| Index: net/quic/quic_session_test.cc
 | 
| diff --git a/net/quic/quic_session_test.cc b/net/quic/quic_session_test.cc
 | 
| index bda96aee0c381f07b3f5c230f9070267890ed604..feae2fb1ba32c6869f96592dd4ed422c8ea8adaf 100644
 | 
| --- a/net/quic/quic_session_test.cc
 | 
| +++ b/net/quic/quic_session_test.cc
 | 
| @@ -6,7 +6,6 @@
 | 
|  
 | 
|  #include <set>
 | 
|  
 | 
| -#include "base/basictypes.h"
 | 
|  #include "base/containers/hash_tables.h"
 | 
|  #include "base/rand_util.h"
 | 
|  #include "base/stl_util.h"
 | 
| @@ -940,8 +939,8 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingFinAfterRst) {
 | 
|  
 | 
|    // Connection starts with some non-zero highest received byte offset,
 | 
|    // due to other active streams.
 | 
| -  const uint64 kInitialConnectionBytesConsumed = 567;
 | 
| -  const uint64 kInitialConnectionHighestReceivedOffset = 1234;
 | 
| +  const uint64_t kInitialConnectionBytesConsumed = 567;
 | 
| +  const uint64_t kInitialConnectionHighestReceivedOffset = 1234;
 | 
|    EXPECT_LT(kInitialConnectionBytesConsumed,
 | 
|              kInitialConnectionHighestReceivedOffset);
 | 
|    session_.flow_controller()->UpdateHighestReceivedOffset(
 | 
| @@ -977,8 +976,8 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingRstAfterRst) {
 | 
|  
 | 
|    // Connection starts with some non-zero highest received byte offset,
 | 
|    // due to other active streams.
 | 
| -  const uint64 kInitialConnectionBytesConsumed = 567;
 | 
| -  const uint64 kInitialConnectionHighestReceivedOffset = 1234;
 | 
| +  const uint64_t kInitialConnectionBytesConsumed = 567;
 | 
| +  const uint64_t kInitialConnectionHighestReceivedOffset = 1234;
 | 
|    EXPECT_LT(kInitialConnectionBytesConsumed,
 | 
|              kInitialConnectionHighestReceivedOffset);
 | 
|    session_.flow_controller()->UpdateHighestReceivedOffset(
 | 
| @@ -1008,7 +1007,7 @@ TEST_P(QuicSessionTestServer, ConnectionFlowControlAccountingRstAfterRst) {
 | 
|  TEST_P(QuicSessionTestServer, InvalidStreamFlowControlWindowInHandshake) {
 | 
|    // Test that receipt of an invalid (< default) stream flow control window from
 | 
|    // the peer results in the connection being torn down.
 | 
| -  const uint32 kInvalidWindow = kMinimumFlowControlSendWindow - 1;
 | 
| +  const uint32_t kInvalidWindow = kMinimumFlowControlSendWindow - 1;
 | 
|    QuicConfigPeer::SetReceivedInitialStreamFlowControlWindow(session_.config(),
 | 
|                                                              kInvalidWindow);
 | 
|  
 | 
| @@ -1020,7 +1019,7 @@ TEST_P(QuicSessionTestServer, InvalidStreamFlowControlWindowInHandshake) {
 | 
|  TEST_P(QuicSessionTestServer, InvalidSessionFlowControlWindowInHandshake) {
 | 
|    // Test that receipt of an invalid (< default) session flow control window
 | 
|    // from the peer results in the connection being torn down.
 | 
| -  const uint32 kInvalidWindow = kMinimumFlowControlSendWindow - 1;
 | 
| +  const uint32_t kInvalidWindow = kMinimumFlowControlSendWindow - 1;
 | 
|    QuicConfigPeer::SetReceivedInitialSessionFlowControlWindow(session_.config(),
 | 
|                                                               kInvalidWindow);
 | 
|  
 | 
| @@ -1032,7 +1031,7 @@ TEST_P(QuicSessionTestServer, InvalidSessionFlowControlWindowInHandshake) {
 | 
|  TEST_P(QuicSessionTestServer, FlowControlWithInvalidFinalOffset) {
 | 
|    // Test that if we receive a stream RST with a highest byte offset that
 | 
|    // violates flow control, that we close the connection.
 | 
| -  const uint64 kLargeOffset = kInitialSessionFlowControlWindowForTest + 1;
 | 
| +  const uint64_t kLargeOffset = kInitialSessionFlowControlWindowForTest + 1;
 | 
|    EXPECT_CALL(*connection_,
 | 
|                SendConnectionClose(QUIC_FLOW_CONTROL_RECEIVED_TOO_MUCH_DATA))
 | 
|        .Times(2);
 | 
| 
 |