| Index: net/quic/quic_crypto_server_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_server_stream_test.cc b/net/quic/quic_crypto_server_stream_test.cc
|
| index d9bbfe1c5ffa2687c239b1d5aa49305ddaab6efb..0d5991145f9d3f04d6168ad1208fd30897dc23c0 100644
|
| --- a/net/quic/quic_crypto_server_stream_test.cc
|
| +++ b/net/quic/quic_crypto_server_stream_test.cc
|
| @@ -194,8 +194,8 @@ TEST_P(QuicCryptoServerStreamTest, NotInitiallyConected) {
|
| }
|
|
|
| TEST_P(QuicCryptoServerStreamTest, NotInitiallySendingStatelessRejects) {
|
| - EXPECT_FALSE(server_stream()->use_stateless_rejects_if_peer_supported());
|
| - EXPECT_FALSE(server_stream()->peer_supports_stateless_rejects());
|
| + EXPECT_FALSE(server_stream()->UseStatelessRejectsIfPeerSupported());
|
| + EXPECT_FALSE(server_stream()->PeerSupportsStatelessRejects());
|
| }
|
|
|
| TEST_P(QuicCryptoServerStreamTest, ConnectedAfterCHLO) {
|
| @@ -251,8 +251,8 @@ TEST_P(QuicCryptoServerStreamTest, ConnectedAfterStatelessHandshake) {
|
| // On the first round, encryption will not be established.
|
| EXPECT_FALSE(server_stream()->encryption_established());
|
| EXPECT_FALSE(server_stream()->handshake_confirmed());
|
| - EXPECT_EQ(1, server_stream()->num_handshake_messages());
|
| - EXPECT_EQ(0, server_stream()->num_handshake_messages_with_server_nonces());
|
| + EXPECT_EQ(1, server_stream()->NumHandshakeMessages());
|
| + EXPECT_EQ(0, server_stream()->NumHandshakeMessagesWithServerNonces());
|
|
|
| // Now check the client state.
|
| QuicCryptoClientConfig::CachedState* client_state =
|
| @@ -283,8 +283,8 @@ TEST_P(QuicCryptoServerStreamTest, ConnectedAfterStatelessHandshake) {
|
| // On the second round, encryption will be established.
|
| EXPECT_TRUE(server_stream()->encryption_established());
|
| EXPECT_TRUE(server_stream()->handshake_confirmed());
|
| - EXPECT_EQ(2, server_stream()->num_handshake_messages());
|
| - EXPECT_EQ(1, server_stream()->num_handshake_messages_with_server_nonces());
|
| + EXPECT_EQ(2, server_stream()->NumHandshakeMessages());
|
| + EXPECT_EQ(1, server_stream()->NumHandshakeMessagesWithServerNonces());
|
| }
|
|
|
| TEST_P(QuicCryptoServerStreamTest, NoStatelessRejectIfNoClientSupport) {
|
| @@ -405,7 +405,7 @@ TEST_P(QuicCryptoServerStreamTest, ChannelIDAsync) {
|
| TEST_P(QuicCryptoServerStreamTest, OnlySendSCUPAfterHandshakeComplete) {
|
| // An attempt to send a SCUP before completing handshake should fail.
|
| server_stream()->SendServerConfigUpdate(nullptr);
|
| - EXPECT_EQ(0, server_stream()->num_server_config_update_messages_sent());
|
| + EXPECT_EQ(0, server_stream()->NumServerConfigUpdateMessagesSent());
|
| }
|
|
|
| TEST_P(QuicCryptoServerStreamTest, DoesPeerSupportStatelessRejects) {
|
|
|