Index: net/tools/quic/quic_dispatcher_test.cc |
diff --git a/net/tools/quic/quic_dispatcher_test.cc b/net/tools/quic/quic_dispatcher_test.cc |
index b54ee290412f88d5c392e18c153ac87b59211344..efe6acca0cd0b5393d1e8f1ecdf7c75c651233a3 100644 |
--- a/net/tools/quic/quic_dispatcher_test.cc |
+++ b/net/tools/quic/quic_dispatcher_test.cc |
@@ -31,7 +31,7 @@ using net::EpollServer; |
using net::test::ConstructEncryptedPacket; |
using net::test::CryptoTestUtils; |
using net::test::MockConnection; |
-using net::test::MockHelper; |
+using net::test::MockConnectionHelper; |
using net::test::ValueRestore; |
using net::test::TestWriterFactory; |
using std::string; |
@@ -98,7 +98,7 @@ class TestDispatcher : public QuicDispatcher { |
class MockServerConnection : public MockConnection { |
public: |
MockServerConnection(QuicConnectionId connection_id, |
- MockHelper* helper, |
+ MockConnectionHelper* helper, |
QuicDispatcher* dispatcher) |
: MockConnection(connection_id, helper, Perspective::IS_SERVER), |
dispatcher_(dispatcher) {} |
@@ -116,7 +116,7 @@ QuicServerSession* CreateSession(QuicDispatcher* dispatcher, |
const QuicConfig& config, |
QuicConnectionId connection_id, |
const IPEndPoint& client_address, |
- MockHelper* helper, |
+ MockConnectionHelper* helper, |
const QuicCryptoServerConfig* crypto_config, |
TestQuicSpdyServerSession** session) { |
MockServerConnection* connection = |
@@ -203,7 +203,7 @@ class QuicDispatcherTest : public ::testing::Test { |
EpollServer eps_; |
QuicEpollConnectionHelper helper_; |
- MockHelper mock_helper_; |
+ MockConnectionHelper mock_helper_; |
QuicConfig config_; |
QuicCryptoServerConfig crypto_config_; |
IPEndPoint server_address_; |
@@ -328,12 +328,9 @@ class MockQuicCryptoServerStream : public QuicCryptoServerStream { |
struct StatelessRejectTestParams { |
StatelessRejectTestParams(bool enable_stateless_rejects_via_flag, |
- bool use_stateless_rejects_if_peer_supported, |
bool client_supports_statelesss_rejects, |
bool crypto_handshake_successful) |
: enable_stateless_rejects_via_flag(enable_stateless_rejects_via_flag), |
- use_stateless_rejects_if_peer_supported( |
- use_stateless_rejects_if_peer_supported), |
client_supports_statelesss_rejects(client_supports_statelesss_rejects), |
crypto_handshake_successful(crypto_handshake_successful) {} |
@@ -341,8 +338,6 @@ struct StatelessRejectTestParams { |
const StatelessRejectTestParams& p) { |
os << " enable_stateless_rejects_via_flag: " |
<< p.enable_stateless_rejects_via_flag << std::endl; |
- os << "{ use_stateless_rejects_if_peer_supported: " |
- << p.use_stateless_rejects_if_peer_supported << std::endl; |
os << "{ client_supports_statelesss_rejects: " |
<< p.client_supports_statelesss_rejects << std::endl; |
os << " crypto_handshake_successful: " << p.crypto_handshake_successful |
@@ -351,12 +346,8 @@ struct StatelessRejectTestParams { |
} |
// This only enables the stateless reject feature via the feature-flag. |
- // It does not force the crypto server to emit stateless rejects. |
+ // This should be a no-op if the peer does not support them. |
bool enable_stateless_rejects_via_flag; |
- // If true, this forces the server to send a stateless reject when rejecting |
- // messages. This should be a no-op if enable_stateless_rejects_via_flag is |
- // false or the peer does not support them. |
- bool use_stateless_rejects_if_peer_supported; |
// Whether or not the client supports stateless rejects. |
bool client_supports_statelesss_rejects; |
// Should the initial crypto handshake succeed or not. |
@@ -367,14 +358,11 @@ struct StatelessRejectTestParams { |
vector<StatelessRejectTestParams> GetStatelessRejectTestParams() { |
vector<StatelessRejectTestParams> params; |
for (bool enable_stateless_rejects_via_flag : {true, false}) { |
- for (bool use_stateless_rejects_if_peer_supported : {true, false}) { |
- for (bool client_supports_statelesss_rejects : {true, false}) { |
- for (bool crypto_handshake_successful : {true, false}) { |
- params.push_back(StatelessRejectTestParams( |
- enable_stateless_rejects_via_flag, |
- use_stateless_rejects_if_peer_supported, |
- client_supports_statelesss_rejects, crypto_handshake_successful)); |
- } |
+ for (bool client_supports_statelesss_rejects : {true, false}) { |
+ for (bool crypto_handshake_successful : {true, false}) { |
+ params.push_back(StatelessRejectTestParams( |
+ enable_stateless_rejects_via_flag, |
+ client_supports_statelesss_rejects, crypto_handshake_successful)); |
} |
} |
} |
@@ -404,7 +392,6 @@ class QuicDispatcherStatelessRejectTest |
// a stateless reject, depending upon the parameters of the test. |
bool ExpectStatelessReject() { |
return GetParam().enable_stateless_rejects_via_flag && |
- GetParam().use_stateless_rejects_if_peer_supported && |
!GetParam().crypto_handshake_successful && |
GetParam().client_supports_statelesss_rejects; |
} |
@@ -419,8 +406,6 @@ class QuicDispatcherStatelessRejectTest |
crypto_stream1_ = new MockQuicCryptoServerStream(crypto_config_, session1_); |
session1_->SetCryptoStream(crypto_stream1_); |
- crypto_stream1_->set_use_stateless_rejects_if_peer_supported( |
- GetParam().use_stateless_rejects_if_peer_supported); |
crypto_stream1_->set_handshake_confirmed_for_testing( |
GetParam().crypto_handshake_successful); |
crypto_stream1_->set_peer_supports_stateless_rejects( |
@@ -624,7 +609,7 @@ class QuicDispatcherWriteBlockedListTest : public QuicDispatcherTest { |
} |
protected: |
- MockHelper helper_; |
+ MockConnectionHelper helper_; |
BlockingWriter* writer_; |
QuicDispatcher::WriteBlockedList* blocked_list_; |
}; |