| Index: net/quic/quic_crypto_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_stream_test.cc b/net/quic/quic_crypto_stream_test.cc
|
| index 2e4b34fe34a8e1dd2a5123ad7709aa0f315f0bb5..5abb15924b857f6d53c74faef21610660c0446b0 100644
|
| --- a/net/quic/quic_crypto_stream_test.cc
|
| +++ b/net/quic/quic_crypto_stream_test.cc
|
| @@ -26,17 +26,14 @@ namespace {
|
| class MockQuicCryptoStream : public QuicCryptoStream {
|
| public:
|
| explicit MockQuicCryptoStream(QuicSession* session)
|
| - : QuicCryptoStream(session) {
|
| - }
|
| + : QuicCryptoStream(session) {}
|
|
|
| virtual void OnHandshakeMessage(
|
| const CryptoHandshakeMessage& message) OVERRIDE {
|
| messages_.push_back(message);
|
| }
|
|
|
| - vector<CryptoHandshakeMessage>* messages() {
|
| - return &messages_;
|
| - }
|
| + vector<CryptoHandshakeMessage>* messages() { return &messages_; }
|
|
|
| private:
|
| vector<CryptoHandshakeMessage> messages_;
|
| @@ -78,9 +75,9 @@ TEST_F(QuicCryptoStreamTest, NotInitiallyConected) {
|
| }
|
|
|
| TEST_F(QuicCryptoStreamTest, ProcessRawData) {
|
| - EXPECT_EQ(message_data_->length(),
|
| - stream_.ProcessRawData(message_data_->data(),
|
| - message_data_->length()));
|
| + EXPECT_EQ(
|
| + message_data_->length(),
|
| + stream_.ProcessRawData(message_data_->data(), message_data_->length()));
|
| ASSERT_EQ(1u, stream_.messages()->size());
|
| const CryptoHandshakeMessage& message = (*stream_.messages())[0];
|
| EXPECT_EQ(kSHLO, message.tag());
|
| @@ -97,8 +94,7 @@ TEST_F(QuicCryptoStreamTest, ProcessBadData) {
|
| EXPECT_EQ(1, bad[kFirstTagIndex]);
|
| bad[kFirstTagIndex] = 0x7F; // out of order tag
|
|
|
| - EXPECT_CALL(*connection_,
|
| - SendConnectionClose(QUIC_CRYPTO_TAGS_OUT_OF_ORDER));
|
| + EXPECT_CALL(*connection_, SendConnectionClose(QUIC_CRYPTO_TAGS_OUT_OF_ORDER));
|
| EXPECT_EQ(0u, stream_.ProcessRawData(bad.data(), bad.length()));
|
| }
|
|
|
|
|