| Index: net/quic/quic_crypto_client_stream_test.cc
|
| diff --git a/net/quic/quic_crypto_client_stream_test.cc b/net/quic/quic_crypto_client_stream_test.cc
|
| index 14ff3fd43f1605cf4ff031c9d420cede07698ff9..e13d21011a40c995092807d0cfd3a1cf5685cf04 100644
|
| --- a/net/quic/quic_crypto_client_stream_test.cc
|
| +++ b/net/quic/quic_crypto_client_stream_test.cc
|
| @@ -30,8 +30,10 @@ class QuicCryptoClientStreamTest : public ::testing::Test {
|
| : connection_(new PacketSavingConnection(false)),
|
| session_(new TestClientSession(connection_, DefaultQuicConfig())),
|
| server_id_(kServerHostname, kServerPort, false, PRIVACY_MODE_DISABLED),
|
| - stream_(new QuicCryptoClientStream(
|
| - server_id_, session_.get(), NULL, &crypto_config_)) {
|
| + stream_(new QuicCryptoClientStream(server_id_,
|
| + session_.get(),
|
| + NULL,
|
| + &crypto_config_)) {
|
| session_->SetCryptoStream(stream_.get());
|
| session_->config()->SetDefaults();
|
| crypto_config_.SetDefaults();
|
| @@ -70,8 +72,9 @@ TEST_F(QuicCryptoClientStreamTest, ConnectedAfterSHLO) {
|
| TEST_F(QuicCryptoClientStreamTest, MessageAfterHandshake) {
|
| CompleteCryptoHandshake();
|
|
|
| - EXPECT_CALL(*connection_, SendConnectionClose(
|
| - QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE));
|
| + EXPECT_CALL(
|
| + *connection_,
|
| + SendConnectionClose(QUIC_CRYPTO_MESSAGE_AFTER_HANDSHAKE_COMPLETE));
|
| message_.set_tag(kCHLO);
|
| ConstructHandshakeMessage();
|
| stream_->ProcessRawData(message_data_->data(), message_data_->length());
|
| @@ -83,8 +86,9 @@ TEST_F(QuicCryptoClientStreamTest, BadMessageType) {
|
| message_.set_tag(kCHLO);
|
| ConstructHandshakeMessage();
|
|
|
| - EXPECT_CALL(*connection_, SendConnectionCloseWithDetails(
|
| - QUIC_INVALID_CRYPTO_MESSAGE_TYPE, "Expected REJ"));
|
| + EXPECT_CALL(*connection_,
|
| + SendConnectionCloseWithDetails(QUIC_INVALID_CRYPTO_MESSAGE_TYPE,
|
| + "Expected REJ"));
|
| stream_->ProcessRawData(message_data_->data(), message_data_->length());
|
| }
|
|
|
| @@ -108,8 +112,8 @@ TEST_F(QuicCryptoClientStreamTest, NegotiatedParameters) {
|
|
|
| TEST_F(QuicCryptoClientStreamTest, InvalidHostname) {
|
| QuicServerId server_id("invalid", 80, false, PRIVACY_MODE_DISABLED);
|
| - stream_.reset(new QuicCryptoClientStream(server_id, session_.get(), NULL,
|
| - &crypto_config_));
|
| + stream_.reset(new QuicCryptoClientStream(
|
| + server_id, session_.get(), NULL, &crypto_config_));
|
| session_->SetCryptoStream(stream_.get());
|
|
|
| CompleteCryptoHandshake();
|
| @@ -123,8 +127,8 @@ TEST_F(QuicCryptoClientStreamTest, ExpiredServerConfig) {
|
|
|
| connection_ = new PacketSavingConnection(true);
|
| session_.reset(new TestClientSession(connection_, DefaultQuicConfig()));
|
| - stream_.reset(new QuicCryptoClientStream(server_id_, session_.get(), NULL,
|
| - &crypto_config_));
|
| + stream_.reset(new QuicCryptoClientStream(
|
| + server_id_, session_.get(), NULL, &crypto_config_));
|
|
|
| session_->SetCryptoStream(stream_.get());
|
| session_->config()->SetDefaults();
|
|
|