| Index: net/quic/quic_session_test.cc
|
| diff --git a/net/quic/quic_session_test.cc b/net/quic/quic_session_test.cc
|
| index bda96aee0c381f07b3f5c230f9070267890ed604..feae2fb1ba32c6869f96592dd4ed422c8ea8adaf 100644
|
| --- a/net/quic/quic_session_test.cc
|
| +++ b/net/quic/quic_session_test.cc
|
| @@ -6,7 +6,6 @@
|
|
|
| #include <set>
|
|
|
| -#include "base/basictypes.h"
|
| #include "base/containers/hash_tables.h"
|
| #include "base/rand_util.h"
|
| #include "base/stl_util.h"
|
| @@ -940,8 +939,8 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingFinAfterRst) {
|
|
|
| // Connection starts with some non-zero highest received byte offset,
|
| // due to other active streams.
|
| - const uint64 kInitialConnectionBytesConsumed = 567;
|
| - const uint64 kInitialConnectionHighestReceivedOffset = 1234;
|
| + const uint64_t kInitialConnectionBytesConsumed = 567;
|
| + const uint64_t kInitialConnectionHighestReceivedOffset = 1234;
|
| EXPECT_LT(kInitialConnectionBytesConsumed,
|
| kInitialConnectionHighestReceivedOffset);
|
| session_.flow_controller()->UpdateHighestReceivedOffset(
|
| @@ -977,8 +976,8 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingRstAfterRst) {
|
|
|
| // Connection starts with some non-zero highest received byte offset,
|
| // due to other active streams.
|
| - const uint64 kInitialConnectionBytesConsumed = 567;
|
| - const uint64 kInitialConnectionHighestReceivedOffset = 1234;
|
| + const uint64_t kInitialConnectionBytesConsumed = 567;
|
| + const uint64_t kInitialConnectionHighestReceivedOffset = 1234;
|
| EXPECT_LT(kInitialConnectionBytesConsumed,
|
| kInitialConnectionHighestReceivedOffset);
|
| session_.flow_controller()->UpdateHighestReceivedOffset(
|
| @@ -1008,7 +1007,7 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingRstAfterRst) {
|
| TEST_P(QuicSessionTestServer, InvalidStreamFlowControlWindowInHandshake) {
|
| // Test that receipt of an invalid (< default) stream flow control window from
|
| // the peer results in the connection being torn down.
|
| - const uint32 kInvalidWindow = kMinimumFlowControlSendWindow - 1;
|
| + const uint32_t kInvalidWindow = kMinimumFlowControlSendWindow - 1;
|
| QuicConfigPeer::SetReceivedInitialStreamFlowControlWindow(session_.config(),
|
| kInvalidWindow);
|
|
|
| @@ -1020,7 +1019,7 @@ TEST_P(QuicSessionTestServer, InvalidStreamFlowControlWindowInHandshake) {
|
| TEST_P(QuicSessionTestServer, InvalidSessionFlowControlWindowInHandshake) {
|
| // Test that receipt of an invalid (< default) session flow control window
|
| // from the peer results in the connection being torn down.
|
| - const uint32 kInvalidWindow = kMinimumFlowControlSendWindow - 1;
|
| + const uint32_t kInvalidWindow = kMinimumFlowControlSendWindow - 1;
|
| QuicConfigPeer::SetReceivedInitialSessionFlowControlWindow(session_.config(),
|
| kInvalidWindow);
|
|
|
| @@ -1032,7 +1031,7 @@ TEST_P(QuicSessionTestServer, InvalidSessionFlowControlWindowInHandshake) {
|
| TEST_P(QuicSessionTestServer, FlowControlWithInvalidFinalOffset) {
|
| // Test that if we receive a stream RST with a highest byte offset that
|
| // violates flow control, that we close the connection.
|
| - const uint64 kLargeOffset = kInitialSessionFlowControlWindowForTest + 1;
|
| + const uint64_t kLargeOffset = kInitialSessionFlowControlWindowForTest + 1;
|
| EXPECT_CALL(*connection_,
|
| SendConnectionClose(QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA))
|
| .Times(2);
|
|
|