| Index: net/quic/core/crypto/quic_crypto_client_config_test.cc
|
| diff --git a/net/quic/core/crypto/quic_crypto_client_config_test.cc b/net/quic/core/crypto/quic_crypto_client_config_test.cc
|
| index 9555dd195d7b4c84be10ed7d79a4fc5023e57cdc..36022ef20e7ada342f1a4512193e5ae709a9e52f 100644
|
| --- a/net/quic/core/crypto/quic_crypto_client_config_test.cc
|
| +++ b/net/quic/core/crypto/quic_crypto_client_config_test.cc
|
| @@ -255,7 +255,7 @@ TEST(QuicCryptoClientConfigTest, FillClientHello) {
|
| }
|
|
|
| TEST(QuicCryptoClientConfigTest, ProcessServerDowngradeAttack) {
|
| - QuicVersionVector supported_versions = QuicSupportedVersions();
|
| + QuicVersionVector supported_versions = AllSupportedVersions();
|
| if (supported_versions.size() == 1) {
|
| // No downgrade attack is possible if the client only supports one version.
|
| return;
|
| @@ -437,8 +437,8 @@ TEST(QuicCryptoClientConfigTest, ProcessReject) {
|
| QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting());
|
| EXPECT_EQ(QUIC_NO_ERROR,
|
| config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0),
|
| - QuicSupportedVersions().front(), "",
|
| - &cached, &out_params, &error));
|
| + AllSupportedVersions().front(), "", &cached,
|
| + &out_params, &error));
|
| EXPECT_FALSE(cached.has_server_designated_connection_id());
|
| EXPECT_FALSE(cached.has_server_nonce());
|
| }
|
| @@ -459,8 +459,8 @@ TEST(QuicCryptoClientConfigTest, ProcessStatelessReject) {
|
| QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting());
|
| EXPECT_EQ(QUIC_NO_ERROR,
|
| config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0),
|
| - QuicSupportedVersions().front(), "",
|
| - &cached, &out_params, &error));
|
| + AllSupportedVersions().front(), "", &cached,
|
| + &out_params, &error));
|
| EXPECT_TRUE(cached.has_server_designated_connection_id());
|
| EXPECT_EQ(kConnectionId, cached.GetNextServerDesignatedConnectionId());
|
| EXPECT_EQ(server_nonce, cached.GetNextServerNonce());
|
| @@ -479,8 +479,8 @@ TEST(QuicCryptoClientConfigTest, BadlyFormattedStatelessReject) {
|
| QuicCryptoClientConfig config(CryptoTestUtils::ProofVerifierForTesting());
|
| EXPECT_EQ(QUIC_CRYPTO_MESSAGE_PARAMETER_NOT_FOUND,
|
| config.ProcessRejection(rej, QuicWallTime::FromUNIXSeconds(0),
|
| - QuicSupportedVersions().front(), "",
|
| - &cached, &out_params, &error));
|
| + AllSupportedVersions().front(), "", &cached,
|
| + &out_params, &error));
|
| EXPECT_FALSE(cached.has_server_designated_connection_id());
|
| EXPECT_EQ("Missing kRCID", error);
|
| }
|
| @@ -491,7 +491,7 @@ TEST(QuicCryptoClientConfigTest, ServerNonceinSHLO) {
|
| msg.set_tag(kSHLO);
|
| // Choose the latest version.
|
| QuicVersionVector supported_versions;
|
| - QuicVersion version = QuicSupportedVersions().front();
|
| + QuicVersion version = AllSupportedVersions().front();
|
| supported_versions.push_back(version);
|
| QuicTagVector versions;
|
| versions.push_back(QuicVersionToQuicTag(version));
|
|
|