| Index: net/quic/test_tools/mock_crypto_client_stream.cc
|
| diff --git a/net/quic/test_tools/mock_crypto_client_stream.cc b/net/quic/test_tools/mock_crypto_client_stream.cc
|
| index d53f681fe78915df44b7f2d81fa3cdb4a1d5a5a9..d55dd839c6d6c67aa7280255123c12122ad7fca3 100644
|
| --- a/net/quic/test_tools/mock_crypto_client_stream.cc
|
| +++ b/net/quic/test_tools/mock_crypto_client_stream.cc
|
| @@ -58,8 +58,8 @@ void MockCryptoClientStream::CryptoConnect() {
|
| case ZERO_RTT: {
|
| encryption_established_ = true;
|
| handshake_confirmed_ = false;
|
| - crypto_negotiated_params_.key_exchange = kC255;
|
| - crypto_negotiated_params_.aead = kAESG;
|
| + crypto_negotiated_params_->key_exchange = kC255;
|
| + crypto_negotiated_params_->aead = kAESG;
|
| if (proof_verify_details_) {
|
| reinterpret_cast<QuicClientSessionBase*>(session())
|
| ->OnProofVerifyDetailsAvailable(*proof_verify_details_);
|
| @@ -77,8 +77,8 @@ void MockCryptoClientStream::CryptoConnect() {
|
| case CONFIRM_HANDSHAKE: {
|
| encryption_established_ = true;
|
| handshake_confirmed_ = true;
|
| - crypto_negotiated_params_.key_exchange = kC255;
|
| - crypto_negotiated_params_.aead = kAESG;
|
| + crypto_negotiated_params_->key_exchange = kC255;
|
| + crypto_negotiated_params_->aead = kAESG;
|
| if (proof_verify_details_) {
|
| reinterpret_cast<QuicClientSessionBase*>(session())
|
| ->OnProofVerifyDetailsAvailable(*proof_verify_details_);
|
|
|