Index: net/quic/crypto/quic_crypto_client_config.cc |
diff --git a/net/quic/crypto/quic_crypto_client_config.cc b/net/quic/crypto/quic_crypto_client_config.cc |
index f79e05a13933355856eb3de4a393030a77731a70..fbc52ea76a5476270191a9b313ee7b07da80607f 100644 |
--- a/net/quic/crypto/quic_crypto_client_config.cc |
+++ b/net/quic/crypto/quic_crypto_client_config.cc |
@@ -83,7 +83,7 @@ bool QuicCryptoClientConfig::CachedState::IsComplete(QuicWallTime now) const { |
return false; |
} |
- uint64 expiry_seconds; |
+ uint64_t expiry_seconds; |
if (scfg->GetUint64(kEXPY, &expiry_seconds) != QUIC_NO_ERROR) { |
RecordInchoateClientHelloReason(SERVER_CONFIG_INVALID_EXPIRY); |
return false; |
@@ -159,7 +159,7 @@ QuicCryptoClientConfig::CachedState::SetServerConfig(StringPiece server_config, |
return SERVER_CONFIG_INVALID; |
} |
- uint64 expiry_seconds; |
+ uint64_t expiry_seconds; |
if (new_scfg->GetUint64(kEXPY, &expiry_seconds) != QUIC_NO_ERROR) { |
*error_details = "SCFG missing EXPY"; |
return SERVER_CONFIG_INVALID_EXPIRY; |
@@ -296,7 +296,7 @@ bool QuicCryptoClientConfig::CachedState::proof_valid() const { |
return server_config_valid_; |
} |
-uint64 QuicCryptoClientConfig::CachedState::generation_counter() const { |
+uint64_t QuicCryptoClientConfig::CachedState::generation_counter() const { |
return generation_counter_; |
} |
@@ -451,7 +451,7 @@ void QuicCryptoClientConfig::FillInchoateClientHello( |
// process the server's compressed certificate chain. |
out_params->cached_certs = certs; |
if (!certs.empty()) { |
- vector<uint64> hashes; |
+ vector<uint64_t> hashes; |
hashes.reserve(certs.size()); |
for (vector<string>::const_iterator i = certs.begin(); i != certs.end(); |
++i) { |