Index: net/tools/quic/quic_client_session_test.cc |
diff --git a/net/tools/quic/quic_client_session_test.cc b/net/tools/quic/quic_client_session_test.cc |
index d7f41015988b26978f44f45e5d2bb9599430d8d0..1543f56dd81d7ca097cf7724f2663e392a0256e0 100644 |
--- a/net/tools/quic/quic_client_session_test.cc |
+++ b/net/tools/quic/quic_client_session_test.cc |
@@ -10,7 +10,7 @@ |
#include "net/quic/crypto/aes_128_gcm_12_encrypter.h" |
#include "net/quic/quic_flags.h" |
#include "net/quic/test_tools/crypto_test_utils.h" |
-#include "net/quic/test_tools/quic_session_peer.h" |
+#include "net/quic/test_tools/quic_spdy_session_peer.h" |
#include "net/quic/test_tools/quic_test_utils.h" |
#include "net/tools/quic/quic_spdy_client_stream.h" |
#include "testing/gtest/include/gtest/gtest.h" |
@@ -21,7 +21,7 @@ using net::test::CryptoTestUtils; |
using net::test::DefaultQuicConfig; |
using net::test::MockConnection; |
using net::test::PacketSavingConnection; |
-using net::test::QuicSessionPeer; |
+using net::test::QuicSpdySessionPeer; |
using net::test::SupportedVersions; |
using net::test::TestPeerIPAddress; |
using net::test::ValueRestore; |
@@ -80,13 +80,13 @@ TEST_P(ToolsQuicClientSessionTest, MaxNumStreams) { |
// Initialize crypto before the client session will create a stream. |
CompleteCryptoHandshake(); |
- QuicSpdyClientStream* stream = session_->CreateOutgoingDataStream(); |
+ QuicSpdyClientStream* stream = session_->CreateOutgoingDynamicStream(); |
ASSERT_TRUE(stream); |
- EXPECT_FALSE(session_->CreateOutgoingDataStream()); |
+ EXPECT_FALSE(session_->CreateOutgoingDynamicStream()); |
// Close a stream and ensure I can now open a new one. |
session_->CloseStream(stream->id()); |
- stream = session_->CreateOutgoingDataStream(); |
+ stream = session_->CreateOutgoingDynamicStream(); |
EXPECT_TRUE(stream); |
} |
@@ -96,7 +96,7 @@ TEST_P(ToolsQuicClientSessionTest, GoAwayReceived) { |
// After receiving a GoAway, I should no longer be able to create outgoing |
// streams. |
session_->OnGoAway(QuicGoAwayFrame(QUIC_PEER_GOING_AWAY, 1u, "Going away.")); |
- EXPECT_EQ(nullptr, session_->CreateOutgoingDataStream()); |
+ EXPECT_EQ(nullptr, session_->CreateOutgoingDynamicStream()); |
} |
TEST_P(ToolsQuicClientSessionTest, SetFecProtectionFromConfig) { |
@@ -112,9 +112,9 @@ TEST_P(ToolsQuicClientSessionTest, SetFecProtectionFromConfig) { |
// Verify that headers stream is always protected and data streams are |
// optionally protected. |
- EXPECT_EQ(FEC_PROTECT_ALWAYS, |
- QuicSessionPeer::GetHeadersStream(session_.get())->fec_policy()); |
- QuicSpdyClientStream* stream = session_->CreateOutgoingDataStream(); |
+ EXPECT_EQ(FEC_PROTECT_ALWAYS, QuicSpdySessionPeer::GetHeadersStream( |
+ session_.get())->fec_policy()); |
+ QuicSpdyClientStream* stream = session_->CreateOutgoingDynamicStream(); |
ASSERT_TRUE(stream); |
EXPECT_EQ(FEC_PROTECT_OPTIONAL, stream->fec_policy()); |
} |