Index: net/tools/quic/end_to_end_test.cc |
diff --git a/net/tools/quic/end_to_end_test.cc b/net/tools/quic/end_to_end_test.cc |
index 4e30c39a3f6aafddfcbe5f36e7dfd69a87b1c96d..88d4482aaa785035190bf2cd129b0d26c3d2e956 100644 |
--- a/net/tools/quic/end_to_end_test.cc |
+++ b/net/tools/quic/end_to_end_test.cc |
@@ -409,8 +409,8 @@ class EndToEndTest : public ::testing::TestWithParam<TestParams> { |
server_thread_->server()->SetChloMultiplier(chlo_multiplier_); |
} |
server_thread_->Initialize(); |
- server_address_ = |
- IPEndPoint(server_address_.address(), server_thread_->GetPort()); |
+ server_address_ = IPEndPoint(server_address_.address().bytes(), |
+ server_thread_->GetPort()); |
QuicDispatcher* dispatcher = |
QuicServerPeer::GetDispatcher(server_thread_->server()); |
TestWriterFactory* packet_writer_factory = new TestWriterFactory(); |
@@ -1469,7 +1469,7 @@ class WrongAddressWriter : public QuicPacketWriterWrapper { |
const IPEndPoint& peer_address) override { |
// Use wrong address! |
return QuicPacketWriterWrapper::WritePacket( |
- buffer, buf_len, self_address_.address(), peer_address); |
+ buffer, buf_len, self_address_.address().bytes(), peer_address); |
} |
bool IsWriteBlockedDataBuffered() const override { return false; } |
@@ -1484,7 +1484,8 @@ TEST_P(EndToEndTest, ConnectionMigrationClientIPChanged) { |
EXPECT_EQ(200u, client_->response_headers()->parsed_response_code()); |
// Store the client IP address which was used to send the first request. |
- IPAddressNumber old_host = client_->client()->client_address().address(); |
+ IPAddressNumber old_host = |
+ client_->client()->client_address().address().bytes(); |
// Migrate socket to the new IP address. |
IPAddressNumber new_host; |
@@ -1528,11 +1529,14 @@ TEST_P(EndToEndTest, ConnectionMigrationClientPortChanged) { |
// FD rather than any more complex NAT rebinding simulation. |
int new_port = client_->client()->client_address().port(); |
QuicClientPeer::SetClientPort(client_->client(), new_port); |
- QuicConnectionPeer::SetSelfAddress( |
- client_->client()->session()->connection(), |
- IPEndPoint( |
- client_->client()->session()->connection()->self_address().address(), |
- new_port)); |
+ QuicConnectionPeer::SetSelfAddress(client_->client()->session()->connection(), |
+ IPEndPoint(client_->client() |
+ ->session() |
+ ->connection() |
+ ->self_address() |
+ .address() |
+ .bytes(), |
+ new_port)); |
// Register the new FD for epoll events. |
int new_fd = client_->client()->fd(); |
@@ -1808,7 +1812,7 @@ TEST_P(EndToEndTest, ServerSendPublicResetWithDifferentConnectionId) { |
// race conditions. |
server_thread_->Pause(); |
server_writer_->WritePacket(packet->data(), packet->length(), |
- server_address_.address(), |
+ server_address_.address().bytes(), |
client_->client()->client_address()); |
server_thread_->Resume(); |
@@ -1835,9 +1839,9 @@ TEST_P(EndToEndTest, ClientSendPublicResetWithDifferentConnectionId) { |
QuicFramer framer(server_supported_versions_, QuicTime::Zero(), |
Perspective::IS_CLIENT); |
scoped_ptr<QuicEncryptedPacket> packet(framer.BuildPublicResetPacket(header)); |
- client_writer_->WritePacket(packet->data(), packet->length(), |
- client_->client()->client_address().address(), |
- server_address_); |
+ client_writer_->WritePacket( |
+ packet->data(), packet->length(), |
+ client_->client()->client_address().address().bytes(), server_address_); |
// The connection should be unaffected. |
EXPECT_EQ(kFooResponseBody, client_->SendSynchronousRequest("/foo")); |
@@ -1863,7 +1867,7 @@ TEST_P(EndToEndTest, ServerSendVersionNegotiationWithDifferentConnectionId) { |
// race conditions. |
server_thread_->Pause(); |
server_writer_->WritePacket(packet->data(), packet->length(), |
- server_address_.address(), |
+ server_address_.address().bytes(), |
client_->client()->client_address()); |
server_thread_->Resume(); |
@@ -1888,9 +1892,9 @@ TEST_P(EndToEndTest, BadPacketHeaderTruncated) { |
0x3C, |
// truncated connection ID |
0x11}; |
- client_writer_->WritePacket(&packet[0], sizeof(packet), |
- client_->client()->client_address().address(), |
- server_address_); |
+ client_writer_->WritePacket( |
+ &packet[0], sizeof(packet), |
+ client_->client()->client_address().address().bytes(), server_address_); |
// Give the server time to process the packet. |
base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(100)); |
// Pause the server so we can access the server's internals without races. |
@@ -1926,9 +1930,9 @@ TEST_P(EndToEndTest, BadPacketHeaderFlags) { |
// private flags |
0x00, |
}; |
- client_writer_->WritePacket(&packet[0], sizeof(packet), |
- client_->client()->client_address().address(), |
- server_address_); |
+ client_writer_->WritePacket( |
+ &packet[0], sizeof(packet), |
+ client_->client()->client_address().address().bytes(), server_address_); |
// Give the server time to process the packet. |
base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(100)); |
// Pause the server so we can access the server's internals without races. |
@@ -1961,9 +1965,9 @@ TEST_P(EndToEndTest, BadEncryptedData) { |
string damaged_packet(packet->data(), packet->length()); |
damaged_packet[30] ^= 0x01; |
DVLOG(1) << "Sending bad packet."; |
- client_writer_->WritePacket(damaged_packet.data(), damaged_packet.length(), |
- client_->client()->client_address().address(), |
- server_address_); |
+ client_writer_->WritePacket( |
+ damaged_packet.data(), damaged_packet.length(), |
+ client_->client()->client_address().address().bytes(), server_address_); |
// Give the server time to process the packet. |
base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(100)); |
// This error is sent to the connection's OnError (which ignores it), so the |