| Index: net/quic/quic_crypto_client_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_client_stream_test.cc b/net/quic/quic_crypto_client_stream_test.cc
|
| index 8154d177988b37deb264549a14cc75e62a0ef409..3af0701decbe13f2f20a86f929386d4190b6e90b 100644
|
| --- a/net/quic/quic_crypto_client_stream_test.cc
|
| +++ b/net/quic/quic_crypto_client_stream_test.cc
|
| @@ -20,14 +20,15 @@ namespace test {
|
| namespace {
|
|
|
| const char kServerHostname[] = "example.com";
|
| +const uint16 kServerPort = 80;
|
|
|
| class QuicCryptoClientStreamTest : public ::testing::Test {
|
| public:
|
| QuicCryptoClientStreamTest()
|
| : connection_(new PacketSavingConnection(false)),
|
| session_(new TestSession(connection_, DefaultQuicConfig())),
|
| - stream_(new QuicCryptoClientStream(kServerHostname, session_.get(),
|
| - &crypto_config_)) {
|
| + stream_(new QuicCryptoClientStream(kServerHostname, kServerPort,
|
| + session_.get(), &crypto_config_)) {
|
| session_->SetCryptoStream(stream_.get());
|
| crypto_config_.SetDefaults();
|
| }
|
| @@ -101,8 +102,8 @@ TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) {
|
| }
|
|
|
| TEST_F(QuicCryptoClientStreamTest, InvalidHostname) {
|
| - stream_.reset(new QuicCryptoClientStream("invalid", session_.get(),
|
| - &crypto_config_));
|
| + stream_.reset(new QuicCryptoClientStream("invalid", kServerPort,
|
| + session_.get(), &crypto_config_));
|
| session_->SetCryptoStream(stream_.get());
|
|
|
| CompleteCryptoHandshake();
|
| @@ -116,8 +117,8 @@ TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
|
|
|
| connection_ = new PacketSavingConnection(true);
|
| session_.reset(new TestSession(connection_, DefaultQuicConfig()));
|
| - stream_.reset(new QuicCryptoClientStream(kServerHostname, session_.get(),
|
| - &crypto_config_));
|
| + stream_.reset(new QuicCryptoClientStream(kServerHostname, kServerPort,
|
| + session_.get(), &crypto_config_));
|
|
|
| session_->SetCryptoStream(stream_.get());
|
| session_->config()->SetDefaults();
|
|
|