| Index: net/tools/quic/quic_client_session_test.cc
|
| diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc
|
| index d7f41015988b26978f44f45e5d2bb9599430d8d0..1543f56dd81d7ca097cf7724f2663e392a0256e0 100644
|
| --- a/net/tools/quic/quic_client_session_test.cc
|
| +++ b/net/tools/quic/quic_client_session_test.cc
|
| @@ -10,7 +10,7 @@
|
| #include "net/quic/crypto/aes_128_gcm_12_encrypter.h"
|
| #include "net/quic/quic_flags.h"
|
| #include "net/quic/test_tools/crypto_test_utils.h"
|
| -#include "net/quic/test_tools/quic_session_peer.h"
|
| +#include "net/quic/test_tools/quic_spdy_session_peer.h"
|
| #include "net/quic/test_tools/quic_test_utils.h"
|
| #include "net/tools/quic/quic_spdy_client_stream.h"
|
| #include "testing/gtest/include/gtest/gtest.h"
|
| @@ -21,7 +21,7 @@ using net::test::CryptoTestUtils;
|
| using net::test::DefaultQuicConfig;
|
| using net::test::MockConnection;
|
| using net::test::PacketSavingConnection;
|
| -using net::test::QuicSessionPeer;
|
| +using net::test::QuicSpdySessionPeer;
|
| using net::test::SupportedVersions;
|
| using net::test::TestPeerIPAddress;
|
| using net::test::ValueRestore;
|
| @@ -80,13 +80,13 @@ TEST_P(ToolsQuicClientSessionTest, MaxNumStreams) {
|
| // Initialize crypto before the client session will create a stream.
|
| CompleteCryptoHandshake();
|
|
|
| - QuicSpdyClientStream* stream = session_->CreateOutgoingDataStream();
|
| + QuicSpdyClientStream* stream = session_->CreateOutgoingDynamicStream();
|
| ASSERT_TRUE(stream);
|
| - EXPECT_FALSE(session_->CreateOutgoingDataStream());
|
| + EXPECT_FALSE(session_->CreateOutgoingDynamicStream());
|
|
|
| // Close a stream and ensure I can now open a new one.
|
| session_->CloseStream(stream->id());
|
| - stream = session_->CreateOutgoingDataStream();
|
| + stream = session_->CreateOutgoingDynamicStream();
|
| EXPECT_TRUE(stream);
|
| }
|
|
|
| @@ -96,7 +96,7 @@ TEST_P(ToolsQuicClientSessionTest, GoAwayReceived) {
|
| // After receiving a GoAway, I should no longer be able to create outgoing
|
| // streams.
|
| session_->OnGoAway(QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away."));
|
| - EXPECT_EQ(nullptr, session_->CreateOutgoingDataStream());
|
| + EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream());
|
| }
|
|
|
| TEST_P(ToolsQuicClientSessionTest, SetFecProtectionFromConfig) {
|
| @@ -112,9 +112,9 @@ TEST_P(ToolsQuicClientSessionTest, SetFecProtectionFromConfig) {
|
|
|
| // Verify that headers stream is always protected and data streams are
|
| // optionally protected.
|
| - EXPECT_EQ(FEC_PROTECT_ALWAYS,
|
| - QuicSessionPeer::GetHeadersStream(session_.get())->fec_policy());
|
| - QuicSpdyClientStream* stream = session_->CreateOutgoingDataStream();
|
| + EXPECT_EQ(FEC_PROTECT_ALWAYS, QuicSpdySessionPeer::GetHeadersStream(
|
| + session_.get())->fec_policy());
|
| + QuicSpdyClientStream* stream = session_->CreateOutgoingDynamicStream();
|
| ASSERT_TRUE(stream);
|
| EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy());
|
| }
|
|
|