| Index: net/quic/core/crypto/crypto_server_test.cc
|
| diff --git a/net/quic/core/crypto/crypto_server_test.cc b/net/quic/core/crypto/crypto_server_test.cc
|
| index 9776deb7462a329357f2f51b7f244cb470f4c3d1..befd5c673415bbc9675c3cb23ccf0af7b22b0ca9 100644
|
| --- a/net/quic/core/crypto/crypto_server_test.cc
|
| +++ b/net/quic/core/crypto/crypto_server_test.cc
|
| @@ -107,7 +107,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
|
| client_address_(QuicIpAddress::Loopback4(), 1234),
|
| config_(QuicCryptoServerConfig::TESTING,
|
| rand_,
|
| - CryptoTestUtils::ProofSourceForTesting()),
|
| + crypto_test_utils::ProofSourceForTesting()),
|
| peer_(&config_),
|
| compressed_certs_cache_(
|
| QuicCompressedCertsCache::kQuicCompressedCertsCacheSize),
|
| @@ -150,7 +150,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
|
| "#" + QuicTextUtils::HexEncode(public_value, sizeof(public_value));
|
|
|
| // clang-format off
|
| - CryptoHandshakeMessage client_hello = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage client_hello = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -386,7 +386,7 @@ class CryptoServerTest : public ::testing::TestWithParam<TestParams> {
|
| }
|
|
|
| string XlctHexString() {
|
| - uint64_t xlct = CryptoTestUtils::LeafCertHashForTesting();
|
| + uint64_t xlct = crypto_test_utils::LeafCertHashForTesting();
|
| return "#" + QuicTextUtils::HexEncode(reinterpret_cast<char*>(&xlct),
|
| sizeof(xlct));
|
| }
|
| @@ -435,7 +435,7 @@ TEST_P(CryptoServerTest, BadSNI) {
|
|
|
| for (size_t i = 0; i < arraysize(kBadSNIs); i++) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "SNI", kBadSNIs[i],
|
| @@ -455,7 +455,7 @@ TEST_P(CryptoServerTest, DefaultCert) {
|
| // specified. The CHLO is constructed to generate a REJ with certs, so must
|
| // not contain a valid STK, and must include PDMD.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "AEAD", "AESG",
|
| "KEXS", "C255",
|
| @@ -484,7 +484,7 @@ TEST_P(CryptoServerTest, RejectTooLarge) {
|
| // Check that the server replies with no certificate when a CHLO is
|
| // constructed with a PDMD but no SKT when the REJ would be too large.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -515,7 +515,7 @@ TEST_P(CryptoServerTest, RejectNotTooLarge) {
|
| chlo_packet_size_ *= 2;
|
|
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -545,7 +545,7 @@ TEST_P(CryptoServerTest, RejectTooLargeButValidSTK) {
|
| // Check that the server replies with no certificate when a CHLO is
|
| // constructed with a PDMD but no SKT when the REJ would be too large.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -576,7 +576,7 @@ TEST_P(CryptoServerTest, RejectTooLargeButValidSTK) {
|
|
|
| TEST_P(CryptoServerTest, TooSmall) {
|
| // clang-format off
|
| - ShouldFailMentioning("too small", CryptoTestUtils::Message(
|
| + ShouldFailMentioning("too small", crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "VER\0", client_version_string_.c_str(),
|
| @@ -600,7 +600,7 @@ TEST_P(CryptoServerTest, BadSourceAddressToken) {
|
|
|
| for (size_t i = 0; i < arraysize(kBadSourceAddressTokens); i++) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "STK", kBadSourceAddressTokens[i],
|
| @@ -626,7 +626,7 @@ TEST_P(CryptoServerTest, BadClientNonce) {
|
| for (size_t i = 0; i < arraysize(kBadNonces); i++) {
|
| // Invalid nonces should be ignored, in an inchoate CHLO.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "NONC", kBadNonces[i],
|
| @@ -641,7 +641,7 @@ TEST_P(CryptoServerTest, BadClientNonce) {
|
|
|
| // Invalid nonces should result in CLIENT_NONCE_INVALID_FAILURE.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg1 = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg1 = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -669,7 +669,7 @@ TEST_P(CryptoServerTest, BadClientNonce) {
|
| TEST_P(CryptoServerTest, NoClientNonce) {
|
| // No client nonces should result in INCHOATE_HELLO_FAILURE.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "VER\0", client_version_string_.c_str(),
|
| @@ -683,7 +683,7 @@ TEST_P(CryptoServerTest, NoClientNonce) {
|
| CheckRejectReasons(kRejectReasons, arraysize(kRejectReasons));
|
|
|
| // clang-format off
|
| - CryptoHandshakeMessage msg1 = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg1 = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -715,7 +715,7 @@ TEST_P(CryptoServerTest, DowngradeAttack) {
|
| QuicTagToString(QuicVersionToQuicTag(supported_versions_.back()));
|
|
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "VER\0", bad_version.c_str(),
|
| @@ -731,7 +731,7 @@ TEST_P(CryptoServerTest, DowngradeAttack) {
|
| TEST_P(CryptoServerTest, CorruptServerConfig) {
|
| // This tests corrupted server config.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -754,7 +754,7 @@ TEST_P(CryptoServerTest, CorruptServerConfig) {
|
| TEST_P(CryptoServerTest, CorruptSourceAddressToken) {
|
| // This tests corrupted source address token.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -778,7 +778,7 @@ TEST_P(CryptoServerTest, CorruptSourceAddressToken) {
|
| TEST_P(CryptoServerTest, CorruptClientNonceAndSourceAddressToken) {
|
| // This test corrupts client nonce and source address token.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -802,7 +802,7 @@ TEST_P(CryptoServerTest, CorruptClientNonceAndSourceAddressToken) {
|
| TEST_P(CryptoServerTest, CorruptMultipleTags) {
|
| // This test corrupts client nonce, server nonce and source address token.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -830,7 +830,7 @@ TEST_P(CryptoServerTest, NoServerNonce) {
|
| // When no server nonce is present and no strike register is configured,
|
| // the CHLO should be rejected.
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -857,7 +857,7 @@ TEST_P(CryptoServerTest, NoServerNonce) {
|
| TEST_P(CryptoServerTest, ProofForSuppliedServerConfig) {
|
| client_address_ = QuicSocketAddress(QuicIpAddress::Loopback6(), 1234);
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "AEAD", "AESG",
|
| "KEXS", "C255",
|
| @@ -900,9 +900,9 @@ TEST_P(CryptoServerTest, ProofForSuppliedServerConfig) {
|
|
|
| // Check that the proof in the REJ message is valid.
|
| std::unique_ptr<ProofVerifier> proof_verifier(
|
| - CryptoTestUtils::ProofVerifierForTesting());
|
| + crypto_test_utils::ProofVerifierForTesting());
|
| std::unique_ptr<ProofVerifyContext> verify_context(
|
| - CryptoTestUtils::ProofVerifyContextForTesting());
|
| + crypto_test_utils::ProofVerifyContextForTesting());
|
| std::unique_ptr<ProofVerifyDetails> details;
|
| string error_details;
|
| std::unique_ptr<ProofVerifierCallback> callback(
|
| @@ -918,7 +918,7 @@ TEST_P(CryptoServerTest, ProofForSuppliedServerConfig) {
|
|
|
| TEST_P(CryptoServerTest, RejectInvalidXlct) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -948,7 +948,7 @@ TEST_P(CryptoServerTest, RejectInvalidXlct) {
|
|
|
| TEST_P(CryptoServerTest, ValidXlct) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -973,7 +973,7 @@ TEST_P(CryptoServerTest, ValidXlct) {
|
|
|
| TEST_P(CryptoServerTest, NonceInSHLO) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -1004,7 +1004,7 @@ TEST_P(CryptoServerTest, ProofSourceFailure) {
|
| peer_.ResetProofSource(std::unique_ptr<ProofSource>(new FailingProofSource));
|
|
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "AEAD", "AESG",
|
| "KEXS", "C255",
|
| @@ -1030,9 +1030,9 @@ TEST(CryptoServerConfigGenerationTest, Determinism) {
|
| MockClock clock;
|
|
|
| QuicCryptoServerConfig a(QuicCryptoServerConfig::TESTING, &rand_a,
|
| - CryptoTestUtils::ProofSourceForTesting());
|
| + crypto_test_utils::ProofSourceForTesting());
|
| QuicCryptoServerConfig b(QuicCryptoServerConfig::TESTING, &rand_b,
|
| - CryptoTestUtils::ProofSourceForTesting());
|
| + crypto_test_utils::ProofSourceForTesting());
|
| std::unique_ptr<CryptoHandshakeMessage> scfg_a(
|
| a.AddDefaultConfig(&rand_a, &clock, options));
|
| std::unique_ptr<CryptoHandshakeMessage> scfg_b(
|
| @@ -1050,10 +1050,10 @@ TEST(CryptoServerConfigGenerationTest, SCIDVaries) {
|
| MockClock clock;
|
|
|
| QuicCryptoServerConfig a(QuicCryptoServerConfig::TESTING, &rand_a,
|
| - CryptoTestUtils::ProofSourceForTesting());
|
| + crypto_test_utils::ProofSourceForTesting());
|
| rand_b.ChangeValue();
|
| QuicCryptoServerConfig b(QuicCryptoServerConfig::TESTING, &rand_b,
|
| - CryptoTestUtils::ProofSourceForTesting());
|
| + crypto_test_utils::ProofSourceForTesting());
|
| std::unique_ptr<CryptoHandshakeMessage> scfg_a(
|
| a.AddDefaultConfig(&rand_a, &clock, options));
|
| std::unique_ptr<CryptoHandshakeMessage> scfg_b(
|
| @@ -1072,7 +1072,7 @@ TEST(CryptoServerConfigGenerationTest, SCIDIsHashOfServerConfig) {
|
| MockClock clock;
|
|
|
| QuicCryptoServerConfig a(QuicCryptoServerConfig::TESTING, &rand_a,
|
| - CryptoTestUtils::ProofSourceForTesting());
|
| + crypto_test_utils::ProofSourceForTesting());
|
| std::unique_ptr<CryptoHandshakeMessage> scfg(
|
| a.AddDefaultConfig(&rand_a, &clock, options));
|
|
|
| @@ -1103,7 +1103,7 @@ class CryptoServerTestNoConfig : public CryptoServerTest {
|
|
|
| TEST_P(CryptoServerTestNoConfig, DontCrash) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "VER\0", client_version_string_.c_str(),
|
| @@ -1129,7 +1129,7 @@ class CryptoServerTestOldVersion : public CryptoServerTest {
|
|
|
| TEST_P(CryptoServerTestOldVersion, ServerIgnoresXlct) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
| @@ -1154,7 +1154,7 @@ TEST_P(CryptoServerTestOldVersion, ServerIgnoresXlct) {
|
|
|
| TEST_P(CryptoServerTestOldVersion, XlctNotRequired) {
|
| // clang-format off
|
| - CryptoHandshakeMessage msg = CryptoTestUtils::Message(
|
| + CryptoHandshakeMessage msg = crypto_test_utils::Message(
|
| "CHLO",
|
| "PDMD", "X509",
|
| "AEAD", "AESG",
|
|
|