Index: net/quic/quic_crypto_server_stream_test.cc |
diff --git a/net/quic/quic_crypto_server_stream_test.cc b/net/quic/quic_crypto_server_stream_test.cc |
index d9bbfe1c5ffa2687c239b1d5aa49305ddaab6efb..0d5991145f9d3f04d6168ad1208fd30897dc23c0 100644 |
--- a/net/quic/quic_crypto_server_stream_test.cc |
+++ b/net/quic/quic_crypto_server_stream_test.cc |
@@ -194,8 +194,8 @@ TEST_P(QuicCryptoServerStreamTest, NotInitiallyConected) { |
} |
TEST_P(QuicCryptoServerStreamTest, NotInitiallySendingStatelessRejects) { |
- EXPECT_FALSE(server_stream()->use_stateless_rejects_if_peer_supported()); |
- EXPECT_FALSE(server_stream()->peer_supports_stateless_rejects()); |
+ EXPECT_FALSE(server_stream()->UseStatelessRejectsIfPeerSupported()); |
+ EXPECT_FALSE(server_stream()->PeerSupportsStatelessRejects()); |
} |
TEST_P(QuicCryptoServerStreamTest, ConnectedAfterCHLO) { |
@@ -251,8 +251,8 @@ TEST_P(QuicCryptoServerStreamTest, ConnectedAfterStatelessHandshake) { |
// On the first round, encryption will not be established. |
EXPECT_FALSE(server_stream()->encryption_established()); |
EXPECT_FALSE(server_stream()->handshake_confirmed()); |
- EXPECT_EQ(1, server_stream()->num_handshake_messages()); |
- EXPECT_EQ(0, server_stream()->num_handshake_messages_with_server_nonces()); |
+ EXPECT_EQ(1, server_stream()->NumHandshakeMessages()); |
+ EXPECT_EQ(0, server_stream()->NumHandshakeMessagesWithServerNonces()); |
// Now check the client state. |
QuicCryptoClientConfig::CachedState* client_state = |
@@ -283,8 +283,8 @@ TEST_P(QuicCryptoServerStreamTest, ConnectedAfterStatelessHandshake) { |
// On the second round, encryption will be established. |
EXPECT_TRUE(server_stream()->encryption_established()); |
EXPECT_TRUE(server_stream()->handshake_confirmed()); |
- EXPECT_EQ(2, server_stream()->num_handshake_messages()); |
- EXPECT_EQ(1, server_stream()->num_handshake_messages_with_server_nonces()); |
+ EXPECT_EQ(2, server_stream()->NumHandshakeMessages()); |
+ EXPECT_EQ(1, server_stream()->NumHandshakeMessagesWithServerNonces()); |
} |
TEST_P(QuicCryptoServerStreamTest, NoStatelessRejectIfNoClientSupport) { |
@@ -405,7 +405,7 @@ TEST_P(QuicCryptoServerStreamTest, ChannelIDAsync) { |
TEST_P(QuicCryptoServerStreamTest, OnlySendSCUPAfterHandshakeComplete) { |
// An attempt to send a SCUP before completing handshake should fail. |
server_stream()->SendServerConfigUpdate(nullptr); |
- EXPECT_EQ(0, server_stream()->num_server_config_update_messages_sent()); |
+ EXPECT_EQ(0, server_stream()->NumServerConfigUpdateMessagesSent()); |
} |
TEST_P(QuicCryptoServerStreamTest, DoesPeerSupportStatelessRejects) { |