketSent(_, _, _, _, _)).Times(2);
|
| @@ -3672,14 +3672,14 @@ TEST_P(QuicConnectionTest, UpdateEntropyForReceivedPackets) {
|
| // Make 4th packet my least unacked, and update entropy for 2, 3 packets.
|
| QuicPacketCreatorPeer::SetSequenceNumber(&peer_creator_, 5);
|
| QuicPacketEntropyHash six_packet_entropy_hash = 0;
|
| - QuicPacketEntropyHash kRandomEntropyHash = 129u;
|
| + QuicPacketEntropyHash random_entropy_hash = 129u;
|
| QuicStopWaitingFrame frame = InitStopWaitingFrame(4);
|
| - frame.entropy_hash = kRandomEntropyHash;
|
| + frame.entropy_hash = random_entropy_hash;
|
| if (ProcessStopWaitingPacket(&frame)) {
|
| six_packet_entropy_hash = 1 << 6;
|
| }
|
|
|
| - EXPECT_EQ((kRandomEntropyHash + (1 << 5) + six_packet_entropy_hash),
|
| + EXPECT_EQ((random_entropy_hash + (1 << 5) + six_packet_entropy_hash),
|
| outgoing_ack()->entropy_hash);
|
| }
|
|
|
| @@ -3691,16 +3691,16 @@ TEST_P(QuicConnectionTest, UpdateEntropyHashUptoCurrentPacket) {
|
| ProcessDataPacket(22, 1, kEntropyFlag);
|
| EXPECT_EQ(66u, outgoing_ack()->entropy_hash);
|
| QuicPacketCreatorPeer::SetSequenceNumber(&peer_creator_, 22);
|
| - QuicPacketEntropyHash kRandomEntropyHash = 85u;
|
| + QuicPacketEntropyHash random_entropy_hash = 85u;
|
| // Current packet is the least unacked packet.
|
| QuicPacketEntropyHash ack_entropy_hash;
|
| QuicStopWaitingFrame frame = InitStopWaitingFrame(23);
|
| - frame.entropy_hash = kRandomEntropyHash;
|
| + frame.entropy_hash = random_entropy_hash;
|
| ack_entropy_hash = ProcessStopWaitingPacket(&frame);
|
| - EXPECT_EQ((kRandomEntropyHash + ack_entropy_hash),
|
| + EXPECT_EQ((random_entropy_hash + ack_entropy_hash),
|
| outgoing_ack()->entropy_hash);
|
| ProcessDataPacket(25, 1, kEntropyFlag);
|
| - EXPECT_EQ((kRandomEntropyHash + ack_entropy_hash + (1 << (25 % 8))),
|
| + EXPECT_EQ((random_entropy_hash + ack_entropy_hash + (1 << (25 % 8))),
|
| outgoing_ack()->entropy_hash);
|
| }
|
|
|
| @@ -4334,7 +4334,7 @@ TEST_P(QuicConnectionTest, NetworkChangeVisitorConfigCallbackChangesFecState) {
|
|
|
| // Verify that sending a config with a new initial rtt changes fec timeout.
|
| // Create and process a config with a non-zero initial RTT.
|
| - EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _, _));
|
| + EXPECT_CALL(*send_algorithm_, SetFromConfig(_, _));
|
| QuicConfig config;
|
| config.SetInitialRoundTripTimeUsToSend(300000);
|
| connection_.SetFromConfig(config);
|
|
|